You are viewing a plain text version of this content. The canonical link for it is here.
Posted to builds@solr.apache.org by Apache Jenkins Server <je...@builds.apache.org> on 2023/10/09 11:28:05 UTC

[JENKINS] Solr » Solr-Check-main - Build # 8146 - Still Failing!

Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8146/

All tests passed

Build Log:
[...truncated 1447 lines...]
BUILD FAILED in 1h 3m 10s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/pn6fagw5vwuca

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8261 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8261/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([B6E24DF639530F76:8179B9E8019FD2D2]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.renewDelegationToken(TestSolrCloudWithDelegationTokens.java:136)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.verifyDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:346)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:365)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1767 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41465/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 22:22:06.621; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:22:06.625; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41465/solr] to [https://127.0.0.1:41465].
# WARN  - 2023-10-27 22:22:07.620; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 22:22:07.653; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16608ms
ok 74 start solr with client truststore and security manager in 18844ms
not ok 75 start solr with mTLS needed in 53756ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-c3D6Ur/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41465 [|]   [/]   [-]   [\]
# Started Solr server on port 41465 (pid=897824). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41466 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 41466 (pid=897989). Happy searching!
#
#     INFO  - 2023-10-27 22:23:08.282; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:23:08.291; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 22:23:08.979; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:08.981; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:08.981; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.038 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 43 FA 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:54.000 UTC",
#     "not  after"         : "2024-01-25 22:22:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#         0010: B9 73 B9 04                                        .s..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.042 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 DD 85 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:46.000 UTC",
#     "not  after"         : "2024-01-25 22:22:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.055 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.985 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:09.985 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.991 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.991 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:09.995 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.025 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 05 FF 3C 9D 91 D9 68 1C 0E 41 97 CF 52 03 F3 BB D9 42 49 EA B0 99 64 E0 A8 07 2D 7A D2 A7 A8",
#   "session id"          : "33 38 DB 26 EA DD 2F 06 42 AC CE 72 BD DC BE 36 04 54 97 23 29 BA 01 A7 C9 EF 22 41 9F AE 17 66",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E6 AE F3 2D D1 A1 77 AD   F4 81 A6 AB DC 12 64 27  ...-..w.......d'
#             0010: 8A 75 49 16 CB 84 EC 36   0C D2 70 FE 7C F5 D7 51  .uI....6..p....Q
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.185 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A4 F8 4D 5A 9E 13 AA F7 30 D7 D5 6C 2E 02 1E 56 B7 0A E0 4F E4 4E 10 A8 DA DF 5C CE 6C 9F 30 91",
#   "session id"          : "33 38 DB 26 EA DD 2F 06 42 AC CE 72 BD DC BE 36 04 54 97 23 29 BA 01 A7 C9 EF 22 41 9F AE 17 66",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5B B9 22 41 E3 C6 21 CD   D6 3A 18 BE 35 69 7B D5  [."A..!..:..5i..
#           0010: C6 AC 45 D7 51 4D C2 28   A5 6C 8A 35 9A C4 12 0D  ..E.QM.(.l.5....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.186 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.186 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.189 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.210 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.213 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.232 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.233 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.234 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.243 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.243 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.250 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.251 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.251 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.252 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.252 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.267 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 0D 01 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:50.000 UTC",
#       "not  after"         : "2024-01-25 22:22:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 18 C4 7A 39 0C 7A 85   E2 07 FD E5 81 7C E4 D8  ...z9.z.........
#           0010: 35 BE 12 33                                        5..3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.267 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.323 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.326 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 22 A4 D7 0B 9B FC 4A   6F 43 5F 8B 54 1C FD 0D  ,".....JoC_.T...
#     0010: 40 8B ED 1C C1 CF 42 64   A5 C4 D0 D8 82 DB 91 1C  @.....Bd........
#     0020: 81 97 1D F3 3D EE 2F 25   4A F6 EA 72 C8 C7 DE 86  ....=./%J..r....
#     0030: B7 4E 04 02 A9 FA 64 77   4B 28 A0 DE 0B 4A 46 53  .N....dwK(...JFS
#     0040: F3 EC E5 53 1C 4A A3 40   B1 8A 87 08 D4 DC 27 2E  ...S.J.@......'.
#     0050: 7A 47 EE 9A A6 5E 26 19   95 E2 86 75 A2 90 4A 45  zG...^&....u..JE
#     0060: 25 69 ED F6 5B B4 C0 65   7F 27 79 EC 93 DD 52 D9  %i..[..e.'y...R.
#     0070: 5B 51 EE 08 24 41 CF C3   7B 86 4C EE 49 24 03 88  [Q..$A....L.I$..
#     0080: BE 8B 9B DF 3E 96 E6 D6   F4 50 86 01 D2 4E A4 CE  ....>....P...N..
#     0090: EC 6A 1E E6 99 E7 74 BD   97 9A A9 88 27 56 6D 82  .j....t.....'Vm.
#     00A0: 12 F8 49 66 B4 EB 32 94   91 44 BC AD B6 E2 7A FA  ..If..2..D....z.
#     00B0: 9C 15 76 E8 12 05 6F 55   CB 1B 24 EE 6E 49 A3 DA  ..v...oU..$.nI..
#     00C0: 5E 5E 4F 90 6A 0B 20 44   42 09 95 D0 88 B7 52 11  ^^O.j. DB.....R.
#     00D0: 9D DC 99 43 9A 86 51 19   E3 F3 88 95 40 12 18 C8  ...C..Q.....@...
#     00E0: 3E 9D 55 27 9B F9 10 74   0D FB D1 85 FA 7C 45 CD  >.U'...t......E.
#     00F0: 78 C4 F3 0E 70 EF 7C 39   BF 06 16 DA F0 48 16 CB  x...p..9.....H..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.327 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 A5 D4 C9 DA 92 40 12   91 8B D8 8B 28 15 CE 2D  ......@.....(..-
#     0010: 11 76 6A 08 3D B6 54 AD   CD 60 2B 5B CA 4A 3C DD  .vj.=.T..`+[.J<.
#     0020: 36 AF 6B 1A 6A 67 CB 16   71 7A 92 61 F9 BC 6B BB  6.k.jg..qz.a..k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.336 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.337 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.349 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 43 FA 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:54.000 UTC",
#       "not  after"         : "2024-01-25 22:22:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#           0010: B9 73 B9 04                                        .s..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.410 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 66 8E 9E 7E B5 73 15   07 2B 46 73 3F A6 54 72  Uf....s..+Fs?.Tr
#     0010: 4D 13 FE 08 0C 2B 6E A0   0E A6 92 1A BC F9 99 B8  M....+n.........
#     0020: 8D 15 5C 2F 9F 54 B1 82   F1 BD 8A 16 A5 E8 3F 57  ..\/.T........?W
#     0030: 11 00 D0 DB 5A 07 E7 29   97 62 7D EA DB F5 95 00  ....Z..).b......
#     0040: BC 66 C9 39 8F 4E AE E0   45 CE 5D 51 42 D4 73 E7  .f.9.N..E.]QB.s.
#     0050: 58 B9 5E 15 3A E8 9E EF   23 36 7C 73 31 09 87 66  X.^.:...#6.s1..f
#     0060: 82 6D CB 44 59 69 02 8D   3E C8 E9 BB 33 FD 4A 2C  .m.DYi..>...3.J,
#     0070: 45 E0 72 07 C6 3E 83 CA   CA 46 10 FC D9 8E BC 2E  E.r..>...F......
#     0080: BE 67 B8 66 BD BA 81 B9   AF E8 D5 2A 6D 7C AA 50  .g.f.......*m..P
#     0090: E1 09 56 A7 C3 7C D7 DC   5A 10 DC 52 4F 5F 5C 54  ..V.....Z..RO_\T
#     00A0: D0 5D 5C DF FA 63 D7 75   C2 07 D0 20 B7 3B EE BF  .]\..c.u... .;..
#     00B0: 40 58 11 89 31 D3 D0 ED   BF 15 D6 79 2E E2 BC E7  @X..1......y....
#     00C0: 60 79 BF A9 E1 32 46 97   7F 53 91 95 A2 22 9F E7  `y...2F..S..."..
#     00D0: CC 29 FA 14 06 1B C0 62   7F 3F 79 32 C6 B6 01 97  .).....b.?y2....
#     00E0: 54 F6 69 45 13 02 D9 A2   75 F0 20 74 D6 23 12 98  T.iE....u. t.#..
#     00F0: A6 80 B1 84 4D 5C 93 35   40 F0 85 59 28 74 6B D7  ....M\.5@..Y(tk.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.411 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 1A FD D7 B4 96 49 4F   9F 27 09 8C 82 35 5D 9F  ......IO.'...5].
#     0010: 8C 8E A4 8A 87 61 26 D5   59 98 DE 06 BB 0C 2B 21  .....a&.Y.....+!
#     0020: 95 CA E3 7B F6 B6 6A 73   26 B8 FA 9C 85 E9 11 ED  ......js&.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.414 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.517 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A7 7F 32 B0 86 04 DC 17 8B E0 57 D4 B2 C3 49 00 B8 4D 5E A1 EF B9 E9 C5 E3 B5 E9 1B 5D 19 0B D5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 22:23:11.273 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 22:23:11.273 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 22:23:12.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:23:12.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 22:23:12.881; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:12.882; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:12.883; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.912 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 43 FA 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:54.000 UTC",
#     "not  after"         : "2024-01-25 22:22:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#         0010: B9 73 B9 04                                        .s..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.915 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 DD 85 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:46.000 UTC",
#     "not  after"         : "2024-01-25 22:22:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.926 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.240 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.241 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.242 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.242 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.246 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.255 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.255 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.256 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.257 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D6 4C C1 91 8A 04 85 65 85 87 35 36 05 B8 36 E0 EF 10 A9 08 6E 79 8A A0 CB 73 87 05 4D 7C 3D C8",
#   "session id"          : "A1 F6 2F 90 AB A8 F7 F6 E1 0C 02 14 CF 1B 46 9E 68 86 C5 03 79 14 D8 2B B4 15 98 84 E1 5F AE EC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2C F6 81 56 A9 0D 41 5D   05 62 5C 1C EF A8 17 E8  ,..V..A].b\.....
#             0010: 5F F4 04 32 23 61 7B 67   C3 29 23 22 5F A4 D8 08  _..2#a.g.)#"_...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E4 CC 45 75 1B BA 89 81 18 F1 78 2C EC 7C 41 D0 80 05 6A AC F1 44 8A B5 1E B8 27 4C 00 37 3E 03",
#   "session id"          : "A1 F6 2F 90 AB A8 F7 F6 E1 0C 02 14 CF 1B 46 9E 68 86 C5 03 79 14 D8 2B B4 15 98 84 E1 5F AE EC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E6 4C C9 0A 1F 64 91 A6   1C D2 B5 D7 70 EC D4 4B  .L...d......p..K
#           0010: 29 6E A1 2A 6C 7E 8C 58   85 BB 90 0B E1 4B 1B 35  )n.*l..X.....K.5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.376 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.377 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.383 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.389 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.389 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.390 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.403 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 0D 01 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:50.000 UTC",
#       "not  after"         : "2024-01-25 22:22:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 18 C4 7A 39 0C 7A 85   E2 07 FD E5 81 7C E4 D8  ...z9.z.........
#           0010: 35 BE 12 33                                        5..3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.403 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.477 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 CD 20 9F A9 E5 A6 55   B8 6E D0 36 B2 41 95 21  V. ....U.n.6.A.!
#     0010: 8E BF 94 54 75 2F 98 8D   B4 E6 0F D2 DA 9E AD 91  ...Tu/..........
#     0020: CB 02 FE 6A 58 94 7A 50   51 99 6B 24 CC FE F2 C5  ...jX.zPQ.k$....
#     0030: 0D 50 BF D0 96 49 EF 4C   2D B6 96 20 8D 91 5B F4  .P...I.L-.. ..[.
#     0040: 35 62 68 3F 29 39 FE FB   70 CA 2B FC F6 D8 E8 76  5bh?)9..p.+....v
#     0050: 37 82 54 B2 7E F9 E9 2F   8C 84 8D F4 90 E9 49 25  7.T..../......I%
#     0060: 93 93 EC 1C C0 49 AB 30   38 86 75 D8 F0 4C 81 7A  .....I.08.u..L.z
#     0070: D0 69 05 4E F2 FD 4B 56   92 46 5B F8 B7 48 B3 0C  .i.N..KV.F[..H..
#     0080: 37 2A B9 6B CD B9 67 05   A8 B5 B4 1B 62 CE 40 74  7*.k..g.....b.@t
#     0090: C7 55 CE B8 C2 DE F5 04   C5 F3 8A 89 20 7F B5 D4  .U.......... ...
#     00A0: 81 73 43 97 B9 B1 FA 1F   78 64 90 68 B4 2D 9A B6  .sC.....xd.h.-..
#     00B0: BE A1 67 E3 F1 07 DB 90   AA 2E F1 ED C5 B2 CB 2B  ..g............+
#     00C0: DF EA 46 D9 48 79 E0 96   5A 8A FB F4 0A B3 20 C9  ..F.Hy..Z..... .
#     00D0: 1B 6A 57 D0 83 EA 2D 1E   D6 A6 BF C3 F8 4A C4 D2  .jW...-......J..
#     00E0: 89 DE DA 48 A8 1F B8 A5   16 39 25 B6 D5 D3 0E B0  ...H.....9%.....
#     00F0: 18 A0 04 AE A9 A0 B1 25   18 A6 8B C3 CB 13 56 6A  .......%......Vj
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.478 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 81 F2 8D 24 BA 66 3F FF   B9 A2 3A 7D EC 1E FE 00  ...$.f?...:.....
#     0010: E4 D7 BF C9 09 18 1B 82   78 5E A1 BB 76 15 6D FB  ........x^..v.m.
#     0020: 15 98 CA F8 41 1F B0 98   F5 83 1A 30 7F 3D 31 18  ....A......0.=1.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.480 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.480 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.483 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 43 FA 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:54.000 UTC",
#       "not  after"         : "2024-01-25 22:22:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#           0010: B9 73 B9 04                                        .s..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.505 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 2D B9 EA F1 F4 79 90   03 D1 E4 B8 30 A9 99 91  5-....y.....0...
#     0010: F6 A8 67 81 5F 89 FE EA   32 3B 18 4C FE 6C F4 DA  ..g._...2;.L.l..
#     0020: E6 A9 A9 8F 3A 30 2A 7B   EF 01 CF 14 2D BB B0 22  ....:0*.....-.."
#     0030: 0B 0E AE 56 D1 2F F0 49   AD 3E 77 4E 78 BC B8 50  ...V./.I.>wNx..P
#     0040: 32 1D 47 CD 5F 0E 1E 8B   A2 9C CC 27 3B B8 EC DB  2.G._......';...
#     0050: 2B 68 C7 95 45 D9 2F A6   68 4A 65 DE 11 45 3F AF  +h..E./.hJe..E?.
#     0060: 11 1E BF F4 33 41 CD ED   8E EE 28 99 48 92 91 3A  ....3A....(.H..:
#     0070: FF 4D 14 27 09 2A E4 5A   70 ED 8A C8 4C FB 98 A2  .M.'.*.Zp...L...
#     0080: D8 26 31 18 FA 18 A2 DA   EB 0D 06 63 B1 9A 9B CD  .&1........c....
#     0090: EC 73 24 CF 36 DA DC F6   32 3A 13 2C 77 6D 4F DC  .s$.6...2:.,wmO.
#     00A0: 48 A0 B1 28 77 86 20 DD   CA AE 98 11 57 CF 53 8E  H..(w. .....W.S.
#     00B0: A6 08 B7 B2 10 6F 0E FA   EC 08 AE 4C 3B 1F 1A FC  .....o.....L;...
#     00C0: 49 98 23 8E 9B D1 A7 FA   29 9B 52 FB 19 8C 34 AC  I.#.....).R...4.
#     00D0: 47 F6 1A 09 CA 99 3E 41   C0 BC 03 88 C6 A6 F3 EA  G.....>A........
#     00E0: B7 FF 91 25 07 9C 7A 30   FC A3 5A 6C AB 6B 80 5F  ...%..z0..Zl.k._
#     00F0: 64 6F ED E7 11 85 2D BA   56 0E B2 98 46 B0 D6 77  do....-.V...F..w
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.506 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 01 CE 90 94 2C 6D 8A 97   50 8B D3 99 9F 04 97 EF  ....,m..P.......
#     0010: 16 0F E3 9C 46 74 FC 57   CE B3 6B 14 0D 10 93 1A  ....Ft.W..k.....
#     0020: 61 46 CA 48 DF 9F E0 74   61 38 25 61 DF 5A BA 69  aF.H...ta8%a.Z.i
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.506 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.965 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5B 48 5A 27 C2 A8 81 C6 E4 71 C5 28 9F 4E DA 60 6E 64 B9 08 F6 02 96 9F A6 C6 07 D3 95 F8 B0 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 22:23:14.225 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 22:23:14.226 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 22:23:26.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:27.294 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 DD 85 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:46.000 UTC",
#       "not  after"         : "2024-01-25 22:22:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:27.317 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.482 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.483 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.483 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.498 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B5 38 18 05 1D E2 01 65 E6 B1 64 2E E5 8C B4 0A 17 98 A9 EE 68 6B 8B AE 5B 6E CA E9 C8 C0 38 AC",
#     "session id"          : "E6 97 F9 83 93 12 CE E7 E0 62 2C 35 0E B4 04 0D 27 82 D7 6B 87 97 71 7B 01 84 98 B9 1C 86 13 F6",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 0A 1B 02 FE 66 1F FE 81   B7 43 49 C0 F5 79 BA 9A  ....f....CI..y..
#               0010: CC 79 06 A4 BF 11 82 7C   12 F5 AF 7D 91 EC C9 25  .y.............%
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.510 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D5 C9 CB 69 CE 33 BD 9B 8D B5 67 41 9A F6 6D 4E 9D 0D FB EB 4D B3 A2 00 23 CA BE 76 3C 86 09 8C",
#     "session id"          : "E6 97 F9 83 93 12 CE E7 E0 62 2C 35 0E B4 04 0D 27 82 D7 6B 87 97 71 7B 01 84 98 B9 1C 86 13 F6",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 71 5E EA 65 AD B4 E5 91   31 41 A6 1B 09 85 80 F4  q^.e....1A......
#             0010: EE A9 54 C4 6B 8E 29 63   73 3E C9 57 A5 33 F8 03  ..T.k.)cs>.W.3..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.511 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.511 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thr

[...truncated too long message...]

n.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:24:53.252 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.282 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41466/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 13602ms
ok 78 stop command for single port in 17342ms
ok 79 status detects locally running solr in 9246ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 6895ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 990ms
ok 82 listing out files in 2591ms
ok 83 copying files around in 6089ms
ok 84 upconfig in 2523ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1210ms
ok 87 Cleanup in 1951ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=B6E24DF639530F76 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 43s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/lopy3vznfho62

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8260 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8260/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43611/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 16:27:40.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:27:40.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43611/solr] to [https://127.0.0.1:43611].
# WARN  - 2023-10-27 16:27:41.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 16:27:41.882; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16772ms
ok 74 start solr with client truststore and security manager in 19312ms
not ok 75 start solr with mTLS needed in 54010ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-hupojE/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43611 [|]   [/]   [-]   [\]
# Started Solr server on port 43611 (pid=262829). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43612 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43612 (pid=262935). Happy searching!
#
#     INFO  - 2023-10-27 16:28:44.742; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:28:44.747; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 16:28:45.745; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:45.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:45.755; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.840 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 30 C6 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:29.000 UTC",
#     "not  after"         : "2024-01-25 16:28:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#         0010: 1E AF A5 1D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.848 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 A7 B3 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:21.000 UTC",
#     "not  after"         : "2024-01-25 16:28:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.875 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.294 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.294 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.296 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.296 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.325 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "03 5B AB CA 87 32 4D 5D E7 F4 86 97 7A 16 29 D8 92 A5 B2 7F B7 92 54 C1 D8 EE 24 7A AF F0 8D CD",
#   "session id"          : "04 38 C6 60 B4 52 1E 67 7C C8 45 CD 49 9D 0B 35 53 68 68 27 BA 14 4B 6F 01 19 CB DF 35 85 3B 1A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 8D 65 AF 3A 15 BA 80   69 E9 80 B2 5A 1B 4D 9B  ..e.:...i...Z.M.
#             0010: 80 E1 8A 10 CC 99 3D 73   5E 5E E6 F3 80 42 29 21  ......=s^^...B)!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.687 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B6 55 AF AA 58 7E E9 4B 01 13 6E AF B0 27 A2 22 54 0A 98 C5 89 52 28 72 8B F0 29 9E 70 62 AE 0A",
#   "session id"          : "04 38 C6 60 B4 52 1E 67 7C C8 45 CD 49 9D 0B 35 53 68 68 27 BA 14 4B 6F 01 19 CB DF 35 85 3B 1A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 80 59 5C 04 CC CF 12   88 97 89 8A F0 0F 88 36  ..Y\...........6
#           0010: 3E 17 1C 8F C9 53 0D B9   7E 7C F2 9A 94 5E BC 12  >....S.......^..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.688 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.688 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.710 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.711 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.712 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.715 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.715 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.718 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.718 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.719 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.719 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.731 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 C7 1C FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:25.000 UTC",
#       "not  after"         : "2024-01-25 16:28:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 97 B8 08 36 A9 28 90   84 D2 03 85 1C F2 12 CC  Y...6.(.........
#           0010: D0 33 94 12                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.731 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.788 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.788 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.789 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.789 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.815 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.817 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 83 81 DE 65 29 72 3A   FD BD 9F AB C8 FB 74 47  D...e)r:......tG
#     0010: 82 97 E3 96 96 E5 D5 C5   53 63 A1 CB 2C 2C 2F 18  ........Sc..,,/.
#     0020: ED 1F AE 21 03 30 C8 68   2A 67 90 1C BA ED 54 14  ...!.0.h*g....T.
#     0030: 20 CE FD A9 7F 11 53 7E   C8 D4 A7 2C DB E5 3F 45   .....S....,..?E
#     0040: 4C 14 F4 D2 A5 5D D4 93   A0 64 7E 33 1D 00 77 74  L....]...d.3..wt
#     0050: 56 E2 7E 00 CD 21 ED A3   4D 93 B3 3A 73 B0 B8 19  V....!..M..:s...
#     0060: 54 96 FC 27 C6 BC 2F 2D   4D 8F B2 9F 4D 6D 77 D3  T..'../-M...Mmw.
#     0070: 16 E7 B4 AD 56 0E 8F 4D   27 69 2D 82 38 13 79 ED  ....V..M'i-.8.y.
#     0080: 6A F1 F8 E4 ED F9 C4 3B   AC 5E 5C 35 7A 10 48 FD  j......;.^\5z.H.
#     0090: 04 40 C1 A4 5C BC 56 CD   2A 2C 72 CB 0F 3C C2 6C  .@..\.V.*,r..<.l
#     00A0: 64 9C 88 48 BE C4 3D 66   EA 17 B2 D3 C5 BE CD A5  d..H..=f........
#     00B0: E8 5C C6 36 30 CE A5 0A   C7 1A B4 5F 38 A9 E5 FA  .\.60......_8...
#     00C0: 77 30 0F 97 0A 30 76 52   E0 6F 1E A1 E4 2C 2B E6  w0...0vR.o...,+.
#     00D0: 79 6E 3B 10 CA 82 B3 D4   D5 D6 AC 42 F1 38 EE 20  yn;........B.8.
#     00E0: 74 A1 EE 23 8A CD 92 7D   8E C0 5C 09 EC 1F D5 AF  t..#......\.....
#     00F0: AD 81 10 B8 8C E7 48 F7   1B 18 2D 3B AD AE 55 E2  ......H...-;..U.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.818 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 75 F2 1B FD 6D A8 AA   63 04 78 1A 0B EA 60 A9  9u...m..c.x...`.
#     0010: 2A A2 ED 33 6C 80 66 78   84 2A E8 A0 3F 9E 3F C5  *..3l.fx.*..?.?.
#     0020: 85 09 DE DC 9D EA 6F D4   F4 6F B4 6F F1 FA AC 52  ......o..o.o...R
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.820 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.823 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 30 C6 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:29.000 UTC",
#       "not  after"         : "2024-01-25 16:28:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#           0010: 1E AF A5 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.844 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 3D FA 39 AF E0 35 A6   7A DC 3F 2C 45 7C 58 3A  2=.9..5.z.?,E.X:
#     0010: 83 8D 10 CF C0 03 BF 02   07 D2 7F 21 05 AF 99 77  ...........!...w
#     0020: 9A 11 65 96 8C F9 2A B3   2F 89 37 F2 B2 02 61 CA  ..e...*./.7...a.
#     0030: 21 81 C3 0E CA A2 95 0F   D3 B6 BF 33 12 C6 57 30  !..........3..W0
#     0040: 7C 18 1F D2 61 B7 40 74   BD 94 2E F7 20 2B 03 F2  ....a.@t.... +..
#     0050: C2 1B 75 88 39 51 AD 77   86 69 5B 9D 01 F8 B9 8D  ..u.9Q.w.i[.....
#     0060: 87 40 2E 81 BA 58 B6 95   4D E4 3D 10 EA 20 DF E0  .@...X..M.=.. ..
#     0070: 68 39 42 BC 1B 98 4C 82   B9 6E 53 27 1E E5 D3 BA  h9B...L..nS'....
#     0080: 43 02 73 91 FF E3 CA 3F   30 1C 54 2D F6 1C C4 AE  C.s....?0.T-....
#     0090: 74 5B 7F D3 38 93 AB D0   A2 FD 3E 8C A1 D8 F6 2C  t[..8.....>....,
#     00A0: 7F 36 EC A3 B5 20 BA A4   DC FB 25 EF CB 1B D1 D4  .6... ....%.....
#     00B0: E1 FD AC AD 6E 4E D2 39   16 7F C6 D1 FC 2D B2 8A  ....nN.9.....-..
#     00C0: 16 44 A8 B8 C6 F8 A6 AE   5D 62 BA C1 25 53 5A E0  .D......]b..%SZ.
#     00D0: 65 1D 29 2D D3 EF 34 10   21 0A 5D B4 CA 90 EF 2C  e.)-..4.!.]....,
#     00E0: F1 16 87 6F D3 E1 90 24   08 A0 40 DD CF 34 76 4B  ...o...$..@..4vK
#     00F0: 85 78 FF CF 2C C6 96 3B   64 80 25 31 79 68 84 A0  .x..,..;d.%1yh..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.845 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B D7 9B 90 38 3F D6 0B   91 F6 15 B7 BE 01 54 14  ....8?........T.
#     0010: 27 42 A1 37 FE E1 EB 9C   D7 F8 76 9F 02 12 5C 9B  'B.7......v...\.
#     0020: F1 65 98 F9 CD BF 1F 3F   45 EC 85 0D 55 8C 44 3D  .e.....?E...U.D=
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.846 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.911 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DD 65 DA D7 C3 05 D3 A7 50 3A 88 8B 24 D8 D8 5E EA E5 F7 45 A7 B2 7F 37 98 E8 D9 53 49 47 5C 45",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 16:28:47.152 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 16:28:47.153 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 16:28:48.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:28:48.277; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 16:28:48.588; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:48.590; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:48.591; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(ca,h=[localhost],a=[],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.626 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 30 C6 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:29.000 UTC",
#     "not  after"         : "2024-01-25 16:28:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#         0010: 1E AF A5 1D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.629 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 A7 B3 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:21.000 UTC",
#     "not  after"         : "2024-01-25 16:28:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.640 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.802 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.802 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.804 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.804 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.821 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E6 67 62 5E 94 49 FB 50 80 6E A2 2B 21 5A B7 BE 2B C6 F3 8C 45 5B 52 16 E8 D6 47 8A 02 00 BD 64",
#   "session id"          : "35 56 D2 B0 AF 0A 64 D3 EB 9C 11 C0 E3 E6 BD 74 3A CA 4D A6 C5 B8 6D 66 0B F7 D3 88 26 EB 37 6E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F7 3F 75 33 81 79 FF 70   BA 2E 4E 9D 00 9D 52 15  .?u3.y.p..N...R.
#             0010: 42 38 51 8E DD 62 34 8C   F8 46 E9 09 19 64 C5 15  B8Q..b4..F...d..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "91 D6 01 80 02 3A 8A 62 02 15 0F F9 67 F2 FF 8A 30 96 F1 40 95 11 6D 4D 12 50 A2 E3 D0 4F D8 F1",
#   "session id"          : "35 56 D2 B0 AF 0A 64 D3 EB 9C 11 C0 E3 E6 BD 74 3A CA 4D A6 C5 B8 6D 66 0B F7 D3 88 26 EB 37 6E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 93 BF F6 22 AD B9 B3 C1   00 0D 11 A3 F3 CF E5 90  ..."............
#           0010: D5 4E 33 1A 3B CA 8A AF   56 62 95 68 87 A0 75 65  .N3.;...Vb.h..ue
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.940 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.941 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.943 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.954 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.955 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.957 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 C7 1C FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:25.000 UTC",
#       "not  after"         : "2024-01-25 16:28:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 97 B8 08 36 A9 28 90   84 D2 03 85 1C F2 12 CC  Y...6.(.........
#           0010: D0 33 94 12                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.957 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.499 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.502 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 6C DD A4 E8 13 57 C3   C7 EC 84 DD 27 B2 7E 06  vl....W.....'...
#     0010: 5C DF 6C 93 90 51 1F 6A   2B EE 0D 89 86 87 BE 3F  \.l..Q.j+......?
#     0020: 17 1C 47 25 42 2D 84 73   DE 9D 78 D0 15 F6 9E 72  ..G%B-.s..x....r
#     0030: 20 AC F7 9B 55 2A 22 B7   F6 06 2E 67 0C A9 43 B8   ...U*"....g..C.
#     0040: F6 34 A2 70 B7 3C E8 37   82 04 09 3E 6E 06 64 67  .4.p.<.7...>n.dg
#     0050: B7 5F 92 38 59 98 08 7D   B8 C6 E7 E1 D5 D8 02 ED  ._.8Y...........
#     0060: A7 08 54 C5 77 82 81 01   FA 76 16 FC B3 36 65 15  ..T.w....v...6e.
#     0070: D4 08 F9 49 DA 74 6D DE   BD FB 77 E8 A7 2A BD 65  ...I.tm...w..*.e
#     0080: DF F5 60 2A 9E 45 E4 7C   8C 56 16 FB 47 67 F3 E9  ..`*.E...V..Gg..
#     0090: 48 92 42 F2 29 5C 06 0B   C3 8F 82 94 03 6B CB 7E  H.B.)\.......k..
#     00A0: 62 51 67 47 F2 8F 6C 1A   9E BD EF AC 4E C9 66 98  bQgG..l.....N.f.
#     00B0: 42 9F 81 FF E5 0B 17 37   1A 91 C0 69 4D 73 22 6F  B......7...iMs"o
#     00C0: FC 00 C3 AB 73 50 9D B3   56 EF C6 C8 34 83 BF 47  ....sP..V...4..G
#     00D0: D7 64 DB 5C 3A BB 49 77   35 77 30 3B 1D 91 27 2E  .d.\:.Iw5w0;..'.
#     00E0: 5C DF 9D EA 03 6B 0D 26   56 FA C6 BC DE 9E 87 A6  \....k.&V.......
#     00F0: 96 E5 73 B0 CF 20 18 24   3B FB 39 1F 52 4B D4 FB  ..s.. .$;.9.RK..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.504 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B6 07 93 7F 3C D8 9F 37   31 E8 0F 40 83 32 50 80  ....<..71..@.2P.
#     0010: 27 24 CE 80 EA F6 A2 D7   0C AB 2E CB 6A B0 3C E8  '$..........j.<.
#     0020: D2 83 F4 96 10 6C 04 D1   B9 E5 8D 9F 62 CF 6B CB  .....l......b.k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.505 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.507 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.510 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 30 C6 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:29.000 UTC",
#       "not  after"         : "2024-01-25 16:28:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#           0010: 1E AF A5 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.531 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 42 C5 BC A0 C6 B0 EF   73 3A D2 9A 73 72 C9 7D  xB......s:..sr..
#     0010: 70 EF 92 45 AE 7C 5B 6C   92 5F 2F 7F 44 6F 69 15  p..E..[l._/.Doi.
#     0020: 7D 84 92 81 82 E9 9E 80   43 FF 31 62 04 1E 71 5F  ........C.1b..q_
#     0030: 55 9B 42 17 83 8C 7A 6C   3C BF 5F CD 63 94 E6 B6  U.B...zl<._.c...
#     0040: 01 E4 ED D1 BE 96 80 44   0F 94 29 BB DB 7E 67 AD  .......D..)...g.
#     0050: B3 82 C4 4E 07 3E F0 1A   B8 35 E5 D4 00 48 FE 92  ...N.>...5...H..
#     0060: 7B 39 C3 11 45 83 51 6D   E4 87 65 09 9B 0F C8 24  .9..E.Qm..e....$
#     0070: 47 B9 8C D4 72 16 7C 74   B7 78 A1 F2 CE 60 53 FA  G...r..t.x...`S.
#     0080: A2 71 DE 0F 05 D4 E7 25   C7 1D 35 C9 B9 57 45 FB  .q.....%..5..WE.
#     0090: E0 1C D3 F1 61 15 93 1E   0B 21 9C 2D 7A EB 11 D5  ....a....!.-z...
#     00A0: 21 02 9A CD 43 1F E0 1A   EF E2 C0 DD 56 28 37 03  !...C.......V(7.
#     00B0: 0C 15 A9 8A B8 29 8A E5   0B 50 4B B2 EA 49 35 37  .....)...PK..I57
#     00C0: 3F 9E DC BC 24 20 6B 60   AF 44 A2 59 40 BE 65 28  ?...$ k`.D.Y@.e(
#     00D0: 18 18 1D B9 B1 EB DC 62   0F 87 2B C3 B7 35 EC 02  .......b..+..5..
#     00E0: D9 AF 1D 82 B9 27 D3 FE   85 7B 35 CA 4E 09 52 82  .....'....5.N.R.
#     00F0: 8A AC 57 E9 C7 E5 4F B0   CB C0 5A A5 C5 ED B6 B3  ..W...O...Z.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.532 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C 34 03 65 08 71 BA CA   AE 40 9F FE 41 27 E7 34  <4.e.q...@..A'.4
#     0010: 31 6B 5D 3C D9 E3 04 FA   12 3E EB AA 5E 1A 29 64  1k]<.....>..^.)d
#     0020: 05 03 E4 EA EB EA 72 0D   7A EF AC FD 0D F0 DE 8A  ......r.z.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.533 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.590 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "17 BA 21 2B 14 52 65 A0 F4 3E F4 E6 6B A3 8E E2 59 F9 50 65 D4 BF 49 74 FC D5 26 03 C8 FD 40 66",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 16:28:49.832 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 16:28:49.833 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 16:29:02.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 16:29:03.314 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 A7 B3 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:21.000 UTC",
#       "not  after"         : "2024-01-25 16:28:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 16:29:03.325 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.561 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.563 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.563 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.567 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.579 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D6 6D 25 93 60 E0 FB 03 63 90 64 AF 22 C2 0E 2F 2B FF 91 5A 62 06 F5 81 1E 4F 1F 6D 0E 91 84 5B",
#     "session id"          : "83 67 8C 4A D4 A5 39 3F 8A 9D 8A A8 CA 3B 35 63 EE A9 53 C9 D7 4B 1C 45 3B C6 1D 67 DB F0 45 6F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3B EE 46 AD 53 94 61 6E   40 E8 73 BE 1A 8E 7B EE  ;.F.S.an@.s.....
#               0010: E0 22 01 59 99 40 39 BE   28 B3 99 A0 7D 8C 16 25  .".Y.@9.(......%
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.595 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "32 0B 92 F0 2E 42 AF 18 13 B4 3D E0 56 6C 0F 00 D1 63 45 AF B9 36 42 B6 52 45 EC A0 DB 3C 75 F4",
#     "session id"          : "83 67 8C 4A D4 A5 39 3F 8A 9D 8A A8 CA 3B 35 63 EE A9 53 C9 D7 4B 1C 45 3B C6 1D 67 DB F0 45 6F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 49 5F 14 48 41 43 D3 50   2F 5B AD 58 02 2A AF 69  I_.HAC.P/[.X.*.i
#             0010: C8 2A 2C B2 96 8C 47 1D   F1 20 F6 43 4B 3C C3 66  .*,...G.. .CK<.f
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.596 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.598 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.598 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.610 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.611 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.612 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.618 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.619 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.619 UTC|SSLExtensions.java:215|Ignore impact of

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:30:15.540 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43612/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14034ms
ok 78 stop command for single port in 17277ms
ok 79 status detects locally running solr in 8913ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7666ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 984ms
ok 82 listing out files in 2870ms
ok 83 copying files around in 6150ms
ok 84 upconfig in 2463ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1220ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1219ms
ok 87 Cleanup in 1959ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 33s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7eofzritbgbuy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8259 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8259/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37031/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 12:58:04.632; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:58:04.636; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:37031/solr] to [https://127.0.0.1:37031].
# WARN  - 2023-10-27 12:58:05.770; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 12:58:05.820; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16272ms
ok 74 start solr with client truststore and security manager in 19120ms
not ok 75 start solr with mTLS needed in 53933ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lxoFfn/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 37031 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37031 (pid=3786610). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 37032 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37032 (pid=3786717). Happy searching!
#
#     INFO  - 2023-10-27 12:59:06.582; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:59:06.597; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:59:07.962; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:07.964; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:07.965; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(ca,h=[localhost],a=[],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.031 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F 16 8A BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:52.000 UTC",
#     "not  after"         : "2024-01-25 12:58:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#         0010: FC F6 4D 89                                        ..M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B F2 AD F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:44.000 UTC",
#     "not  after"         : "2024-01-25 12:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.050 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.251 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.251 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.267 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.267 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.286 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.324 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8A 2A 4D DF 3B 8C EE 40 00 80 B5 54 91 76 A3 D4 14 1F FC 15 D5 EE 2E 0D A9 F2 68 92 CD FA 70 02",
#   "session id"          : "74 44 7B 69 75 E5 6A 5B 89 96 A8 3F F8 4B D6 36 34 CE 7B 5B C9 DF 34 1D 34 1C 0E C8 C4 8B D9 F0",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1E EA A6 2A 0D D1 6D 3E   2B FD 79 04 F4 F1 2B 0D  ...*..m>+.y...+.
#             0010: 5E C5 78 06 C6 AD A1 CB   2B 88 C6 F9 45 14 60 21  ^.x.....+...E.`!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.862 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0E 88 DE 94 7F 4D 62 8C EF 5C CD 27 F3 AC 91 57 DC A7 C8 41 3C 8F 4F F7 62 4D B0 C0 CE 66 35 D5",
#   "session id"          : "74 44 7B 69 75 E5 6A 5B 89 96 A8 3F F8 4B D6 36 34 CE 7B 5B C9 DF 34 1D 34 1C 0E C8 C4 8B D9 F0",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A9 84 8B A9 35 41 0E 70   B8 B1 87 F9 CE 8D E9 66  ....5A.p.......f
#           0010: 37 E5 13 8B 2C A8 F0 25   3D 6A F7 74 70 CD 32 1A  7...,..%=j.tp.2.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.862 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.868 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.870 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.870 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.887 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.892 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.895 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.910 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 F8 FE 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:49.000 UTC",
#       "not  after"         : "2024-01-25 12:58:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 B2 16 B5 CD 1C 9A 0E   E8 D8 82 18 E2 18 D8 C8  ................
#           0010: 3C A2 3F 85                                        <.?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.910 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.001 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.010 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 17 8A 94 5C F5 A8 E6   84 E1 D3 70 A0 0E D4 FC  r...\......p....
#     0010: 2D 3F 93 A7 53 9C 56 44   2D C2 D6 A3 27 4D BF AF  -?..S.VD-...'M..
#     0020: 40 9A 6E DC A3 89 AF 97   F1 3C 8D D6 DA BB 03 08  @.n......<......
#     0030: F1 6D 52 1C 42 1A 95 9C   F2 C0 34 6E 81 C8 E3 A4  .mR.B.....4n....
#     0040: 61 D7 AF F7 25 5A C7 E0   B2 3B 4B E4 EB 50 24 54  a...%Z...;K..P$T
#     0050: B0 13 6D 46 CA 46 80 AE   56 D7 52 86 80 AD D1 4D  ..mF.F..V.R....M
#     0060: 0A 19 72 B1 56 5F 96 44   7A DD E5 3F 29 BF B7 5A  ..r.V_.Dz..?)..Z
#     0070: B8 7C 5D 0C 79 1C 3B 19   47 3C AF 4C E5 F7 67 1D  ..].y.;.G<.L..g.
#     0080: 5A E1 C4 C4 FD D5 29 16   2C 52 99 CF 2E 82 FD 9D  Z.....).,R......
#     0090: CB 60 67 17 87 44 31 09   23 D7 71 88 4B 68 6B 25  .`g..D1.#.q.Khk%
#     00A0: DB A8 1B 08 72 FF 25 0D   8F 7C 02 26 83 4B 37 37  ....r.%....&.K77
#     00B0: 2B F7 D7 BF 76 1B 46 A9   B2 99 AB 24 E9 8F 1B 95  +...v.F....$....
#     00C0: 7E 90 5C EB 3E FD 3C 09   2F 48 46 8F 4F CE 41 2F  ..\.>.<./HF.O.A/
#     00D0: 8A 7B 4E C5 23 59 58 16   DC 58 22 B0 81 16 AA 1F  ..N.#YX..X".....
#     00E0: C0 0A 0C 64 08 D2 5A EA   32 B0 E8 E7 54 53 E6 4D  ...d..Z.2...TS.M
#     00F0: 6F 89 D8 6F 3E 9F 0E B8   54 F1 AA B2 65 49 E3 56  o..o>...T...eI.V
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.012 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 63 97 4F EF D4 B0 FC 2D   6C 2F E8 44 A0 FC 36 C5  c.O....-l/.D..6.
#     0010: 75 57 87 A2 54 29 DA C4   CF F2 55 00 E6 09 B5 80  uW..T)....U.....
#     0020: 07 24 C2 A9 36 4D D0 E3   35 12 76 DD 01 24 FD A9  .$..6M..5.v..$..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.016 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.018 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.018 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.021 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F 16 8A BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:52.000 UTC",
#       "not  after"         : "2024-01-25 12:58:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#           0010: FC F6 4D 89                                        ..M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.066 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C 1C E3 46 6B E6 85 30   C6 C3 25 E2 26 57 0E 3D  l..Fk..0..%.&W.=
#     0010: E6 24 EE AB D8 B6 31 E2   2F 7B 9A AE 00 FE 21 E9  .$....1./.....!.
#     0020: CE 4F 12 02 AC 7C 9C F7   95 51 F7 49 34 E7 4C F0  .O.......Q.I4.L.
#     0030: 8D 65 35 08 E3 55 FC 65   DD D2 2A C8 BB 80 E7 96  .e5..U.e..*.....
#     0040: A7 EC 61 23 FC 18 74 EF   74 68 77 83 AB D0 48 05  ..a#..t.thw...H.
#     0050: 9B 23 4D C3 6E A2 D2 30   C4 F9 62 8A 30 15 F6 7F  .#M.n..0..b.0...
#     0060: 04 CE 61 31 39 5B 35 47   9C A3 57 D0 BA EE FA 66  ..a19[5G..W....f
#     0070: BF 5E 76 F9 85 5C 94 20   34 60 42 D8 CF 70 D0 C0  .^v..\. 4`B..p..
#     0080: 23 EF DA B8 99 E1 29 E7   46 3B F3 75 DC 87 E4 21  #.....).F;.u...!
#     0090: FB DC 05 22 31 05 4F 4D   35 2D 6A B3 73 B9 F6 60  ..."1.OM5-j.s..`
#     00A0: CA 24 04 55 B4 FC FF F2   F2 70 BF EE 37 D1 F4 AE  .$.U.....p..7...
#     00B0: D1 93 AC 20 44 F3 14 07   F4 D2 EB 48 A4 15 AF 6C  ... D......H...l
#     00C0: 0F 27 2C DE 34 16 1D CA   DE F4 6A 10 C6 A5 3E 67  .',.4.....j...>g
#     00D0: 41 80 A5 7F E6 3B B1 B7   AA 37 01 53 F8 C2 8F AD  A....;...7.S....
#     00E0: 2A C7 9B 23 D6 FA FD 2A   E4 BC 82 4C D4 19 11 86  *..#...*...L....
#     00F0: EC 24 DD A4 94 A4 71 01   C9 6A 95 96 FF FF 80 F5  .$....q..j......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.067 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 23 9B EE A3 62 D8 76   E3 F6 B1 95 6F 16 06 80  .#...b.v....o...
#     0010: 68 25 60 F7 03 51 28 8C   B4 1E 8C E5 BD 0F 96 BF  h%`..Q(.........
#     0020: D4 29 0B FD 28 99 59 47   80 5E 2D D0 37 50 A7 9A  .)..(.YG.^-.7P..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.071 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.154 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7E E9 17 7F B5 6F 7F 69 30 74 E6 4C 03 2E 00 AF 8E 99 EA 16 C3 C7 A5 12 C9 63 96 DA 45 E7 FF F2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:59:09.863 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:59:09.863 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 12:59:10.746; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:59:10.749; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:59:11.060; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:11.062; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:11.063; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F 16 8A BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:52.000 UTC",
#     "not  after"         : "2024-01-25 12:58:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#         0010: FC F6 4D 89                                        ..M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.098 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B F2 AD F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:44.000 UTC",
#     "not  after"         : "2024-01-25 12:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.109 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.259 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.260 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.436 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E3 A7 B5 A4 1C 92 5D 8C C3 0E ED 53 24 1D AB D1 A2 8A 89 3D 39 33 A3 23 13 70 84 86 06 89 34 6B",
#   "session id"          : "65 D3 A7 57 14 64 7F 56 39 00 7A B3 ED 00 42 33 4F CA 90 01 35 D6 9D 39 56 26 95 3E F6 37 1B 81",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2A 16 B8 5F 28 D6 B8 3B   C3 DC D0 7E 8C 82 96 A6  *.._(..;........
#             0010: 1E EA 1D 44 0D 0F 7A B3   39 1A 33 D3 E3 24 D7 14  ...D..z.9.3..$..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 C4 0F 6F CD 40 1A 85 C5 7A 05 AB 9A 38 76 97 60 92 D5 0B 69 D1 1F 5C 8C 95 54 80 C7 FA F9 C7",
#   "session id"          : "65 D3 A7 57 14 64 7F 56 39 00 7A B3 ED 00 42 33 4F CA 90 01 35 D6 9D 39 56 26 95 3E F6 37 1B 81",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EA A1 09 C1 D9 77 C2 86   1F 38 B9 C4 5B 50 FF 3F  .....w...8..[P.?
#           0010: 40 9D A5 11 B2 E1 B2 6C   CA 76 3A E9 D3 F6 DA 6D  @......l.v:....m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.527 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.548 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.551 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.561 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.567 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.568 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.568 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.570 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 F8 FE 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:49.000 UTC",
#       "not  after"         : "2024-01-25 12:58:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 B2 16 B5 CD 1C 9A 0E   E8 D8 82 18 E2 18 D8 C8  ................
#           0010: 3C A2 3F 85                                        <.?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.570 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.619 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.621 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E EE 6E DF 90 3D 3E 99   C6 71 4C 5C 09 71 30 E2  ^.n..=>..qL\.q0.
#     0010: D7 08 B6 45 B2 11 60 39   C0 B8 D3 05 04 2D 87 D2  ...E..`9.....-..
#     0020: 33 E8 F2 A2 2D 58 CB 81   CD 31 44 B5 83 59 CB 4E  3...-X...1D..Y.N
#     0030: BF E4 09 17 79 09 0A 63   CB 21 F0 5C 9F FC 96 01  ....y..c.!.\....
#     0040: D4 77 91 05 80 46 53 1E   B3 0A D6 98 B1 4F FD 63  .w...FS......O.c
#     0050: 91 36 84 EE 1B 08 A5 68   AA 2B 8F 91 B7 D9 8E E8  .6.....h.+......
#     0060: 50 7D 61 FF 94 35 4F 94   8E 55 B9 F6 A2 09 D2 8A  P.a..5O..U......
#     0070: E8 D9 30 F9 97 10 4A 32   9E E4 7B F1 1B 29 A1 9A  ..0...J2.....)..
#     0080: 58 90 3B BA CA 4A DE F3   4D 00 47 8F 54 B0 D7 9E  X.;..J..M.G.T...
#     0090: 83 FB C7 A3 19 6A 55 17   6C 57 2F 86 95 B6 E1 AA  .....jU.lW/.....
#     00A0: 5B 30 D5 DE F1 5D 0B 70   1E D1 0E 72 EA 40 0E 00  [0...].p...r.@..
#     00B0: 9B 69 DE 01 0D 7A 16 42   12 2A C3 D7 AF A6 A4 79  .i...z.B.*.....y
#     00C0: 4A 12 CC B1 37 79 06 14   9C F2 71 A5 4B 17 8E B1  J...7y....q.K...
#     00D0: 12 66 BB 45 29 92 AB 51   C2 28 79 80 7A D6 D9 25  .f.E)..Q.(y.z..%
#     00E0: BC D8 FC A7 0D C7 B6 4B   0E A2 17 4B AF B5 1B B2  .......K...K....
#     00F0: 8E AD 5D F4 5C 24 0F 9F   37 75 9F 67 49 1C BA BE  ..].\$..7u.gI...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.623 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 A4 33 25 51 7D D0 F3   D6 0C A0 C3 71 42 60 2D  ..3%Q.......qB`-
#     0010: 6F B0 31 02 C6 F8 85 CD   14 86 99 AD CD 9C A2 7C  o.1.............
#     0020: 49 44 23 C5 8D BD EC DD   D2 EF B6 96 DD BD 46 3C  ID#...........F<
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.625 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.627 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.627 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.629 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F 16 8A BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:52.000 UTC",
#       "not  after"         : "2024-01-25 12:58:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#           0010: FC F6 4D 89                                        ..M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.652 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 C6 5F C6 8C FA BA 40   CB 0F 54 47 84 10 67 5E  .._....@..TG..g^
#     0010: 5F 95 A0 B1 6D EB 5C 26   4F 1B A7 16 0D 80 1C C9  _...m.\&O.......
#     0020: 0B A8 8E BB F5 92 AE DC   88 1C 85 28 8A 7F C2 6F  ...........(...o
#     0030: D6 69 78 4A ED 11 E1 89   98 53 8A C0 3E C6 5B 42  .ixJ.....S..>.[B
#     0040: 3D 1C 43 FB B3 08 76 27   FB DB A9 15 8B 37 B3 47  =.C...v'.....7.G
#     0050: 81 26 30 E2 F3 46 74 83   2B 55 0E 45 7B E3 EF 23  .&0..Ft.+U.E...#
#     0060: 5B 0A E0 A5 13 9E 31 24   57 F7 20 06 1C 9A 03 3B  [.....1$W. ....;
#     0070: 66 29 C3 55 E7 5F 9D EE   D7 11 4A 6C 43 E8 CE C2  f).U._....JlC...
#     0080: 7A 90 37 DD CD 46 E0 2C   4E 79 C2 EE A5 70 C5 6F  z.7..F.,Ny...p.o
#     0090: 5D 3C B6 EC 7B 88 5E C1   34 5A C0 BC DD 20 F2 BF  ]<....^.4Z... ..
#     00A0: 3F 13 52 60 05 63 A5 53   C5 E0 CF F6 7C 5B 6C D5  ?.R`.c.S.....[l.
#     00B0: D2 48 1D E4 9C B5 CF F8   F0 8C E4 B0 76 A2 11 49  .H..........v..I
#     00C0: 5D 15 0B EA F6 E6 D6 E0   30 EE A3 01 66 7A 29 BE  ].......0...fz).
#     00D0: A3 F5 26 62 73 12 E6 C1   AB 8B BE 98 66 41 75 D8  ..&bs.......fAu.
#     00E0: 4D 5C 54 94 5A 93 95 82   93 02 03 A3 CF 24 48 D0  M\T.Z........$H.
#     00F0: BF 98 CE BF B0 B3 96 38   32 82 D6 35 6C DB 4A 12  .......82..5l.J.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.653 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 36 AB 05 BF E5 BA 30   FF FD 14 4B 17 02 A8 66  .6.....0...K...f
#     0010: EA 14 42 C5 EA 0D 51 A4   2E DC 9B 46 F7 CA C1 FB  ..B...Q....F....
#     0020: AC B9 5F DB 8B E8 C9 E7   64 1A DB A7 4B CB 6E 99  .._.....d...K.n.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.653 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.715 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3A BD E2 8E BE 63 37 45 E3 36 06 98 7C 45 94 83 68 1C 76 E6 E1 2D 4E AF 46 A1 B5 43 B5 B7 A2 CE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:59:12.250 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:59:12.251 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.281 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 12:59:24.979; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:25.409 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B F2 AD F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:44.000 UTC",
#       "not  after"         : "2024-01-25 12:58:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:25.421 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.700 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.701 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.702 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.705 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.714 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.715 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.716 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6E E7 24 5A E4 6B B1 0A 82 CD 80 9C 1F 12 6E 8A 65 4E CB 7E 17 02 9C 47 82 BB 7A 57 A7 26 46 CA",
#     "session id"          : "26 9D DA BA B6 77 A1 AB C3 3E D3 51 6F 9E 17 36 42 7F 30 A4 98 5D 57 21 4F 25 A6 AA 55 AE 77 AC",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 09 9D E7 29 0D 3D B6 26   3A 7F 02 CF 87 C7 92 90  ...).=.&:.......
#               0010: BB 56 67 90 2F C2 9A EC   45 69 6A A3 8B 7F 87 28  .Vg./...Eij....(
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.728 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "41 D4 A1 18 27 F8 CA 79 9E 7E 25 F4 7C EB 32 AB 6D 4B 6D F3 1E 2F B5 2E 7F 9F 30 C6 8B C5 00 8A",
#     "session id"          : "26 9D DA BA B6 77 A1 AB C3 3E D3 51 6F 9E 17 36 42 7F 30 A4 98 5D 57 21 4F 25 A6 AA 55 AE 77 AC",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA BF DF 9E F8 A3 E7 F7   18 65 8B 9E 29 4F 59 F2  .........e..)OY.
#             0010: F0 74 FE D5 41 80 E4 76   41 F1 F4 B4 99 68 31 24  .t..A..vA....h1$
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.739 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.740 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.741 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.746 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.746 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.747 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.747 UTC|SSLExtensions.java:215|Ignore impact of unsupported extensio

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 13:00:43.523 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37032/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14635ms
ok 78 stop command for single port in 17649ms
ok 79 status detects locally running solr in 8828ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7196ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 991ms
ok 82 listing out files in 2866ms
ok 83 copying files around in 6202ms
ok 84 upconfig in 2485ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 87 Cleanup in 1988ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 44s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/er3lvrdtfmt7m

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8258 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8258/

All tests passed

Build Log:
[...truncated 1160 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40949/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 09:39:28.468; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:39:28.473; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40949/solr] to [https://127.0.0.1:40949].
# WARN  - 2023-10-27 09:39:29.308; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 09:39:29.364; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17189ms
ok 74 start solr with client truststore and security manager in 19214ms
not ok 75 start solr with mTLS needed in 53721ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-oWgAsW/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40949 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40949 (pid=3436441). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40950 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40950 (pid=3436563). Happy searching!
#
#     INFO  - 2023-10-27 09:40:31.544; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:40:31.548; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 09:40:32.614; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:32.616; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:32.617; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.652 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 FF 2D BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:17.000 UTC",
#     "not  after"         : "2024-01-25 09:40:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#         0010: 6C 66 DB 91                                        lf..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.656 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 CD 5B E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:08.000 UTC",
#     "not  after"         : "2024-01-25 09:40:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.668 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.186 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.186 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.190 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.191 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.196 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.211 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.211 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.214 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.219 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD F0 EC 04 B6 F6 C3 3C EB E8 26 77 E5 EC FD 6F 8B AA D4 C4 7E 55 F8 0C 5E 74 54 62 3D E3 DE 4D",
#   "session id"          : "5D 1E C0 E9 24 7F 71 23 B5 A4 03 0A 2F 73 16 DC A4 CC 25 E9 2F 2D 69 B1 49 03 42 38 8B 3D 27 E8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC 2A A7 CE 9A 4E 10 DB   68 C5 28 16 6A CC 4E 05  .*...N..h.(.j.N.
#             0010: D8 AD C5 8F 3B 14 1C 5A   57 21 BA 4E B9 0C 9C 4F  ....;..ZW!.N...O
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F 46 08 8C 62 55 33 16 A9 81 5A F0 63 FD ED 17 BE 86 92 07 01 59 0A 84 B1 95 EF E3 20 F6 A2 04",
#   "session id"          : "5D 1E C0 E9 24 7F 71 23 B5 A4 03 0A 2F 73 16 DC A4 CC 25 E9 2F 2D 69 B1 49 03 42 38 8B 3D 27 E8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 11 B0 31 3B 9A 43 86 21   1F 45 96 BD C2 58 25 CE  ..1;.C.!.E...X%.
#           0010: EC 72 4E 06 98 A8 C0 48   19 D5 2C 40 A0 82 88 1C  .rN....H..,@....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.402 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.404 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.405 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.419 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.421 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.424 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.436 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 C4 25 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:13.000 UTC",
#       "not  after"         : "2024-01-25 09:40:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 62 67 10 16 AE 5F 3A   E3 BC 9D D5 60 61 CE C4  .bg..._:....`a..
#           0010: AE EE 2F 08                                        ../.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.436 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.539 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.792 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D 8A 34 11 13 D5 82 91   DC 50 36 C2 62 3F 38 91  ..4......P6.b?8.
#     0010: E5 25 EE E5 F3 88 94 47   BA D4 87 A4 09 1E 3C 51  .%.....G......<Q
#     0020: 42 02 18 CB 7D B6 73 6D   42 A8 AC A5 11 E1 D1 28  B.....smB......(
#     0030: E6 83 90 1D 3A 8E C5 F0   20 40 B0 0A 9B 8E 55 00  ....:... @....U.
#     0040: ED 0E C3 D8 10 95 C6 4E   41 B4 86 4F 2D D8 27 B0  .......NA..O-.'.
#     0050: 8E 6C 9F EF 54 80 1E BD   78 E6 87 FE CB 1E CF 43  .l..T...x......C
#     0060: 79 4D 36 24 9A EB 11 F6   DC 45 8C 9D 80 CE 3C FF  yM6$.....E....<.
#     0070: 12 59 4B 3B AE 2B 46 F3   B2 D5 C3 D7 46 6A ED B5  .YK;.+F.....Fj..
#     0080: 4C 59 EC 65 17 D7 3E 95   31 F9 BE 2B 0D 5F 48 0B  LY.e..>.1..+._H.
#     0090: 42 70 25 09 A0 65 3C 8D   28 46 72 03 FA A2 68 53  Bp%..e<.(Fr...hS
#     00A0: 36 25 73 B2 8C EF 42 22   A9 ED 16 7E A8 C7 26 05  6%s...B"......&.
#     00B0: 6E 8E EF 08 8C 01 9C E1   77 B4 29 D4 68 9C 51 C1  n.......w.).h.Q.
#     00C0: B0 8F AA 07 B0 30 41 6F   A5 7B B8 9C B8 14 C8 C4  .....0Ao........
#     00D0: 3C 1D 9D 69 58 E6 F6 6A   43 E7 F0 A7 34 E8 57 0E  <..iX..jC...4.W.
#     00E0: 85 1A DD D7 34 17 C5 59   96 17 55 3D 18 E7 19 5D  ....4..Y..U=...]
#     00F0: FE 1A 22 78 76 A1 71 AE   2D F3 B9 02 4A 0B 6A 6F  .."xv.q.-...J.jo
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.794 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AD 26 FA 71 AF 9D 54 BA   84 EB 50 19 0A 76 31 BB  .&.q..T...P..v1.
#     0010: AA 9E 63 43 C4 E2 8D 24   88 A2 25 4A 20 99 57 B6  ..cC...$..%J .W.
#     0020: 3F 1B 70 C4 AB EC 30 21   99 4D 92 99 56 62 F8 30  ?.p...0!.M..Vb.0
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.823 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.830 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 FF 2D BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:17.000 UTC",
#       "not  after"         : "2024-01-25 09:40:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#           0010: 6C 66 DB 91                                        lf..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.901 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C 85 A2 74 33 32 F4 26   86 71 B8 3E D9 EB 63 41  <..t32.&.q.>..cA
#     0010: 8B F2 5C 1B 54 88 74 84   E3 0F 6C D0 B2 53 2C B2  ..\.T.t...l..S,.
#     0020: 0A CA 6C 81 D7 EA 53 A2   0C DF E8 AC 5D 26 E2 08  ..l...S.....]&..
#     0030: F4 DC D9 51 08 EE C9 4A   87 48 31 02 B2 B1 C1 F1  ...Q...J.H1.....
#     0040: 19 D2 9E 19 6D AC A3 29   CB 81 F3 9B D4 BC FD 79  ....m..).......y
#     0050: E0 27 B4 02 97 F3 8E D5   30 C1 4E BA 18 A1 59 7A  .'......0.N...Yz
#     0060: 1F FD D8 5C F5 5C 6A 4C   04 C6 34 67 A9 0A 81 07  ...\.\jL..4g....
#     0070: CA F0 66 48 02 47 E9 10   21 D3 05 62 78 50 FC 75  ..fH.G..!..bxP.u
#     0080: 87 86 20 4A B2 E2 6F 21   50 A8 82 DE 75 86 06 55  .. J..o!P...u..U
#     0090: EE 4D 58 7B 23 C6 F3 0D   62 04 9D D5 05 62 6B B2  .MX.#...b....bk.
#     00A0: 3B 87 4A 07 4D FC A4 D8   43 3B D7 05 52 B5 8C 5D  ;.J.M...C;..R..]
#     00B0: 31 25 2E 29 B0 CD 0B 50   89 50 0F 80 ED B9 6B F3  1%.)...P.P....k.
#     00C0: 91 C7 6E 86 98 21 4F FB   C9 1E 0D 81 97 BA 14 01  ..n..!O.........
#     00D0: CA 81 6A 74 CE B8 BC 77   DF A1 6F 67 F0 BE 6D 38  ..jt...w..og..m8
#     00E0: B8 72 EC 57 CA EC 6F 08   F9 BB EB 81 99 B7 EA 33  .r.W..o........3
#     00F0: 3E 97 48 59 36 7E BF 4E   31 7E C6 A5 6A 9D C6 D1  >.HY6..N1...j...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.905 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 4C 13 8E C0 66 44 4F   F9 D5 85 69 BE 83 05 97  OL...fDO...i....
#     0010: F4 14 78 7D 68 D9 41 70   A5 B8 D9 AA 59 28 50 B8  ..x.h.Ap....Y(P.
#     0020: 3D 23 38 81 0C B2 04 E2   27 7F F8 B2 58 21 06 26  =#8.....'...X!.&
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.909 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:34.005 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "51 5B 56 87 33 06 B5 9E AC 40 DA F7 A9 DB A2 74 9E 6D E7 35 D0 15 02 6B BD 66 8C 15 C7 0D C4 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-27 09:40:34.763 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 09:40:34.764 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-27 09:40:34.781 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-27 09:40:35.726; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:40:35.755; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 09:40:36.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:36.258; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:36.258; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.294 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 FF 2D BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:17.000 UTC",
#     "not  after"         : "2024-01-25 09:40:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#         0010: 6C 66 DB 91                                        lf..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.298 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 CD 5B E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:08.000 UTC",
#     "not  after"         : "2024-01-25 09:40:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.310 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.481 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.481 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.483 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.484 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.503 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F1 AC 03 5C 38 F3 A3 6A 0E BC 48 AA 9A 4E 4E FE 93 8D 8B F6 17 50 64 6B B9 66 0D DC EA C4 6A 27",
#   "session id"          : "4E AE D6 B4 E6 91 CA 04 67 0D 14 79 DA 05 F6 1F 80 06 D2 34 B1 50 37 B3 7D 70 B0 D2 2D D2 A6 5B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2A 35 C0 E8 FB 48 DA 5B   D1 0B 8A 2C 86 89 DE 83  *5...H.[...,....
#             0010: 0E 43 F7 8F 6A 80 B8 BF   E6 2C B0 48 C0 54 1B 67  .C..j....,.H.T.g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A7 35 99 21 F8 EE 88 68 7F 88 97 15 B0 9A 40 34 13 DA AB 92 D3 0B 63 F5 2C C8 32 F2 31 B3 61 78",
#   "session id"          : "4E AE D6 B4 E6 91 CA 04 67 0D 14 79 DA 05 F6 1F 80 06 D2 34 B1 50 37 B3 7D 70 B0 D2 2D D2 A6 5B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 98 3D 26 A4 B9 72 25 CF   80 7F 6B AA 12 6E 4B 30  .=&..r%...k..nK0
#           0010: F0 A4 37 75 18 ED 03 2B   54 99 2C E9 E4 78 B6 70  ..7u...+T.,..x.p
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.650 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.651 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.680 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.681 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.682 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.685 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.687 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.698 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 C4 25 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:13.000 UTC",
#       "not  after"         : "2024-01-25 09:40:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 62 67 10 16 AE 5F 3A   E3 BC 9D D5 60 61 CE C4  .bg..._:....`a..
#           0010: AE EE 2F 08                                        ../.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.698 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.759 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.762 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E B0 0F EE 1B E2 12 01   47 5C 6A 2D 7B 8B D9 44  n.......G\j-...D
#     0010: F0 1F C5 BA 94 79 82 F3   59 0A 3D 9E 16 BE C2 C9  .....y..Y.=.....
#     0020: 6C 3A 5B 0A 72 EB 1B E1   75 72 3F 9C 69 CE CC 86  l:[.r...ur?.i...
#     0030: 61 F4 87 B8 DB E7 91 9E   6B 8B 65 B2 82 D2 75 DE  a.......k.e...u.
#     0040: 0F 33 EC 8F 96 17 CA C1   B6 F6 7C 73 71 BF 58 35  .3.........sq.X5
#     0050: C9 4D 0C 4D 8F D6 4F F8   91 D9 A7 85 6E CC E9 2D  .M.M..O.....n..-
#     0060: DA 25 9F 2D 2A 94 1B C3   94 DF 88 06 40 BF 2E 22  .%.-*.......@.."
#     0070: AB 05 25 93 86 1C 69 A1   72 42 7E 98 67 11 3C C9  ..%...i.rB..g.<.
#     0080: 64 8E F4 DF 66 E1 2E D0   D0 48 29 5A FF CD 10 57  d...f....H)Z...W
#     0090: 71 F6 19 7B 73 59 1F 68   50 D7 21 CA B9 A8 80 DD  q...sY.hP.!.....
#     00A0: E3 CE B0 29 D2 36 7D F3   98 79 B8 C5 02 81 42 26  ...).6...y....B&
#     00B0: D6 82 91 7C C9 40 B6 95   85 D0 EF 39 EF 75 56 75  .....@.....9.uVu
#     00C0: C8 7E A7 B5 53 66 EE 04   15 71 94 BE 72 F7 22 ED  ....Sf...q..r.".
#     00D0: AD F6 0F 85 AC E6 6C 98   6A 79 92 86 41 DB ED 20  ......l.jy..A..
#     00E0: A2 1A EE 5B 2A 55 50 FF   43 BA A8 DD 09 89 F7 B4  ...[*UP.C.......
#     00F0: 74 DE 21 90 1A 3A 48 CF   70 49 0B 2D 6A 49 79 86  t.!..:H.pI.-jIy.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.764 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A2 33 6E 67 33 B4 2B 5D   0A F7 7B 47 89 CF F6 46  .3ng3.+]...G...F
#     0010: 7F 40 30 70 AE 12 6F 47   94 B7 A3 23 54 93 1A 1D  .@0p..oG...#T...
#     0020: 6E 2E 78 7E 15 59 BA 50   34 61 59 B3 7E 27 07 BB  n.x..Y.P4aY..'..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.765 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.766 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.768 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.769 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 FF 2D BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:17.000 UTC",
#       "not  after"         : "2024-01-25 09:40:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#           0010: 6C 66 DB 91                                        lf..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.794 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C2 0F 7D 4A 3B 5D 7C 46   38 39 FF D6 40 67 F0 96  ...J;].F89..@g..
#     0010: 48 9D 72 1A 01 77 A7 F9   B4 03 E6 6F 44 CF B3 01  H.r..w.....oD...
#     0020: A3 B3 1D DD EB 11 59 EB   DC 0A A0 56 62 63 9A 1B  ......Y....Vbc..
#     0030: 00 52 74 C2 94 D3 CA 43   46 67 7B 83 17 03 2A D2  .Rt....CFg....*.
#     0040: 89 37 AD 99 D5 E7 25 23   B4 1D CF 6C 4B A3 C8 5D  .7....%#...lK..]
#     0050: DC 78 B2 0A B1 CC EC 30   EF 37 33 1B 84 1D BD 18  .x.....0.73.....
#     0060: 08 E9 6B 28 24 65 86 B7   41 D2 63 92 91 10 E2 B0  ..k($e..A.c.....
#     0070: AC 24 AD 62 F1 55 FA 3F   7A 84 DC 54 CE D6 C8 69  .$.b.U.?z..T...i
#     0080: D6 BE 44 3A FC 5A 72 48   FE D1 0A 77 44 C4 9D 5D  ..D:.ZrH...wD..]
#     0090: 8F A7 87 F0 9A 46 D6 85   51 C6 5C 8D A7 C8 33 32  .....F..Q.\...32
#     00A0: BC EF CC CF 8E 65 1E C1   EE 2E 90 D2 E2 C0 C3 92  .....e..........
#     00B0: F3 C5 08 38 3A 40 C8 EB   7B C2 9E 6D 14 72 25 2A  ...8:@.....m.r%*
#     00C0: 72 B3 03 50 01 F5 A2 05   33 36 A3 55 C4 69 4C D8  r..P....36.U.iL.
#     00D0: 87 38 62 B0 57 5E 1D CD   87 62 A4 42 B7 FD 60 40  .8b.W^...b.B..`@
#     00E0: 15 B6 B2 EE 24 67 97 36   FE A0 96 E5 85 96 9B A6  ....$g.6........
#     00F0: 6F F1 11 6D 90 3D 3D B0   75 96 21 80 BF 74 BF 30  o..m.==.u.!..t.0
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.795 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 D1 39 CC 3D A2 A6 64   5D A1 6A B3 56 2C 1D B8  ..9.=..d].j.V,..
#     0010: C2 5A 8F 83 1D 22 D0 2F   06 5A F4 79 E8 75 5B DE  .Z..."./.Z.y.u[.
#     0020: F3 ED FE A6 84 8F 90 19   C6 BF E9 35 40 0E B3 24  ...........5@..$
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.796 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.996 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 91 C4 CF 5A 9D 40 E7 86 42 11 20 FC B7 A8 2F D9 DA 30 39 5B 00 1B A3 EB 12 3C 04 0C 31 1A F7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.277 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-27 09:40:37.325 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 09:40:37.326 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 09:40:37.326 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-27 09:40:50.495; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:50.812 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 CD 5B E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:08.000 UTC",
#       "not  after"         : "2024-01-25 09:40:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:50.825 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.105 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.107 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.107 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.112 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.125 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "73 63 1D 17 A9 27 A1 C5 17 97 41 0E 47 69 E9 D9 FA 9A C0 97 CC 26 0D B6 46 E3 D4 AE B2 A3 0D AD",
#     "session id"          : "CE D1 FD 3A 3A FD B0 D2 A1 0D 86 16 66 5A 9E 8B 43 4D F5 98 15 79 E6 41 0F AE 65 FE 58 D7 A4 FD",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 68 CB 19 1A 52 A9 7A F0   E3 10 50 77 E3 E4 7C 59  h...R.z...Pw...Y
#               0010: E1 FF 3D 9B A9 00 16 54   11 FB 6A 38 0E 9C 1F 24  ..=....T..j8...$
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "ED 0F 00 E8 4E 39 8C A2 73 2B D6 46 53 34 B4 02 91 88 DD 6A B4 32 8A AE 76 C7 E6 A7 D1 E6 87 C3",
#     "session id"          : "CE D1 FD 3A 3A FD B0 D2 A1 0D 86 16 66 5A 9E 8B 43 4D F5 98 15 79 E6 41 0F AE 65 FE 58 D7 A4 FD",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 70 3A 62 10 8B 69 36 26   39 C8 3D 2F 76 5B BB 03  p:b..i6&9.=/v[..
#             0010: 0F 22 85 F7 5D A9 6D C0   E5 58 C1 7C 44 30 A1 34  ."..].m..X..D0.4
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.166 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.167 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.168 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-

[...truncated too long message...]

jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:42:06.562 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40950/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 15077ms
ok 78 stop command for single port in 17850ms
ok 79 status detects locally running solr in 9424ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7443ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1087ms
ok 82 listing out files in 2941ms
ok 83 copying files around in 6571ms
ok 84 upconfig in 2780ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
ok 87 Cleanup in 2046ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/eb2ykhxjjvic6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8257 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8257/

All tests passed

Build Log:
[...truncated 1161 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35553/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 07:12:27.227; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:12:27.232; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35553/solr] to [https://127.0.0.1:35553].
# WARN  - 2023-10-27 07:12:28.049; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 07:12:28.087; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17325ms
ok 74 start solr with client truststore and security manager in 19342ms
not ok 75 start solr with mTLS needed in 54773ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-D1FDga/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35553 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35553 (pid=3139783). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35554 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35554 (pid=3139910). Happy searching!
#
#     INFO  - 2023-10-27 07:13:30.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:13:30.837; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 07:13:32.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:32.183; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:32.185; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.234 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 18 DA DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:16.000 UTC",
#     "not  after"         : "2024-01-25 07:13:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#         0010: 07 D7 E9 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.238 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 77 68 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:07.000 UTC",
#     "not  after"         : "2024-01-25 07:13:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.250 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.893 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.897 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.897 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.906 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.927 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.928 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.928 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.932 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 65 4E 01 79 DB 4A B5 5D 56 7F B8 00 FA C9 70 A4 55 BC 58 39 EA 0E 58 08 42 50 E9 2C 6A 44 2A",
#   "session id"          : "6E 3D 4D DF B7 DB DD DB 0F E1 EB 45 61 92 46 BE B8 D3 02 AD 22 00 BA 21 ED 90 91 AC 79 77 77 95",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 90 A0 5E 68 34 00 E1 29   96 81 01 8A 3E 1B C4 39  ..^h4..)....>..9
#             0010: AD 1E CF 1E A9 7A F7 04   17 58 D0 43 99 34 63 33  .....z...X.C.4c3
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.103 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B0 A2 62 FF B8 A9 C8 D0 72 AC E7 AA CF 77 20 49 70 55 CA 1C 80 9B BC A4 52 30 7A 7D 85 37 F7 73",
#   "session id"          : "6E 3D 4D DF B7 DB DD DB 0F E1 EB 45 61 92 46 BE B8 D3 02 AD 22 00 BA 21 ED 90 91 AC 79 77 77 95",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D5 9D 0E 8E A3 9A AC 10   60 9C 87 2F 5A B8 A7 17  ........`../Z...
#           0010: DE 40 9B 58 B1 35 3F 76   18 86 54 96 FE EE EC 76  .@.X.5?v..T....v
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.103 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.104 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.152 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.154 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.167 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.179 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.203 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.204 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.204 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.208 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 D0 60 BA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:12.000 UTC",
#       "not  after"         : "2024-01-25 07:13:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 DC 1C E0 C4 16 03 09   41 BD 80 A1 B4 C8 14 FD  ........A.......
#           0010: DB 55 09 91                                        .U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.208 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.310 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.317 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 F8 0C 00 94 9B C7 26   A8 AC C6 D8 CA E8 20 9B  "......&...... .
#     0010: 76 46 E5 AB D7 DA 49 98   ED 99 3F 6E 4D 0E A2 F3  vF....I...?nM...
#     0020: 9F C9 35 CA 83 D5 17 61   D9 46 D8 9A 14 A9 C5 F5  ..5....a.F......
#     0030: 9A C1 93 4F 54 0C 2F 63   1D 92 F4 AD 64 9D FA 84  ...OT./c....d...
#     0040: 9B 59 63 03 C1 0D EF 25   B3 E0 BB 64 E3 76 52 DA  .Yc....%...d.vR.
#     0050: BD C9 97 EA 90 67 1E 37   52 0A AE EA 92 32 DF 89  .....g.7R....2..
#     0060: 88 2C 6B 45 CC 85 E8 CE   52 D9 9C 20 BE 39 B3 39  .,kE....R.. .9.9
#     0070: 12 1D 80 76 42 B6 72 DB   4C 54 B0 E9 B4 A0 32 07  ...vB.r.LT....2.
#     0080: 83 1F 39 04 16 20 CD B8   C4 E2 03 EC 49 31 6A BF  ..9.. ......I1j.
#     0090: A2 84 60 C6 54 54 FB FB   72 44 50 6A EA 3A 2D FC  ..`.TT..rDPj.:-.
#     00A0: 29 93 B1 24 5A 16 0D 37   F8 4D 7B 1A 83 3D B2 52  )..$Z..7.M...=.R
#     00B0: 56 F7 EC 47 F4 C1 B6 87   FB 9D C3 AB 88 56 49 7C  V..G.........VI.
#     00C0: F4 99 C4 09 B1 E7 F6 3F   2E 89 C2 58 88 71 8E 04  .......?...X.q..
#     00D0: FA 52 EA 1B F5 CA 97 36   B8 0A B4 E7 49 7E 25 33  .R.....6....I.%3
#     00E0: 19 32 FF F7 FD A6 AF 33   4F 5C C3 07 FB 05 53 36  .2.....3O\....S6
#     00F0: 6B 2D C5 E2 AC 63 68 44   91 F7 0D 4F DD 27 D3 EC  k-...chD...O.'..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.318 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 10 ED 25 41 40 0C DA CD   B1 28 D5 75 A7 F2 DB D9  ..%A@....(.u....
#     0010: DF 2B 51 DF 0B 06 55 C0   12 B2 42 C2 38 FC 4D 42  .+Q...U...B.8.MB
#     0020: 9C C2 4B E1 31 D4 18 E6   E8 42 98 40 A1 78 A3 B4  ..K.1....B.@.x..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.327 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.341 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 18 DA DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:16.000 UTC",
#       "not  after"         : "2024-01-25 07:13:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#           0010: 07 D7 E9 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.392 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 48 D2 81 5F 2E F7 F2   45 D8 3F AF F4 E5 70 21  EH.._...E.?...p!
#     0010: 01 99 4D BC BF 46 27 DD   54 99 84 DB AD 72 1B 26  ..M..F'.T....r.&
#     0020: F2 DC 23 F8 63 FE 9C B6   B9 DD 5A 70 28 52 12 26  ..#.c.....Zp(R.&
#     0030: 2A CB B2 0E 14 C2 4A 01   B1 77 30 A1 A5 97 60 A9  *.....J..w0...`.
#     0040: 82 2A 9D 0A B9 D6 02 6D   7B 1C DD 56 99 2E BE D3  .*.....m...V....
#     0050: 21 06 28 93 E5 13 17 17   B2 F8 36 E3 D4 8E D9 B5  !.(.......6.....
#     0060: 70 BB E8 F8 E8 00 82 D6   B2 4B AC D2 8B F1 4E CC  p........K....N.
#     0070: B9 91 8B E7 FD F2 E6 BA   27 98 58 BC BA CF 7A A4  ........'.X...z.
#     0080: 94 B9 01 6F C6 B8 A1 9D   1E 3B D5 96 25 19 2D B7  ...o.....;..%.-.
#     0090: 73 B5 17 5B 0E 62 E2 56   8B 92 85 70 AB F5 79 FF  s..[.b.V...p..y.
#     00A0: DD 95 1E A6 1E 1D 9C 07   6A 80 B5 18 96 41 F6 FF  ........j....A..
#     00B0: FE 14 4B 50 F0 09 ED E7   3B C0 55 39 23 97 50 2C  ..KP....;.U9#.P,
#     00C0: EF E2 58 98 33 A9 E1 7C   97 D0 59 9A 8B A3 88 7D  ..X.3.....Y.....
#     00D0: 9D 4D A6 C3 EB 91 27 4E   0E 46 B6 34 1E 91 C1 11  .M....'N.F.4....
#     00E0: EB 07 EA 24 42 BA B2 E5   34 38 A2 01 AA 1D FC CF  ...$B...48......
#     00F0: F3 E7 E7 32 68 AC EC 27   41 64 28 F7 DA A4 E9 D7  ...2h..'Ad(.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.397 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 97 01 0D 12 EA 4C 87   FE D0 11 35 DC 47 1E F8  x.....L....5.G..
#     0010: 22 ED 72 EA 8E 23 BB BF   AB D3 A6 7E B3 EC C2 D3  ".r..#..........
#     0020: A5 EE B5 6E 59 96 84 A0   34 47 D9 7D D5 FC F3 44  ...nY...4G.....D
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.401 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.778 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1D 0B 62 5C 90 17 D1 F7 A1 69 65 06 48 F8 EC 76 EF 18 D6 52 83 E4 B6 F1 27 53 39 E3 E9 1A 7D 76",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-27 07:13:34.039 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 07:13:34.040 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 07:13:35.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:13:35.357; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 07:13:35.706; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:35.708; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:35.708; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.746 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 18 DA DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:16.000 UTC",
#     "not  after"         : "2024-01-25 07:13:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#         0010: 07 D7 E9 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.750 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 77 68 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:07.000 UTC",
#     "not  after"         : "2024-01-25 07:13:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.762 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.939 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.939 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.941 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.941 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.946 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.960 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "64 B9 28 F8 3A B1 3A 78 7D 14 7E 45 0F FC 82 F4 4A AA E7 D0 61 34 4F 15 3D 8F D0 D1 E3 99 4F FD",
#   "session id"          : "7A A8 BC 21 D7 2D 89 24 FB 96 AA 8E 2E F7 86 74 DD 2F 4F F2 30 28 05 EE AE 07 C8 A1 E8 44 87 F5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BA 7A 6F 89 00 7C 02 06   7F 47 61 4F C9 23 62 FB  .zo......GaO.#b.
#             0010: 9E 1E FB 4C 98 98 9C 13   C4 F0 D6 8E 7B 85 3B 3F  ...L..........;?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.087 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 0F 69 AD 80 18 97 48 B7 9C AE 92 AC C0 17 B8 34 33 2F 61 C4 16 2A 6D BA 7B 6F F5 01 ED 05 FC",
#   "session id"          : "7A A8 BC 21 D7 2D 89 24 FB 96 AA 8E 2E F7 86 74 DD 2F 4F F2 30 28 05 EE AE 07 C8 A1 E8 44 87 F5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1C 9E 3A CD F6 A6 35 2A   14 DA 4A C3 DB FC 04 82  ..:...5*..J.....
#           0010: 5B F6 3D B8 90 34 55 C2   1E 00 68 8E F8 34 96 39  [.=..4U...h..4.9
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.088 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.088 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.113 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.116 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.119 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.133 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.144 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.144 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.145 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.148 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 D0 60 BA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:12.000 UTC",
#       "not  after"         : "2024-01-25 07:13:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 DC 1C E0 C4 16 03 09   41 BD 80 A1 B4 C8 14 FD  ........A.......
#           0010: DB 55 09 91                                        .U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.207 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.212 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C0 B2 2F 62 9D A3 2B 7A   B1 2B 18 E5 A4 1A FA AA  ../b..+z.+......
#     0010: 50 03 ED 5E D0 5B CE 5A   4E B3 BC 75 3D EA A5 59  P..^.[.ZN..u=..Y
#     0020: F8 7D C6 53 BB AD 6E 0F   3E EA 5E 8B DA 9B 0E 5A  ...S..n.>.^....Z
#     0030: 3D DC 9B F4 31 05 64 96   E3 FB 35 BA 03 6A B4 5F  =...1.d...5..j._
#     0040: 38 A7 05 1C E3 67 C1 9D   91 4C 70 97 A8 49 75 CD  8....g...Lp..Iu.
#     0050: 99 E6 D9 D1 49 A1 FD BD   A4 61 3C 4C 5B A7 A9 D7  ....I....a<L[...
#     0060: 2F AB 1D 35 DD A3 90 52   F9 C5 C4 09 87 4B F4 4D  /..5...R.....K.M
#     0070: 79 53 33 2B 01 51 2F 7E   97 60 AD 76 34 A9 BC F8  yS3+.Q/..`.v4...
#     0080: 8D 51 07 6D 3E BA F2 DF   7E 0E 3B 1B 74 4E 6C 8F  .Q.m>.....;.tNl.
#     0090: 25 3E 70 84 A0 4C 1F CB   33 56 EA E9 B7 3E B5 A1  %>p..L..3V...>..
#     00A0: 0F 40 7F EF 9F 3E 67 D5   EC 75 40 4B AE 7B CD 4F  .@...>g..u@K...O
#     00B0: DE 92 8D 92 EA 1A 89 64   0D 16 85 CA A5 A5 EB BB  .......d........
#     00C0: 1B 6C 15 30 40 FE 39 08   7B F1 FF 18 59 B3 5D 12  .l.0@.9.....Y.].
#     00D0: 82 CF 00 FF D5 F8 D6 8E   E8 60 5B BC D8 9B 41 C1  .........`[...A.
#     00E0: D1 8D C4 C2 52 C0 A3 BB   24 67 3E 7F 99 74 BD F1  ....R...$g>..t..
#     00F0: 82 D0 F6 5D BC 31 D3 8E   8C E6 F0 93 52 CB 4C DD  ...].1......R.L.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.214 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 3B 7C AB F2 33 66 ED   61 A7 B1 55 CF BF CC 2F  .;...3f.a..U.../
#     0010: CF 9B 01 F9 5C 77 33 C3   E4 47 56 CC 35 28 6C 5F  ....\w3..GV.5(l_
#     0020: 49 0B E5 C7 84 D0 96 FB   65 06 E2 CA C0 BF FE 02  I.......e.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.215 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.219 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 18 DA DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:16.000 UTC",
#       "not  after"         : "2024-01-25 07:13:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#           0010: 07 D7 E9 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.242 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 F4 BF 62 28 18 89 5A   68 2A 4E AC 78 DD 4E FF  ...b(..Zh*N.x.N.
#     0010: 62 FD B8 DA 6D 1B 2F 0E   BB BD E5 73 64 F5 30 9F  b...m./....sd.0.
#     0020: 17 94 32 EF 63 9C 54 2B   F1 59 A8 5B D7 1A 27 2C  ..2.c.T+.Y.[..',
#     0030: 53 C2 F0 AE B4 66 1B B3   D5 AE 9A A5 4A A8 34 9A  S....f......J.4.
#     0040: 61 26 FE C5 88 AF C9 E7   AF 7C 3B F6 2C CB 2A 97  a&........;.,.*.
#     0050: FD CE 6B F7 AB EF 40 87   50 68 81 0B 4E EF 10 B5  ..k...@.Ph..N...
#     0060: 6A 28 F7 A4 4B D5 DF 1E   67 21 46 8C 9F DF E5 6E  j(..K...g!F....n
#     0070: C5 6A E9 31 EA 39 76 CF   EE E9 98 AD D7 6C 23 3B  .j.1.9v......l#;
#     0080: 97 D4 63 65 24 7B A6 D4   DB 69 2F D7 09 60 75 15  ..ce$....i/..`u.
#     0090: 3C 15 76 F2 27 2F 65 7D   5E 60 59 72 E1 E6 00 7C  <.v.'/e.^`Yr....
#     00A0: B1 6D 4C 7D 83 79 0D 5A   2C 96 2E 0B 59 02 1E 48  .mL..y.Z,...Y..H
#     00B0: 07 91 96 29 E4 B2 91 A0   F6 1A 1D 73 B0 18 44 B6  ...).......s..D.
#     00C0: 85 6B 1D DB 7A 0A 35 77   6B 37 5D 1C F8 B8 82 98  .k..z.5wk7].....
#     00D0: B9 71 B1 20 95 C7 1F C9   58 36 74 7F D5 A5 A6 DA  .q. ....X6t.....
#     00E0: A9 02 38 C3 E9 94 22 6E   B9 EA 79 28 7A 0D 3F 36  ..8..."n..y(z.?6
#     00F0: FE E2 5E 9D 91 7A A9 A6   39 A0 CE 22 06 7F A1 F8  ..^..z..9.."....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.243 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C F3 DC DC 0C C8 63 F8   C1 96 01 B4 F1 7F 63 8D  <.....c.......c.
#     0010: C8 A3 C8 88 F4 49 92 14   3A 02 91 A1 50 91 BA 26  .....I..:...P..&
#     0020: E3 AF 14 8B 53 02 99 EE   0C F6 93 0A 30 B2 0F 53  ....S.......0..S
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.244 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.309 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FB 79 04 78 E2 0A 25 68 B1 C3 77 71 19 9A 6D 8B 5D 6F 39 18 32 D4 EF 31 F6 1C 23 B6 36 3E CA 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 07:13:36.624 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 07:13:36.625 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 07:13:49.805; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:50.297 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 77 68 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:07.000 UTC",
#       "not  after"         : "2024-01-25 07:13:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:50.310 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.480 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.481 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.482 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.482 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.500 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2E 62 A9 91 84 94 C9 AC E5 60 4D FD 0E 46 0A D3 77 5B 68 CD CE 72 BC B1 37 AD 85 30 17 F4 8A AD",
#     "session id"          : "03 D0 A4 FD 11 94 A4 5E A7 56 B3 12 4B CD 5E A6 64 5D E0 04 B4 A8 CC 1F 03 9E 37 9B E9 4E FA DE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 10 BA C9 D0 60 A7 19 BD   7D 1D 8F 7C 98 33 38 6C  ....`........38l
#               0010: D5 81 B1 4C 82 83 10 BD   68 29 33 22 08 48 90 6B  ...L....h)3".H.k
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F6 D4 43 CE 69 7A 17 01 86 B4 8E 79 73 B4 20 0B 8D A6 E7 43 5B A9 D6 18 37 10 54 33 83 18 7B 81",
#     "session id"          : "03 D0 A4 FD 11 94 A4 5E A7 56 B3 12 4B CD 5E A6 64 5D E0 04 B4 A8 CC 1F 03 9E 37 9B E9 4E FA DE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F5 E9 1A 6E 34 AD 07 4C   DB 87 0A C7 39 91 D4 37  ...n4..L....9..7
#             0010: 2E A7 F4 2C F9 37 62 79   54 B2 FF B7 D9 81 06 25  ...,.7byT......%
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.527 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.544 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.546 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.549 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.552 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.555 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.559 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.561 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.562 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.566 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "37 D0 60 BA",
#         "signature algorithm": "SHA256withRSA",
#         "issuer"             : "

[...truncated too long message...]

.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:15:06.329 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35554/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.414 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
ok 77 SOLR-11740 check 'solr stop' connection in 14455ms
ok 78 stop command for single port in 17825ms
ok 79 status detects locally running solr in 9429ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7676ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1104ms
ok 82 listing out files in 2958ms
ok 83 copying files around in 6747ms
ok 84 upconfig in 2923ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1247ms
ok 87 Cleanup in 2114ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 11s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2rpkzlqjgkrn2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8256 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8256/

All tests passed

Build Log:
[...truncated 1163 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41999/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 03:14:07.145; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:14:07.150; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41999/solr] to [https://127.0.0.1:41999].
# WARN  - 2023-10-27 03:14:08.077; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 03:14:08.114; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16349ms
ok 74 start solr with client truststore and security manager in 19709ms
not ok 75 start solr with mTLS needed in 53997ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-UpWmEX/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41999 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41999 (pid=2622925). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42000 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42000 (pid=2623094). Happy searching!
#
#     INFO  - 2023-10-27 03:15:10.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:15:10.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 03:15:10.894; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:10.897; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:10.899; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.957 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 0C BC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:56.000 UTC",
#     "not  after"         : "2024-01-25 03:14:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#         0010: 2B 0E 15 4D                                        +..M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.961 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 61 A7 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:47.000 UTC",
#     "not  after"         : "2024-01-25 03:14:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.980 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.349 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.351 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.351 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.366 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.388 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "ED A7 CF A1 EF 36 CE 1A 27 D4 AA 78 33 E8 17 74 66 15 68 50 2B A3 C0 27 43 F9 7C 0A 15 86 F3 EC",
#   "session id"          : "7C 07 C8 97 A3 0C EA 01 2C BF C5 8E 6E B8 46 C1 55 23 F9 A9 8D B2 5F 02 48 ED 15 02 FD 75 41 5F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 37 9C 10 5F D0 A1 66 BD   EA E2 A9 08 2D 28 1F 08  7.._..f.....-(..
#             0010: 69 02 A1 C3 2B 34 13 E9   61 4F 2D 78 F4 9B D6 6E  i...+4..aO-x...n
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 90 A2 6B BB BB 2A 17 72 A8 B4 64 35 80 82 6A C5 07 84 D3 7C 71 A1 CC C5 1E DA 24 39 C2 B9 BE",
#   "session id"          : "7C 07 C8 97 A3 0C EA 01 2C BF C5 8E 6E B8 46 C1 55 23 F9 A9 8D B2 5F 02 48 ED 15 02 FD 75 41 5F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AD B9 BE 47 54 7B A0 7D   42 FB 92 98 66 1D 36 97  ...GT...B...f.6.
#           0010: 20 CC 85 C3 3A 20 F9 20   BA C4 AE 7C AE 59 11 11   ...: . .....Y..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.005 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.007 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.009 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.022 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.022 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.024 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.024 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.026 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 9F 91 E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:52.000 UTC",
#       "not  after"         : "2024-01-25 03:14:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 AB A4 B3 D3 51 D5 19   F9 89 EE 5D B8 B8 21 04  .....Q.....]..!.
#           0010: 1A 82 5A 26                                        ..Z&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.027 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.117 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.125 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 21 9D D3 6C 91 0F D1 61   EE 0D 3E 25 02 17 9F C1  !..l...a..>%....
#     0010: C5 1D 56 59 05 AB AF 43   CE 5C 4A D0 80 42 48 88  ..VY...C.\J..BH.
#     0020: EC 9D 88 D9 2D 6B CD EE   92 5E 7E 1C 5D 9B 5B D0  ....-k...^..].[.
#     0030: 17 04 15 2B 72 EC 34 D3   85 07 A8 BD 5D 69 42 65  ...+r.4.....]iBe
#     0040: 9F 35 5F 5D 5F 31 22 80   37 10 75 B5 F6 23 70 41  .5_]_1".7.u..#pA
#     0050: 82 74 5B C0 A2 93 0A B9   A8 8C 5B E1 D4 E2 50 30  .t[.......[...P0
#     0060: BD 5E 45 9B 93 F7 25 F6   21 B1 F0 E2 7E 26 23 C1  .^E...%.!....&#.
#     0070: D8 18 9D 30 92 E8 A3 79   A4 D2 51 FA C0 0F 34 6D  ...0...y..Q...4m
#     0080: 56 9A C0 46 5A 9B 69 1D   4B 50 E3 4E A3 44 FD 5C  V..FZ.i.KP.N.D.\
#     0090: 4C 93 E0 51 92 78 90 4B   02 21 F8 66 C5 7C CE 18  L..Q.x.K.!.f....
#     00A0: C6 59 3E 41 B7 2F 91 54   12 59 35 7F FD 11 FB 2D  .Y>A./.T.Y5....-
#     00B0: B7 76 F0 79 97 1C D3 88   9A 86 C5 7B 19 7C 18 A9  .v.y............
#     00C0: B2 07 71 99 98 74 59 ED   D2 30 72 90 26 02 6A BC  ..q..tY..0r.&.j.
#     00D0: 98 CE 50 BF A0 B8 82 47   20 D3 85 88 B3 E9 ED 0F  ..P....G .......
#     00E0: 2D 31 BB CE 97 D2 09 58   41 FD 8E EF DF 92 03 D7  -1.....XA.......
#     00F0: 88 16 5B 88 A4 CC 54 6D   6B 74 E4 2D 34 F9 9A 84  ..[...Tmkt.-4...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.127 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 C2 E1 76 A1 B3 85 21   09 0A EF 7F 9C 89 1D 35  @..v...!.......5
#     0010: 17 87 E3 CE 1B D9 D5 3F   EE 58 6B 28 71 F4 46 47  .......?.Xk(q.FG
#     0020: 97 3C FA 84 BB 68 CE 31   08 E7 D8 57 9B 94 CD E0  .<...h.1...W....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.134 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.136 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.138 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 0C BC AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:56.000 UTC",
#       "not  after"         : "2024-01-25 03:14:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#           0010: 2B 0E 15 4D                                        +..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.168 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 3B 9E 09 73 BA 3D DF   32 C9 50 50 EA 7F 86 B0  4;..s.=.2.PP....
#     0010: 0F 99 88 B7 41 0B 8A F2   7D FF EE CA DA FA FC 25  ....A..........%
#     0020: 8A FD A4 06 1A DB F3 7A   17 01 BE E6 66 AB 19 31  .......z....f..1
#     0030: 77 8A 03 D2 D7 D6 6A 02   73 52 6E 93 98 85 AE A0  w.....j.sRn.....
#     0040: 37 CC 6C 64 A2 0A 04 B0   E1 9D 8E D7 9F 01 7D 3D  7.ld...........=
#     0050: A8 75 1D 26 79 D1 2B A9   75 E0 9D BE 31 0B A1 51  .u.&y.+.u...1..Q
#     0060: 29 B4 05 25 F2 B6 7C 1C   8A 9B 56 70 D7 F2 92 F8  )..%......Vp....
#     0070: 87 20 E6 52 39 BF 3F FB   0E 16 07 56 0B 16 20 C8  . .R9.?....V.. .
#     0080: DC F7 1D 12 EF F7 7D 4E   38 C1 ED 6E 69 C9 D6 CF  .......N8..ni...
#     0090: 83 89 C6 AD 31 9E F6 DA   62 69 66 A5 9C 39 0B 04  ....1...bif..9..
#     00A0: 75 29 46 A5 34 61 37 44   F4 D7 C5 B5 2C 99 98 0D  u)F.4a7D....,...
#     00B0: FE 0E 5E D0 E8 F5 CC 42   BA 0A BA 6D 81 25 B3 88  ..^....B...m.%..
#     00C0: 66 22 32 38 FC C1 08 2B   DF 83 5E E2 B2 3C 30 D1  f"28...+..^..<0.
#     00D0: B5 69 D5 FE 51 58 9A 3A   2A AF 60 27 14 33 4E BB  .i..QX.:*.`'.3N.
#     00E0: AB 57 9F 25 E9 E2 C3 C6   50 5E CB 87 6F 2A BF EA  .W.%....P^..o*..
#     00F0: F2 A2 05 E1 18 08 60 B8   8A E8 FC F7 1C B6 D0 B5  ......`.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.169 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C D1 70 DA D0 4F EF 85   DA A7 32 59 3E 26 A9 6C  l.p..O....2Y>&.l
#     0010: C4 23 66 3F 60 BC A3 44   E6 CF C2 51 F7 94 07 AB  .#f?`..D...Q....
#     0020: 2D 51 D1 43 68 05 2A 83   97 5A 47 87 DB FB 9E 5E  -Q.Ch.*..ZG....^
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.170 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.239 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.239 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.240 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.240 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.248 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "72 26 16 20 86 B5 B3 FB 5A 8F C2 A8 2A DD 61 AD BA E1 8D F4 E2 31 AF D8 1B 4C 48 F5 85 6B 53 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 03:15:13.017 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 03:15:13.018 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 03:15:14.290; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:15:14.294; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 03:15:14.656; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:14.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:14.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.691 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 0C BC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:56.000 UTC",
#     "not  after"         : "2024-01-25 03:14:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#         0010: 2B 0E 15 4D                                        +..M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.695 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 61 A7 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:47.000 UTC",
#     "not  after"         : "2024-01-25 03:14:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.706 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.888 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.888 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.890 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.890 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.907 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 06 98 B8 B5 0D B1 A0 DF 25 F5 F7 5D E6 35 5D C9 67 CE 13 12 27 93 C3 C2 8F 39 26 4D 46 19 4D",
#   "session id"          : "D5 3C 8C 3E 07 A5 B3 EB 0D AE ED E7 FB 0F FB 8F A9 09 A5 C0 7E 42 BA 9A 23 3F 9D D3 00 DB AD 1E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 96 B6 4C DB 05 43 9A F1   69 B0 D6 9A 2A 50 FB CE  ..L..C..i...*P..
#             0010: AC D8 D1 81 E6 76 AC 92   2A DF AB 44 13 23 21 56  .....v..*..D.#!V
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.027 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B2 4A 46 17 24 03 21 D0 07 FD C9 0C BE 5F 19 53 A0 8D 22 58 82 2C 49 EE A9 3F 75 D6 27 3D 1B 41",
#   "session id"          : "D5 3C 8C 3E 07 A5 B3 EB 0D AE ED E7 FB 0F FB 8F A9 09 A5 C0 7E 42 BA 9A 23 3F 9D D3 00 DB AD 1E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 60 2D 99 04 64 17 F1 5B   9D 2C F3 32 01 76 F3 6F  `-..d..[.,.2.v.o
#           0010: C5 E2 CD 27 E2 C4 A5 23   55 B9 F3 DC 32 08 84 5B  ...'...#U...2..[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.028 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.033 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.033 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.054 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.056 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.066 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.072 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.080 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 9F 91 E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:52.000 UTC",
#       "not  after"         : "2024-01-25 03:14:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 AB A4 B3 D3 51 D5 19   F9 89 EE 5D B8 B8 21 04  .....Q.....]..!.
#           0010: 1A 82 5A 26                                        ..Z&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.080 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.143 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.146 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 07 12 CC 16 60 8F B9   86 E3 23 F0 BD 90 D6 97  /....`....#.....
#     0010: 9F CA EE 81 BA 03 34 DB   3D CB 6C A5 07 63 1E 22  ......4.=.l..c."
#     0020: E7 3B 57 58 60 29 2E 17   E2 E0 62 E6 85 39 1F 8B  .;WX`)....b..9..
#     0030: 2F 12 FB 3A 31 BE 2F 4D   71 D2 6A 09 3F A4 6B F2  /..:1./Mq.j.?.k.
#     0040: 7A C5 A0 7A 75 79 2B D5   AE 52 DD 77 85 B3 D3 91  z..zuy+..R.w....
#     0050: F7 84 86 29 FE 91 6F 3A   3A 6E A1 ED 67 2E 63 48  ...)..o::n..g.cH
#     0060: 14 99 97 7E 4E 75 16 50   2D 57 0D CF DD 8E 4C 9D  ....Nu.P-W....L.
#     0070: 44 49 19 21 51 09 69 42   E7 59 45 F5 9A 34 37 90  DI.!Q.iB.YE..47.
#     0080: F8 FD FB 0F AD FB BB 2D   C0 2B EE 94 19 44 A6 DE  .......-.+...D..
#     0090: B7 24 69 0D 3B CA 3B 9F   88 02 EC AE CA 10 AD 5C  .$i.;.;........\
#     00A0: FA 30 BC B1 BB 5B DE 0C   3B 3B 21 03 91 9B 22 03  .0...[..;;!...".
#     00B0: 98 00 3E 73 B5 11 61 ED   C3 4E 39 41 ED E0 35 C0  ..>s..a..N9A..5.
#     00C0: 3C 21 71 5D 72 B0 A9 EC   15 45 3E F2 DB 3F 0B BB  <!q]r....E>..?..
#     00D0: 6E 0A F7 0C 8E A0 F7 EB   A6 59 CD E3 1B 68 87 39  n........Y...h.9
#     00E0: 79 58 EF 8E AB 2E 6F 2E   36 71 EF A3 95 F6 D6 BB  yX....o.6q......
#     00F0: 8C D2 58 E9 6D E2 F5 55   E9 1C 1A F4 1C 42 E9 47  ..X.m..U.....B.G
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.147 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 10 D3 2E 7F E6 DE F8 8B   42 0C 55 7B 94 78 9C A0  ........B.U..x..
#     0010: C5 77 5F C0 F2 76 91 D9   93 8F 7B AE 80 36 E8 9D  .w_..v.......6..
#     0020: 91 70 E2 7C 74 47 0C BA   30 54 E6 45 26 82 FE 45  .p..tG..0T.E&..E
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.249 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.250 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.250 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.253 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 0C BC AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:56.000 UTC",
#       "not  after"         : "2024-01-25 03:14:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#           0010: 2B 0E 15 4D                                        +..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.275 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 25 DB 91 6E AD FA C1 12   A1 C0 98 7A 57 8D 73 B5  %..n.......zW.s.
#     0010: 8D 2B 8B C1 83 E6 CB D4   AD 02 95 D0 78 A3 9D 51  .+..........x..Q
#     0020: DC 73 8E DA 6C DD C5 81   F1 6B 23 C9 44 AE 3E C8  .s..l....k#.D.>.
#     0030: 9B 9B 38 C9 8E 91 56 4D   70 71 C8 67 57 97 C5 FF  ..8...VMpq.gW...
#     0040: 15 8D AB F2 7F 8D 5E 95   4C 4F 1F 05 B2 10 BE 8F  ......^.LO......
#     0050: 5B EB EF 8F 16 D7 41 55   49 FF CF 4E 2F 78 03 F0  [.....AUI..N/x..
#     0060: 02 6C 1C 88 75 74 DE F5   29 C3 43 58 22 D6 87 EF  .l..ut..).CX"...
#     0070: DB F7 AB D0 D1 22 97 D9   7F 10 B3 59 82 33 4A B9  .....".....Y.3J.
#     0080: C1 73 1D 5D 3C A7 36 27   A0 99 FC 49 ED 4F 42 83  .s.]<.6'...I.OB.
#     0090: ED D5 6B 86 B3 6D E4 34   C7 7C 2A 8A F3 16 DD AF  ..k..m.4..*.....
#     00A0: 6D 8E 9B E3 7B 20 51 22   C2 8F 93 C1 86 B5 AE 6D  m.... Q".......m
#     00B0: EA 06 E5 B9 53 86 D7 C2   73 FF C0 DA DF BF AC 9B  ....S...s.......
#     00C0: 55 44 E1 F1 32 7B 6A C9   EE FA 1A 47 7F 3F 9A 24  UD..2.j....G.?.$
#     00D0: 08 36 CC 4F A3 9B 32 83   28 92 63 C8 C1 00 0A D4  .6.O..2.(.c.....
#     00E0: CD 08 FE B4 90 FC 94 00   2B 56 9C 20 DC 49 E9 3E  ........+V. .I.>
#     00F0: 7A AF 44 0D 2F 4B 27 EA   7A 85 7A 83 40 25 73 9F  z.D./K'.z.z.@%s.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.277 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 90 E3 43 A8 07 1C 18 6A   07 D8 79 08 BB 53 00 B4  ..C....j..y..S..
#     0010: 5A 25 42 19 DF D9 D9 29   74 86 7A E1 4A 8F 4C 2E  Z%B....)t.z.J.L.
#     0020: C8 45 C7 23 C4 49 9B 4A   D3 8D 83 03 7C 8D B9 E1  .E.#.I.J........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.277 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.346 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C5 D8 40 3C 7C 5D 71 B6 32 AB FF 37 14 73 FC 2D 5F 03 47 DA A2 EC 02 C5 E3 9C 0C EA 41 16 37 7C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 03:15:15.620 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 03:15:15.626 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 03:15:29.159; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:29.639 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 61 A7 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:47.000 UTC",
#       "not  after"         : "2024-01-25 03:14:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:29.653 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.809 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.811 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.811 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.817 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.829 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.829 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.830 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.832 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "42 67 AA 20 A4 CF 16 E3 F5 C2 3C C2 3A 58 5B A5 92 B3 98 72 28 F5 FE 80 2B 27 EA B0 4A D3 C3 05",
#     "session id"          : "F3 C0 5A A9 DC F9 22 65 1D B9 7D 47 90 DD 4D 91 08 89 4C 38 E3 BD 74 40 51 2F 96 E3 3F 9C B4 E9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D4 9A F6 78 F0 53 85 D9   57 C8 3F 73 A1 13 DA 95  ...x.S..W.?s....
#               0010: 4D 5D 28 4E 65 73 EE 24   35 8D 93 A5 BE 0D 6F 34  M](Nes.$5.....o4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.848 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "26 BA 72 D0 44 C2 B4 C4 A8 F5 6F 2C 4D 04 B6 8B 2F 13 1B BF 61 D4 03 42 D7 33 3D CF B7 E1 DE 04",
#     "session id"          : "F3 C0 5A A9 DC F9 22 65 1D B9 7D 47 90 DD 4D 91 08 89 4C 38 E3 BD 74 40 51 2F 96 E3 3F 9C B4 E9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 69 FB 21 01 12 04 A9 95   F5 5B 94 DF DE EF 57 90  i.!......[....W.
#             0010: 06 28 D6 16 03 19 07 14   D0 19 C6 DF A3 E8 26 3E  .(............&>
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.848 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.851 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.861 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.862 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.863 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.870 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.870 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.871 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extensio

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:16:44.645 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42000/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14603ms
ok 78 stop command for single port in 17739ms
ok 79 status detects locally running solr in 9521ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7360ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1097ms
ok 82 listing out files in 3042ms
ok 83 copying files around in 6587ms
ok 84 upconfig in 2611ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1259ms
ok 87 Cleanup in 2142ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 49s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nr7ww2yoeqcto

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8255 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8255/

All tests passed

Build Log:
[...truncated 1429 lines...]
BUILD FAILED in 1h 2m 52s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/e6c4nvlyg4lyu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8254 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8254/

All tests passed

Build Log:
[...truncated 1434 lines...]
BUILD FAILED in 1h 1m 30s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/mbe6aqqn3gxyg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8253 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8253/

All tests passed

Build Log:
[...truncated 1163 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41111/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 18:22:28.023; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:22:28.027; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41111/solr] to [https://127.0.0.1:41111].
# WARN  - 2023-10-26 18:22:28.846; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 18:22:28.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17084ms
ok 74 start solr with client truststore and security manager in 19921ms
not ok 75 start solr with mTLS needed in 60800ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-e7xD3M/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41111 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41111 (pid=1489663). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41112 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41112 (pid=1489790). Happy searching!
#
#     INFO  - 2023-10-26 18:23:32.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:23:32.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 18:23:33.568; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:33.570; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:33.571; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.608 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 7C 92 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:18.000 UTC",
#     "not  after"         : "2024-01-24 18:23:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#         0010: 3F 34 DF D3                                        ?4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.612 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 99 B9 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:09.000 UTC",
#     "not  after"         : "2024-01-24 18:23:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.624 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.327 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.328 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.330 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.330 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.355 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.376 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.388 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 D7 69 F4 17 F8 E8 B2 9D 84 9C 0D 4A 59 7B C9 B1 CB 2C 40 C8 AE BF D3 E7 74 BF 75 BE 9F E1 15",
#   "session id"          : "FB 94 F7 D5 DC 36 55 46 9F 9F 94 FA 4C A1 22 1B 05 58 91 21 BA DC 79 D2 E7 15 1E CD 57 CD 26 E4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 11 B5 5C 2D 20 92 38 49   F2 B0 ED A4 80 49 C0 0C  ..\- .8I.....I..
#             0010: D1 A4 46 1E 34 E3 70 CD   62 23 7D 89 81 0E B0 2F  ..F.4.p.b#...../
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F 3D 5E FB 66 DB A1 88 71 9D 1E E7 89 4A 25 CD 22 31 CB 1E C9 B9 96 B4 B5 CE 5F 6C 3D 5A 8A A4",
#   "session id"          : "FB 94 F7 D5 DC 36 55 46 9F 9F 94 FA 4C A1 22 1B 05 58 91 21 BA DC 79 D2 E7 15 1E CD 57 CD 26 E4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 87 51 BA E4 90 17 E1 AC   BB 50 A5 C5 65 A3 E2 29  .Q.......P..e..)
#           0010: 55 06 A8 3A 3A CB 54 34   3D A2 9F B3 13 34 EB 6D  U..::.T4=....4.m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.828 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.846 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.847 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.861 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.886 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.887 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.892 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.892 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.893 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.897 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.897 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.901 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 C1 CA 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:13.000 UTC",
#       "not  after"         : "2024-01-24 18:23:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B FD AE 01 24 E7 3A 9E   42 A9 1E FC B6 FB 73 3B  ....$.:.B.....s;
#           0010: 72 52 52 FA                                        rRR.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.902 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.201 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.229 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.237 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A6 5B 36 A3 EF 14 96 C0   91 83 7F 2B AE F3 BC 92  .[6........+....
#     0010: AA 15 85 2D 11 31 5E 1A   C6 1D F8 61 12 11 AE A5  ...-.1^....a....
#     0020: 3F A7 8D 16 1F 21 F1 86   18 8D CA E4 95 06 0B BB  ?....!..........
#     0030: DE FA E1 7A 04 D8 29 0B   B4 FC 0B 0D 46 47 4B 99  ...z..).....FGK.
#     0040: A4 F0 45 1D EA D0 7B A5   B9 95 F9 D5 86 4B 48 9F  ..E..........KH.
#     0050: 12 C5 CC C2 8D 73 36 F2   19 67 B7 4D E5 BB 3D D3  .....s6..g.M..=.
#     0060: 06 45 7A AF A5 2A 60 B1   3E F4 40 2A 40 9F F5 44  .Ez..*`.>.@*@..D
#     0070: F1 B9 C4 56 E3 1A 19 1F   2E 3D E6 AB 47 47 5D 01  ...V.....=..GG].
#     0080: 9B 17 D0 11 AF 76 6E 0C   A2 B0 5F 1D 9F 05 59 4B  .....vn..._...YK
#     0090: 4F 2A A3 D6 FF 7A 6D D2   D4 40 5B EC 36 3D 41 66  O*...zm..@[.6=Af
#     00A0: 4E D8 B3 7E 87 67 07 01   0F D0 AD 1D FB D8 53 0B  N....g........S.
#     00B0: 88 26 01 80 8A 0D A8 52   B1 0D 7F 16 FF 14 14 2A  .&.....R.......*
#     00C0: D5 62 BE CD BB 40 EB 6C   FF E0 69 0E 9A 30 56 EC  .b...@.l..i..0V.
#     00D0: 6E B7 23 31 43 34 39 E2   11 CB 1A E8 CF F8 BB A8  n.#1C49.........
#     00E0: D5 2C 28 BC C2 E1 52 2B   DE 4E C7 1D 18 B1 3D 5F  .,(...R+.N....=_
#     00F0: 48 42 DF B8 B8 BC 31 1F   F0 74 10 CC 04 B3 39 6E  HB....1..t....9n
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.239 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6F AA 37 41 5C 2B BF FB   87 DA AB 23 BC 7D 53 4F  o.7A\+.....#..SO
#     0010: 20 78 84 2F C6 7C C8 45   D9 E5 7D 79 91 A2 5D 35   x./...E...y..]5
#     0020: 6E D4 B1 1D 17 81 D1 19   55 58 1E 46 53 B7 51 3A  n.......UX.FS.Q:
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.247 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.248 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.258 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 7C 92 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:18.000 UTC",
#       "not  after"         : "2024-01-24 18:23:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#           0010: 3F 34 DF D3                                        ?4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.314 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 C2 A1 5A 68 36 13 ED   8D 52 C9 AB D5 DC 0A 9B  ...Zh6...R......
#     0010: 79 29 68 5D 7F 6C 04 E7   7A CE B2 7A 60 D3 36 A4  y)h].l..z..z`.6.
#     0020: 7C 8C CD 2F 6B 63 BF 05   6C A0 4C 66 FB DD 86 2F  .../kc..l.Lf.../
#     0030: 91 CE F2 92 69 9A 49 25   91 84 05 87 67 C5 FC 46  ....i.I%....g..F
#     0040: 41 DA 0A 0E EA E0 24 CB   F7 2B D8 22 BC DE 83 96  A.....$..+."....
#     0050: CC 82 18 D5 C6 11 80 7F   01 90 C1 82 4C A6 9C C1  ............L...
#     0060: B5 F2 70 2E 14 CC CA 34   8B 1F 12 4D 3F 9B 43 FE  ..p....4...M?.C.
#     0070: E0 C2 70 B9 58 0C AD CD   F6 0E 3F 15 27 A9 1C 2C  ..p.X.....?.'..,
#     0080: 7F 0A 77 08 72 B1 B5 E1   88 25 1B 44 C0 8B E4 E1  ..w.r....%.D....
#     0090: 15 F0 71 CB 37 24 F2 7B   AD F1 B1 6E 5C 69 55 A9  ..q.7$.....n\iU.
#     00A0: D4 0F CB DB 5A A2 46 30   1C 69 65 FF 86 31 3A 5D  ....Z.F0.ie..1:]
#     00B0: 6F 15 B7 53 F7 6F 83 F4   95 A6 92 24 0B 04 58 29  o..S.o.....$..X)
#     00C0: CA 54 99 2F 03 8F E6 19   B6 1F 57 C7 C6 64 C0 1D  .T./......W..d..
#     00D0: C3 2C 34 30 7E 86 D8 50   27 AD 74 69 70 7D AD 2E  .,40...P'.tip...
#     00E0: D1 71 FB 62 DD B5 31 6A   80 07 23 7C B7 C4 33 EF  .q.b..1j..#...3.
#     00F0: C2 7C 33 0C 41 B9 4D 4A   E1 E0 04 28 55 93 02 BA  ..3.A.MJ...(U...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.315 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9F B6 21 B6 20 DB A9 DB   92 90 52 DE 38 78 EA 39  ..!. .....R.8x.9
#     0010: 91 20 00 BC B1 5D B1 ED   B1 58 01 A4 14 BD FA 9C  . ...]...X......
#     0020: BD 92 DB 21 AC 39 B9 4B   A8 A7 2F 09 6B CC 8B 09  ...!.9.K../.k...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.316 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.629 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FF 29 4C BD 56 0B E1 F1 D4 46 8C 22 82 4E 87 FF 84 A3 99 8E AD 2D 97 C2 40 5D 43 CE 8D D1 E1 55",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 18:23:37.070 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 18:23:37.071 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 18:23:38.449; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:23:38.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 18:23:38.814; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:38.816; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:38.816; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.853 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 7C 92 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:18.000 UTC",
#     "not  after"         : "2024-01-24 18:23:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#         0010: 3F 34 DF D3                                        ?4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.857 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 99 B9 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:09.000 UTC",
#     "not  after"         : "2024-01-24 18:23:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.868 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.369 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.372 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.372 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.389 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.390 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.392 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3B 8A 3D 19 2A 7C 09 B1 62 CC 56 DA E5 8D 63 05 77 76 84 0F E0 B9 F0 A4 F3 7D C5 97 F7 37 42 89",
#   "session id"          : "C7 F7 47 DD 04 E2 6E D0 A6 44 2B CC DA 8F BC AA AD 45 D9 65 00 55 C5 6A 38 2A 21 7B 1C BF 7D 0D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 11 7E E8 0E 71 1D 06 DD   DD 95 C1 48 65 40 7D E4  ....q......He@..
#             0010: B4 A6 A8 0B F1 A0 F1 33   23 D1 52 36 EC 6B BA 15  .......3#.R6.k..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "19 22 21 07 2F E8 09 B6 D8 D9 21 97 51 79 99 34 D4 F4 2B 41 6D 7A 6B 95 C0 47 6E 7F 2F F3 FB 89",
#   "session id"          : "C7 F7 47 DD 04 E2 6E D0 A6 44 2B CC DA 8F BC AA AD 45 D9 65 00 55 C5 6A 38 2A 21 7B 1C BF 7D 0D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8E F1 4B DB 5C 00 CA 55   D4 26 B8 56 01 50 79 44  ..K.\..U.&.V.PyD
#           0010: 98 9C DF C6 7F C7 8D 80   05 04 6A 6B 9A 34 C8 7D  ..........jk.4..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.517 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.519 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.566 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.569 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.572 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.576 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.579 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.579 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.584 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.587 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.588 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.588 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.592 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 C1 CA 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:13.000 UTC",
#       "not  after"         : "2024-01-24 18:23:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B FD AE 01 24 E7 3A 9E   42 A9 1E FC B6 FB 73 3B  ....$.:.B.....s;
#           0010: 72 52 52 FA                                        rRR.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.595 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.644 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.677 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.681 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 CE C7 D7 19 7F 8B AF   19 1A D2 C8 71 96 76 3A  F...........q.v:
#     0010: 48 03 09 32 CD 0F E4 0B   85 C1 43 7A 10 07 EE 8B  H..2......Cz....
#     0020: 9B 9B 42 98 F1 B7 C7 E5   69 78 C7 B2 79 BD A4 44  ..B.....ix..y..D
#     0030: C1 CD 13 2D 0D BC BF 44   C8 F8 CD B5 AC 5C 7B 09  ...-...D.....\..
#     0040: 0C 2F 73 B8 F1 EA 35 73   04 E7 6D 8A 6F 1B 2C 7D  ./s...5s..m.o.,.
#     0050: 83 22 30 22 95 92 D3 AC   A9 CB D5 0B EA A3 B0 A9  ."0"............
#     0060: 84 07 BB 8E EB F3 67 73   C4 BB 4B D3 A9 05 28 51  ......gs..K...(Q
#     0070: 2A 71 8E A6 51 EB D9 78   93 3D E1 B9 18 51 1D A7  *q..Q..x.=...Q..
#     0080: F0 2E 62 B2 19 9B 50 D6   E5 58 27 01 84 4F 3C F3  ..b...P..X'..O<.
#     0090: 91 A1 DE 1D A7 FF E8 10   C8 DA C6 9D B3 92 1B B6  ................
#     00A0: 25 EB C3 E7 58 77 81 E0   4F 08 03 72 C2 22 B7 FD  %...Xw..O..r."..
#     00B0: BE 79 4F CC 3B 0E 46 97   FF 7D 64 91 31 7B 27 4E  .yO.;.F...d.1.'N
#     00C0: C1 40 CA 07 93 3B 59 F6   98 6B 82 C9 3E 41 2E D1  .@...;Y..k..>A..
#     00D0: A5 AD E7 F6 C0 08 44 E3   A4 06 75 38 FC 3F 4D D4  ......D...u8.?M.
#     00E0: ED F0 F9 1F FA 65 9B 60   2B 59 F4 7E 96 38 4D AF  .....e.`+Y...8M.
#     00F0: 2E DB E7 6E AE FA CC C6   BB C9 3D 47 4F FF 93 2A  ...n......=GO..*
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.683 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 04 F2 5A B5 ED 1D 4E 20   F0 96 8A 47 F3 DC A5 96  ..Z...N ...G....
#     0010: 0D C3 57 AC 93 80 F7 6A   78 70 72 67 47 22 7D 6A  ..W....jxprgG".j
#     0020: 1F B2 71 01 09 05 E4 6D   44 7B 34 9F 25 C2 65 08  ..q....mD.4.%.e.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.684 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.689 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 7C 92 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:18.000 UTC",
#       "not  after"         : "2024-01-24 18:23:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#           0010: 3F 34 DF D3                                        ?4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.720 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 53 30 66 25 FA 11 2A 09   AA 2F 88 3B 8D E0 89 85  S0f%..*../.;....
#     0010: 4D 6B A3 A1 40 43 B2 F6   5E 7E 42 E3 DF 0E 69 7C  Mk..@C..^.B...i.
#     0020: 18 08 2C E6 88 13 CA 29   61 22 40 4F 79 55 F8 12  ..,....)a"@OyU..
#     0030: A0 F7 04 9B F0 99 E2 46   F6 B6 BB AB 75 D9 10 78  .......F....u..x
#     0040: 9B 5D 1C 8F DE 7D 8E AD   96 F0 B9 01 51 EA A6 5F  .]..........Q.._
#     0050: FF 25 97 3A 82 F0 FC B7   3A 7B 03 32 45 7C 56 B5  .%.:....:..2E.V.
#     0060: CA 4F 16 66 40 5B C8 E6   AC 34 C0 76 23 03 9F 03  .O.f@[...4.v#...
#     0070: 97 7E 50 9F 97 1C AB 57   73 0A 93 7D B3 F0 07 91  ..P....Ws.......
#     0080: 77 B8 7A B2 65 46 4B B6   97 9B DE E2 09 8E 28 0F  w.z.eFK.......(.
#     0090: DD A6 2F 2E A0 56 C4 D6   25 38 F3 AC 6B 62 B2 EA  ../..V..%8..kb..
#     00A0: 00 BB 39 2B 2C 33 EE 7D   69 1A 7B A1 85 69 9A 0D  ..9+,3..i....i..
#     00B0: 1A 0F E3 6F 39 AF EB 41   82 E7 6F 86 C0 58 CB 7D  ...o9..A..o..X..
#     00C0: A5 AC D6 0C BC FB D2 0E   63 D9 65 6D 23 0E F4 AD  ........c.em#...
#     00D0: 6F F2 39 7B 1E CF 2F 21   FC 5B 67 C5 E4 92 4D 26  o.9.../!.[g...M&
#     00E0: 4E DC ED 66 DB 68 D3 E2   9B 81 0C FC C1 6A 62 06  N..f.h.......jb.
#     00F0: 2B 95 55 88 1D 15 81 DE   7D 66 CC 84 19 1D 54 E1  +.U......f....T.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.721 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 F0 47 D1 C6 85 D8 36   BE D9 EC CD 33 B0 EC AE  ..G....6....3...
#     0010: 5A F2 62 F4 CD 7B 29 DE   FC 92 CF E1 4D 0B B1 A9  Z.b...).....M...
#     0020: C5 80 69 7E 69 E8 46 6E   FE C2 61 14 0A 12 41 C8  ..i.i.Fn..a...A.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.722 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.775 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F1 6A 6D 3C D2 42 34 6C 51 C5 30 01 65 3E 26 92 BC 51 5C 15 A5 3B ED 96 51 58 C3 9C 44 F5 F5 E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 18:23:40.069 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 18:23:40.070 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-26 18:23:57.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:57.775 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 99 B9 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:09.000 UTC",
#       "not  after"         : "2024-01-24 18:23:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:57.789 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.110 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.112 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.112 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.130 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "29 FA F3 3D 61 70 43 28 87 6A 40 9E 8F 9F 2F 87 54 05 4D 39 83 B0 EC 1B F8 C9 3E 11 7A 88 0B 04",
#     "session id"          : "C0 63 BD 81 17 CD 56 C9 0D 07 33 4A 8A C5 FF 55 35 00 E8 2E FC 87 8B C1 A8 2A 49 14 91 27 50 63",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E8 70 26 0D 3C C1 05 2D   97 D1 4D 2E FD 84 FD 8D  .p&.<..-..M.....
#               0010: 9F F6 00 19 DC 9A 29 C4   44 F5 3F F3 9E 63 C0 77  ......).D.?..c.w
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8B E9 C5 B2 C5 35 32 90 C3 E5 F2 7E 3A E2 28 7A 9E 84 D0 84 37 49 89 F5 B1 30 0D CF 13 F4 47 D1",
#     "session id"          : "C0 63 BD 81 17 CD 56 C9 0D 07 33 4A 8A C5 FF 55 35 00 E8 2E FC 87 8B C1 A8 2A 49 14 91 27 50 63",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C 72 85 3E 2C 3B 38 DC   97 A3 FA B1 9C A7 BC 88  \r.>,;8.........
#             0010: AE 93 C5 07 00 46 4B 64   5B 46 21 41 FA D9 87 7D  .....FKd[F!A....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.154 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.163 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.165 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.169 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.174 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensio

[...truncated too long message...]

e.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:25:22.568 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.628 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.628 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.629 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.629 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41112/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14369ms
ok 78 stop command for single port in 17771ms
ok 79 status detects locally running solr in 9638ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7432ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1112ms
ok 82 listing out files in 2979ms
ok 83 copying files around in 6646ms
ok 84 upconfig in 2591ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1248ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1256ms
ok 87 Cleanup in 2136ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 6s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/p6hwayglm35fy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8252 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8252/

All tests passed

Build Log:
[...truncated 1394 lines...]
BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/65rcwiuheopm4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8251 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8251/

All tests passed

Build Log:
[...truncated 1271 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40129/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 13:05:45.228; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:05:45.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40129/solr] to [https://127.0.0.1:40129].
# WARN  - 2023-10-26 13:05:46.056; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:05:46.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16898ms
ok 74 start solr with client truststore and security manager in 19408ms
not ok 75 start solr with mTLS needed in 54801ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-XfGouV/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40129 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40129 (pid=765600). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40130 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40130 (pid=765707). Happy searching!
#
#     INFO  - 2023-10-26 13:06:48.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:06:48.769; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:06:49.203; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:49.205; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:49.206; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(ca,h=[localhost],a=[],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.260 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1E 5B 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:34.000 UTC",
#     "not  after"         : "2024-01-24 13:06:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#         0010: 6A E9 69 7A                                        j.iz
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.281 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 47 14 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:25.000 UTC",
#     "not  after"         : "2024-01-24 13:06:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.322 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.956 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.958 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.958 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.972 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.990 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.990 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.992 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5C 00 7A BC 7C C5 12 F5 FC A2 B6 1B C8 48 0E 1F D0 AC 36 A6 66 F6 BE F4 70 AF 75 8A 69 13 56 FF",
#   "session id"          : "87 2B E5 83 7D 58 69 12 B1 A5 C4 C0 D5 A5 2C 75 50 0D 8F 9E AC A8 B5 B1 AB 71 00 06 5B DC CF CF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 36 B6 5B 24 FA F5 0B   17 2B 36 F3 E3 36 E5 A3  h6.[$....+6..6..
#             0010: 91 79 DC E1 0E F9 B0 30   3E B8 3D 9F EF B9 02 28  .y.....0>.=....(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 D3 1E 47 45 0D 35 BF F3 1E 76 7F FA F9 2B F4 16 F8 48 2D BA 54 E2 0F 06 E2 85 FC F0 89 F3 7E",
#   "session id"          : "87 2B E5 83 7D 58 69 12 B1 A5 C4 C0 D5 A5 2C 75 50 0D 8F 9E AC A8 B5 B1 AB 71 00 06 5B DC CF CF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F2 E7 32 CA 01 0D F8 CE   FC EB 70 19 56 C7 84 BE  ..2.......p.V...
#           0010: A6 25 18 4C 0C B8 AB 71   F1 F3 F8 0F C1 FD B4 6C  .%.L...q.......l
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.550 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.566 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.567 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.568 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.596 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.611 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 02 0B 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:30.000 UTC",
#       "not  after"         : "2024-01-24 13:06:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 89 56 A6 D9 EA 9F 78   50 7B C4 F0 4B 81 BF 90  ..V....xP...K...
#           0010: BA A7 B4 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.611 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.694 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.698 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 BF 1A C3 49 55 03 0F   6C DE 9A AC FD 1C CF 74  ....IU..l......t
#     0010: 04 FA DD 0A E0 2A 5A 7B   02 5A D5 69 E2 D4 C4 3C  .....*Z..Z.i...<
#     0020: 1E F1 B5 B6 E7 CF 87 75   65 81 6C DC 61 3F FA BD  .......ue.l.a?..
#     0030: C9 39 15 45 BE 94 24 E2   F5 F8 B8 DB 05 43 A1 36  .9.E..$......C.6
#     0040: BC 8C A6 F7 81 4E A4 E1   48 EA 2D 54 40 1F 6D 12  .....N..H.-T@.m.
#     0050: 06 68 32 8B 3C 77 C3 CF   94 AF 8E F4 26 0C 90 34  .h2.<w......&..4
#     0060: 54 26 79 FD 0B B8 EB 1E   F5 C0 D8 38 9B 0C B3 FA  T&y........8....
#     0070: 7B FD 61 6E BC DE A7 06   15 ED B4 60 4E 9B 76 52  ..an.......`N.vR
#     0080: 4A F0 8F 2F 97 A4 D8 1C   5E 21 63 A0 83 12 B3 5F  J../....^!c...._
#     0090: 7D B4 07 97 1F B7 47 24   6F 06 2A 9A D6 01 CB 1E  ......G$o.*.....
#     00A0: 68 4D 67 CA 8C 83 6B 97   12 97 B5 33 42 9E B1 B9  hMg...k....3B...
#     00B0: 19 22 16 C7 92 61 41 C8   EA EB B2 A4 8D F5 49 CE  ."...aA.......I.
#     00C0: F7 5D 88 95 6A 72 8E 31   AD A2 C9 B1 B8 F1 97 B1  .]..jr.1........
#     00D0: FA B3 C2 18 F7 3D 4A 31   32 7A CC 69 0A 44 45 83  .....=J12z.i.DE.
#     00E0: A3 B1 CC 13 26 64 05 3A   DF 68 E9 99 ED AB 0B 4F  ....&d.:.h.....O
#     00F0: A5 51 1D 88 2B C2 5B F1   F1 4C 0F AA 51 CA FF 0F  .Q..+.[..L..Q...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.700 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CA 8C D0 E6 3E 02 9C F6   B7 0B D0 F6 7D 92 75 DD  ....>.........u.
#     0010: E4 4F D3 0D 59 5E 29 A6   60 19 0D 58 7B 17 5A 2B  .O..Y^).`..X..Z+
#     0020: E9 C1 13 67 25 EA AD 5B   99 9C 83 A8 A9 CA 5C A0  ...g%..[......\.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.703 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.706 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.708 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1E 5B 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:34.000 UTC",
#       "not  after"         : "2024-01-24 13:06:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#           0010: 6A E9 69 7A                                        j.iz
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.751 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 12 2C F9 F6 01 E5 24   3C B7 6E A7 61 F9 13 EA  4.,....$<.n.a...
#     0010: 31 7B BA E8 B8 4D 4C 75   F6 A5 8B BA FA 25 B0 01  1....MLu.....%..
#     0020: 12 92 C3 91 E7 8D 66 12   A4 6F 34 CE 51 E9 52 CE  ......f..o4.Q.R.
#     0030: 91 DF 46 12 77 80 F5 C8   75 31 AB 03 AF EE 96 A5  ..F.w...u1......
#     0040: 8E 25 29 05 F6 49 1D E9   A8 65 AD D6 3B D5 36 FF  .%)..I...e..;.6.
#     0050: F4 02 A0 22 D0 8A 95 3F   E8 67 90 5F 63 F8 DA 40  ..."...?.g._c..@
#     0060: 0C BA 74 9E 6A 50 DF 77   C8 27 FC CB 24 A8 34 3D  ..t.jP.w.'..$.4=
#     0070: 18 AD F2 DE 43 AF 3B F4   02 EA EB 7D 28 53 D2 E1  ....C.;.....(S..
#     0080: 3F 6F 7F 70 2A D0 73 E3   78 C5 6B 8D DE A0 AF 56  ?o.p*.s.x.k....V
#     0090: 0D 37 7B EA 31 1C 71 09   F1 27 FA 64 A6 7B 17 AA  .7..1.q..'.d....
#     00A0: D3 86 58 FF 9B 52 6B 55   4E 00 CF A3 1C 4D A0 61  ..X..RkUN....M.a
#     00B0: 27 7F 8A 57 C4 19 4E 5E   F7 84 65 3C 55 2F 5D 91  '..W..N^..e<U/].
#     00C0: 58 D1 DF 4A 76 18 7D FB   67 1E A2 A3 B1 E0 16 A4  X..Jv...g.......
#     00D0: F8 9B 99 C2 AA 09 CE A2   79 59 69 FB 2A 38 7E 01  ........yYi.*8..
#     00E0: 56 53 40 51 F3 5D 03 23   6E B0 A3 A0 70 1D 57 CE  VS@Q.].#n...p.W.
#     00F0: 3F 65 E1 F1 93 F2 6C 08   05 EE 2D 33 32 12 5D 9C  ?e....l...-32.].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.752 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 92 22 F4 49 39 EE 22   5F 23 9F 43 7A 5C 64 21  ..".I9."_#.Cz\d!
#     0010: 5A F3 47 53 3A DB E9 76   68 7E 0A 9D B8 06 4A F0  Z.GS:..vh.....J.
#     0020: 88 7F 47 3E 71 EB 0A 9B   B8 3A E6 F8 E6 67 93 F5  ..G>q....:...g..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.755 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.865 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E2 B7 65 CE 40 53 15 40 75 76 6C C4 D5 C9 EC 3E 6F AD AB 59 5F 91 32 88 F6 A2 1A 52 3E 7B 5A A9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:06:51.433 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:06:51.434 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 13:06:52.811; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:06:52.816; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:06:53.211; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:53.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:53.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.252 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1E 5B 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:34.000 UTC",
#     "not  after"         : "2024-01-24 13:06:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#         0010: 6A E9 69 7A                                        j.iz
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.256 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 47 14 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:25.000 UTC",
#     "not  after"         : "2024-01-24 13:06:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.271 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.450 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.450 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.452 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.452 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.456 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.469 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BB 8D 7A 83 93 1E 82 80 17 4D 1F BC 4B E5 42 AB E7 50 AC D4 E4 2A 8E 46 09 A8 47 7B 1C 3E 5D 1A",
#   "session id"          : "A5 3E 3B 9E 1C D0 4E 96 E3 B7 CE C9 B1 B6 E9 99 5F 05 0E 9D F7 45 E7 9F 08 A6 A0 09 F1 0F 5F E7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F 6F 29 E7 78 2D BC A7   18 25 5A 49 C4 C3 3E 9B  .o).x-...%ZI..>.
#             0010: 80 A6 A3 44 6C 7B CD 42   9D 56 22 90 F2 34 81 02  ...Dl..B.V"..4..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.622 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D2 04 8F E1 D8 FD 8E 4A 55 D6 43 CD CD F1 CA 62 CA 50 D0 63 17 FE 7A 9F 92 1E FE 0B A4 1D 22 50",
#   "session id"          : "A5 3E 3B 9E 1C D0 4E 96 E3 B7 CE C9 B1 B6 E9 99 5F 05 0E 9D F7 45 E7 9F 08 A6 A0 09 F1 0F 5F E7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 70 CE DE 9C CB 41 54 7F   90 33 68 C5 0B 04 69 15  p....AT..3h...i.
#           0010: 33 38 5A AD F4 07 89 53   48 B4 1D 0A EE 76 86 56  38Z....SH....v.V
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.623 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.623 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.628 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.639 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.642 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.643 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.649 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.649 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.650 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.650 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.652 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 02 0B 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:30.000 UTC",
#       "not  after"         : "2024-01-24 13:06:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 89 56 A6 D9 EA 9F 78   50 7B C4 F0 4B 81 BF 90  ..V....xP...K...
#           0010: BA A7 B4 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.652 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.991 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.994 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 D2 A0 DD 2E C7 35 E0   A1 10 F8 3E 17 8B DF 17  Q.....5....>....
#     0010: 64 20 E5 4D 6B 53 3B 84   80 4E C4 FF E5 26 74 AC  d .MkS;..N...&t.
#     0020: 9B 09 B2 41 84 9B A9 B9   B7 F3 29 D8 87 AB A1 FD  ...A......).....
#     0030: 06 1F DD EB 19 B4 18 B7   29 90 D6 ED 7D AB 2E 18  ........).......
#     0040: DF 27 A7 5E 01 A8 CA B6   0D AD 70 E4 AE B3 57 AE  .'.^......p...W.
#     0050: 0C D4 E8 01 71 5F 1B 0A   B0 53 AD 12 14 7E 14 D8  ....q_...S......
#     0060: D9 93 27 55 53 54 13 AF   0B FA C0 FB A8 02 58 C0  ..'UST........X.
#     0070: 12 A7 80 38 4F ED 74 90   41 F2 10 5F 62 41 89 CF  ...8O.t.A.._bA..
#     0080: A5 8B 99 32 BA 81 65 C2   C0 E7 61 62 28 B7 1D 63  ...2..e...ab(..c
#     0090: 5E 77 FA C5 37 87 99 6F   18 A8 3A BD E3 D0 C2 00  ^w..7..o..:.....
#     00A0: 22 7F 2A F5 ED A5 F5 FF   0F E7 03 CD C6 EA 6E B2  ".*...........n.
#     00B0: C1 E6 F3 21 47 E7 BD D9   41 1A F2 1D 9A 75 FF 31  ...!G...A....u.1
#     00C0: 1A 43 C9 68 6B 73 97 A7   DF F9 72 D4 6B 82 64 95  .C.hks....r.k.d.
#     00D0: 35 9E 2B F5 E5 B7 3D EA   12 20 9D 9D FC 2A 1D E8  5.+...=.. ...*..
#     00E0: 7B CA 2E 63 9C A6 B3 3A   CF C8 9A 15 EF 57 25 18  ...c...:.....W%.
#     00F0: 52 BF 28 CF D4 06 B5 C0   97 01 23 E5 59 2C 4E 38  R.(.......#.Y,N8
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.995 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 84 B1 BC 28 BA 18 39   F9 BF 98 75 37 12 E1 D0  x...(..9...u7...
#     0010: 56 3E F2 A7 60 93 ED CA   EC 0A 0A 45 34 31 40 E4  V>..`......E41@.
#     0020: 22 1C F7 50 9C 93 EA 8B   DB 02 20 05 07 DD EF 34  "..P...... ....4
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.000 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1E 5B 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:34.000 UTC",
#       "not  after"         : "2024-01-24 13:06:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#           0010: 6A E9 69 7A                                        j.iz
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.025 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 C4 C7 77 6C C3 18 6F   4C 86 3F EA 92 EF 26 EC  H..wl..oL.?...&.
#     0010: 9A 92 5F F0 29 B0 B2 B7   9E 68 44 40 C1 6F C1 3F  .._.)....hD@.o.?
#     0020: B8 09 11 24 B4 E6 66 D5   61 34 EE D2 E6 C0 E4 91  ...$..f.a4......
#     0030: DB F0 D0 4F F5 7D 22 65   6E F3 8E C9 FC 61 D1 1F  ...O.."en....a..
#     0040: AB 37 3C A6 4B 7C EB D6   04 51 99 21 1B 6A 89 0C  .7<.K....Q.!.j..
#     0050: 2F 95 A7 35 CA 48 A1 50   BD 29 20 E9 57 4E E8 C4  /..5.H.P.) .WN..
#     0060: 31 28 F5 3D 48 C2 E8 B2   0A 68 E6 44 4B EA 07 E2  1(.=H....h.DK...
#     0070: 27 08 4C 7A 7A 52 81 C7   FC DC B4 E7 9A FB E4 6B  '.LzzR.........k
#     0080: 95 63 1F 3F 3C 1F C3 CC   F7 B9 59 45 8A 6F 1A 5A  .c.?<.....YE.o.Z
#     0090: 33 15 FC 5F 34 94 FB 48   64 2A D9 25 BA 17 E1 68  3.._4..Hd*.%...h
#     00A0: 60 F0 23 F9 65 EE 12 33   3A 29 A7 33 D9 5E 39 63  `.#.e..3:).3.^9c
#     00B0: 67 FB 37 EA F7 89 1D 4C   4C C0 32 58 F9 D1 D9 D1  g.7....LL.2X....
#     00C0: 06 92 F0 B0 4F C7 4A 56   10 2A A7 49 57 1B A0 60  ....O.JV.*.IW..`
#     00D0: 7F 3E 97 5F 43 B6 D3 BA   28 C7 92 7F 6D 5C D6 67  .>._C...(...m\.g
#     00E0: 1F 4F 7B B0 83 64 C9 00   91 CF 0C E0 21 AD EB 24  .O...d......!..$
#     00F0: DB D1 49 0C 9A 8D 0F D7   88 CE B2 CB A9 59 28 15  ..I..........Y(.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.026 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 56 78 F2 23 7F 45 01 3A   8D 14 E6 39 16 76 98 E9  Vx.#.E.:...9.v..
#     0010: C5 52 59 A3 B7 D4 97 14   23 F9 3C E8 9B 15 4D D3  .RY.....#.<...M.
#     0020: AB C6 1B DC 0B C2 DC CD   A2 BD 6A 2A A7 5A A1 A1  ..........j*.Z..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.027 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.085 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "88 B2 FE C1 F3 FB DA D1 A7 91 AB 17 C1 30 93 80 75 AF CC E6 3A 37 70 F3 55 68 B8 87 ED 85 BB AC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:06:54.371 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:06:54.371 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-26 13:06:54.375 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-26 13:06:54.376 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-26 13:07:07.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:07:07.948 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 47 14 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:25.000 UTC",
#       "not  after"         : "2024-01-24 13:06:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:07:07.961 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.488 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.490 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.506 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "26 CB 73 02 F5 B0 DC A9 9F 56 F9 63 AD FF 81 0B 61 80 A0 B6 1D B4 11 4F 97 35 6C 05 9D 59 FA AB",
#     "session id"          : "D1 46 9D E5 4F 09 04 D3 62 C7 B2 7D 1A 43 23 82 6E 83 6C 5E B1 70 20 B2 9A 86 48 5B D6 CB A2 E3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2C 8D AA 69 11 18 40 2B   4C 7E B1 DF F6 6A 05 3B  ,..i..@+L....j.;
#               0010: 20 34 73 D1 94 0D 5A D3   61 6C 40 93 1A 4A AB 2C   4s...Z.al@..J.,
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D9 B1 50 04 62 27 84 0B F6 D4 47 5F BD 31 14 AF D6 0F 48 77 29 69 9B 98 2D 8D F5 26 D8 4D 0B 61",
#     "session id"          : "D1 46 9D E5 4F 09 04 D3 62 C7 B2 7D 1A 43 23 82 6E 83 6C 5E B1 70 20 B2 9A 86 48 5B D6 CB A2 E3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 67 1B 8C 99 81 0E 31 B9   F1 E2 3A E0 4D FE CC 07  g.....1...:.M...
#             0010: D5 C3 6D 85 7B 95 20 B5   AE 7B 0D 2E 5E F5 FE 27  ..m... .....^..'
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.527 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.537 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.539 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.540 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.543 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.543 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.544 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.544 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#  

[...truncated too long message...]

SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14773ms
ok 78 stop command for single port in 17721ms
not ok 79 status detects locally running solr in 1511ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7499ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1473ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2888ms
ok 83 copying files around in 6596ms
ok 84 upconfig in 2596ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1245ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
not ok 87 Cleanup in 2491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 36s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/dszeggnocywt2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8250 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8250/

All tests passed

Build Log:
[...truncated 1393 lines...]
BUILD FAILED in 1h 6m 7s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/llp6p5tdzm5ta

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8249 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8249/

All tests passed

Build Log:
[...truncated 1405 lines...]
BUILD FAILED in 1h 5m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/f7ninp5jwcaeo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8248 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8248/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43477/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 05:22:22.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:22:22.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43477/solr] to [https://127.0.0.1:43477].
# WARN  - 2023-10-26 05:22:23.536; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 05:22:23.575; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16550ms
ok 74 start solr with client truststore and security manager in 19547ms
not ok 75 start solr with mTLS needed in 50907ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-baNBEo/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43477 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43477 (pid=1251883). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43478 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43478 (pid=1252050). Happy searching!
#
#     INFO  - 2023-10-26 05:23:25.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:23:25.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 05:23:26.019; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:26.021; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:26.022; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 1D F8 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:11.000 UTC",
#     "not  after"         : "2024-01-24 05:23:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#         0010: 5F D0 AB 82                                        _...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.111 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1C CE 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:03.000 UTC",
#     "not  after"         : "2024-01-24 05:23:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.138 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.477 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.564 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.566 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.566 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.576 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.624 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 22 83 63 D4 A5 A3 86 FE F7 6E A4 2D 90 96 5D DA 5B B5 27 90 2B 6C F3 13 6C 4A F1 AA D1 E2 CD",
#   "session id"          : "67 78 28 44 AC 95 C7 90 DB E1 BF D7 A8 F9 4E 6D 69 A5 D6 C4 28 DD 03 9F 10 27 FA E4 1A 4D E2 D8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D0 5C 0E E6 27 77 EE 85   FD 09 7D 7D 58 21 77 A7  .\..'w......X!w.
#             0010: 8A 28 22 1D 77 73 C1 59   B5 37 FE 87 62 8F D2 3A  .(".ws.Y.7..b..:
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.952 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2B 71 C3 27 CB 7B 3B DB 05 3E B0 65 EA 4C 11 5F E7 02 53 4E 81 E6 8E 8E D1 E6 AC 5D E4 50 31 6C",
#   "session id"          : "67 78 28 44 AC 95 C7 90 DB E1 BF D7 A8 F9 4E 6D 69 A5 D6 C4 28 DD 03 9F 10 27 FA E4 1A 4D E2 D8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F4 30 16 BC 2B 78 04 53   E3 B3 8A C4 D9 EE 28 DA  .0..+x.S......(.
#           0010: 41 86 B2 D0 ED EF F8 CE   EC 01 3C 6B 39 31 16 45  A.........<k91.E
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.952 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.953 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.976 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.977 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.978 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.984 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.984 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.985 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.002 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 90 59 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:07.000 UTC",
#       "not  after"         : "2024-01-24 05:23:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 B8 F7 87 E1 F1 D2 7D   53 13 9E A5 87 D6 CC 8B  ........S.......
#           0010: C4 DB A2 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.002 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.101 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.106 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 E1 0E 69 56 12 B8 A8   97 2B 82 B1 C4 0E 0D B9  ...iV....+......
#     0010: 9C 56 7F 47 85 26 41 1F   37 E7 C3 7B E9 F7 3A E0  .V.G.&A.7.....:.
#     0020: E0 60 A8 52 6F FF D7 87   C1 D6 0F 88 79 B2 59 98  .`.Ro.......y.Y.
#     0030: 2C 21 97 FB 76 C8 8F F1   A2 31 32 BC 7C 0D 64 75  ,!..v....12...du
#     0040: 78 60 C3 6E 48 F4 E3 EC   7B B0 35 4E BC 38 FF C8  x`.nH.....5N.8..
#     0050: E9 6A 8F 3E 3D 9A 93 9B   B9 5C FE 63 90 7F 63 C3  .j.>=....\.c..c.
#     0060: CF EC 5C B7 53 96 2E E7   DB 56 15 9C 77 85 7D E7  ..\.S....V..w...
#     0070: 91 D7 FC 40 3E 5D 17 CF   47 41 C7 1E FD 8B E4 59  ...@>]..GA.....Y
#     0080: 83 CA 77 C1 C5 7F DD 62   F3 A2 E2 16 74 C8 4D 50  ..w....b....t.MP
#     0090: B8 05 40 A4 ED 66 EA 26   0A A7 D8 BC 42 1E 13 85  ..@..f.&....B...
#     00A0: 22 92 99 86 EC 4E 63 6C   E4 8F 58 8C 9B 98 67 31  "....Ncl..X...g1
#     00B0: D1 96 EE 1E 03 B6 90 71   9D 96 F2 5B 91 6A BA B6  .......q...[.j..
#     00C0: FF C4 DC 32 48 2A 7D 17   07 E4 93 3D D3 05 51 1F  ...2H*.....=..Q.
#     00D0: A6 E8 C9 AD 8E F5 41 11   90 E9 90 6B 75 8F 8B D8  ......A....ku...
#     00E0: 36 95 16 B7 B3 4E 80 6F   86 7E 6A D0 EA 7C 75 48  6....N.o..j...uH
#     00F0: 72 F4 48 60 C9 D2 15 47   08 1D D2 FD A0 C5 DF 75  r.H`...G.......u
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.117 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CC 6F 51 A9 C8 70 8C A4   A8 B9 FA 34 F9 CE A1 71  .oQ..p.....4...q
#     0010: EA CC 8C 5B E6 79 65 19   62 16 5E 51 16 0D D2 C5  ...[.ye.b.^Q....
#     0020: 66 70 7E AE BF D9 73 9B   04 55 91 20 03 49 63 29  fp....s..U. .Ic)
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.118 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.126 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 1D F8 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:11.000 UTC",
#       "not  after"         : "2024-01-24 05:23:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#           0010: 5F D0 AB 82                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.322 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 3B 3B 7F 36 62 C4 84   F8 51 45 C9 CD AE 87 F6  b;;.6b...QE.....
#     0010: FB A4 7A D9 97 2D DD 28   48 B5 0E 34 11 56 D3 72  ..z..-.(H..4.V.r
#     0020: 68 BE 66 1C C1 20 93 D8   4A 53 B1 56 E2 13 AB 3A  h.f.. ..JS.V...:
#     0030: 4E B0 98 E7 DB 8A AC 87   31 C0 AD BE EF 83 64 4D  N.......1.....dM
#     0040: 6B 0E 2B 20 89 89 38 5C   83 76 A5 15 54 03 F9 C2  k.+ ..8\.v..T...
#     0050: 10 27 BD 6F 9C 61 E2 0B   D3 B0 6F 83 91 F1 A5 0C  .'.o.a....o.....
#     0060: DC 5A 53 97 47 95 73 81   AC 64 A7 57 51 80 B9 3A  .ZS.G.s..d.WQ..:
#     0070: 5B 28 C2 12 71 ED 8F F0   FF 1F 83 26 89 02 17 38  [(..q......&...8
#     0080: 1A CE 16 AB E8 50 2A 05   7E 8A 51 9B D4 AC 33 D0  .....P*...Q...3.
#     0090: 85 FD 47 92 F3 CA E3 01   3B 89 3B FE 63 4A 9F 96  ..G.....;.;.cJ..
#     00A0: FA 52 A7 53 2F C8 08 0E   2C F8 A9 F0 29 28 3C 98  .R.S/...,...)(<.
#     00B0: 12 53 37 8E F1 96 49 02   CC 4E A2 5E 28 E4 C7 95  .S7...I..N.^(...
#     00C0: 90 C7 2E 48 42 C5 D5 B1   E5 8B AF D4 EC 6A 85 3D  ...HB........j.=
#     00D0: 8D 56 A5 11 47 05 B4 25   5F 61 93 65 D4 8A 57 C3  .V..G..%_a.e..W.
#     00E0: E7 AF 1F D5 A9 6B EC 0D   D6 DB 04 E6 43 69 C8 A2  .....k......Ci..
#     00F0: EE E6 92 D4 7A 2E 77 35   7B E9 21 13 04 C2 17 74  ....z.w5..!....t
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.323 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 33 11 7D 5C 0D 55 1A   F8 38 ED 99 13 50 FE B9  .3..\.U..8...P..
#     0010: 73 96 DE 88 D2 85 5D 46   A3 9A 68 D3 F3 73 3C 6B  s.....]F..h..s<k
#     0020: 9D 21 A5 A5 67 76 25 C2   8F F2 95 56 0F B8 59 01  .!..gv%....V..Y.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.326 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.461 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D2 7B 31 F6 91 1C 4C C6 67 85 B4 2A A4 F2 58 BD 4B 1C 51 E7 2F 87 D1 0D 5D 66 B4 DE 43 14 A8 8F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 05:23:28.150 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 05:23:28.151 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 05:23:29.400; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:23:29.404; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 05:23:29.759; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:29.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:29.762; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.793 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 1D F8 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:11.000 UTC",
#     "not  after"         : "2024-01-24 05:23:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#         0010: 5F D0 AB 82                                        _...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.797 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1C CE 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:03.000 UTC",
#     "not  after"         : "2024-01-24 05:23:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.808 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.961 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.962 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.963 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.963 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.978 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.979 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.981 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "90 FA FA FB 69 F2 AD 8C 6B 20 DE FE C8 7A CA 36 21 50 56 8F A3 F5 5F DF 50 F1 8C 63 A4 C4 F2 99",
#   "session id"          : "B1 66 29 7F 63 EE 06 57 66 4D F0 64 62 C2 32 D0 7C 98 86 2A C3 DC 1F 65 2F 64 A7 F3 66 9B 22 D5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D6 D7 55 DA E7 45 9C 9E   B2 25 2E C2 31 05 BB 7D  ..U..E...%..1...
#             0010: A6 80 F5 2B 7A 59 55 59   87 90 79 E5 F4 F7 E6 0C  ...+zYUY..y.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "11 A3 A0 4B 56 3F 04 55 CF EE 6A C6 ED 74 D8 21 32 10 6E 1B CB 58 4A 66 E1 45 23 56 D5 F2 A8 24",
#   "session id"          : "B1 66 29 7F 63 EE 06 57 66 4D F0 64 62 C2 32 D0 7C 98 86 2A C3 DC 1F 65 2F 64 A7 F3 66 9B 22 D5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D2 7A DB 0F BD 7F 9B 81   D9 16 20 58 19 A1 1B 41  .z........ X...A
#           0010: 3C 9D 2A F4 2B D4 03 63   68 26 8F B5 E2 22 23 35  <.*.+..ch&..."#5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.089 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.092 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.111 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.113 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.115 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.118 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.118 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.119 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.127 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.128 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.129 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.136 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 90 59 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:07.000 UTC",
#       "not  after"         : "2024-01-24 05:23:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 B8 F7 87 E1 F1 D2 7D   53 13 9E A5 87 D6 CC 8B  ........S.......
#           0010: C4 DB A2 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.136 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.202 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.205 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3A 37 06 AD 00 EC FB B0   3B 01 55 31 87 F3 DA 02  :7......;.U1....
#     0010: 3B 70 85 79 0E 48 23 60   25 71 40 55 73 CC D2 52  ;p.y.H#`%q@Us..R
#     0020: EA 65 54 76 D8 18 AE FD   01 6A 64 D2 9D 56 8E 2C  .eTv.....jd..V.,
#     0030: 83 1F 22 88 3F 36 1D 8E   EB BB 21 A2 A6 84 80 40  ..".?6....!....@
#     0040: BB 29 FF F7 CC AC 57 0D   E7 80 5C B9 54 FC 95 C5  .)....W...\.T...
#     0050: 57 14 69 07 0C 16 AD 0E   35 64 13 26 4C 6D A9 2A  W.i.....5d.&Lm.*
#     0060: 8B 6E 13 91 95 C6 62 EA   51 15 10 8F 50 00 D3 45  .n....b.Q...P..E
#     0070: 1A 3E B6 21 71 ED 3D 81   52 8A 77 F9 5A 41 2A 8E  .>.!q.=.R.w.ZA*.
#     0080: F8 C0 61 B7 65 12 D4 0A   86 71 1C 13 2E D0 A1 E5  ..a.e....q......
#     0090: 6A 7D 16 D4 74 11 B7 94   88 61 E2 38 DA C6 E2 40  j...t....a.8...@
#     00A0: 31 BE F3 53 3C 32 C0 C0   88 91 E0 B7 C9 CD D0 DE  1..S<2..........
#     00B0: 24 8D 65 4A E7 2D D0 D6   5C B4 2C 88 85 FD 7B 55  $.eJ.-..\.,....U
#     00C0: 9B 2D 07 7F 52 02 BA 55   BB 6D BA 5C 65 60 4B 90  .-..R..U.m.\e`K.
#     00D0: B5 55 E1 AF 45 7C BD B0   C7 D8 C8 86 4F CD 3F 7B  .U..E.......O.?.
#     00E0: B0 08 0A 91 84 FB F8 BA   31 FE 9A 79 30 38 A9 68  ........1..y08.h
#     00F0: 78 29 86 52 9D 13 80 64   E2 F8 B2 A7 9B 3D 60 20  x).R...d.....=`
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.206 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4C 02 B7 3D 8B 1B 40 4F   FC D6 3F F9 A9 A9 4D 99  L..=..@O..?...M.
#     0010: 70 50 10 A4 17 5C AB CB   BB A1 17 0A 17 C8 92 89  pP...\..........
#     0020: C6 4C EA 45 08 5D 3C F8   12 C1 2C C0 D0 8E 0E 46  .L.E.]<...,....F
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.208 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.210 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.212 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 1D F8 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:11.000 UTC",
#       "not  after"         : "2024-01-24 05:23:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#           0010: 5F D0 AB 82                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.235 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E 5F FA A4 B6 AD 2F B5   E0 93 F5 E3 2B 5C 12 0A  n_..../.....+\..
#     0010: 54 4E 55 53 D9 3B B2 8A   88 59 4E 92 8C 6B 93 E5  TNUS.;...YN..k..
#     0020: 54 E9 C5 AC 0D EF 51 67   72 27 5E 3A 2A 75 17 DA  T.....Qgr'^:*u..
#     0030: EB 3F D4 18 51 E8 AD 6C   CD 48 5B E8 39 1B BC 38  .?..Q..l.H[.9..8
#     0040: 62 7E A0 C4 91 20 15 BE   12 15 D8 85 BD F9 AD 02  b.... ..........
#     0050: 47 B8 F4 59 88 22 17 11   5E 48 49 6A 37 CD 46 4E  G..Y."..^HIj7.FN
#     0060: F2 BD CA 2C BF 7E B4 16   F9 EF B6 06 C2 33 7D 7B  ...,.........3..
#     0070: 6E 9C 33 08 EB C7 26 58   DE E2 94 0F 28 71 2C 4C  n.3...&X....(q,L
#     0080: 15 02 15 5F 61 A4 17 39   AB 0F D4 D8 ED 4C 6C B9  ..._a..9.....Ll.
#     0090: 0B 34 48 BE B2 43 07 97   2C 89 19 28 24 A3 48 36  .4H..C..,..($.H6
#     00A0: 22 F0 28 74 E2 4E BE 18   3B 1F 40 69 29 77 B3 A2  ".(t.N..;.@i)w..
#     00B0: C2 23 40 95 C6 C8 9F 42   86 4C 5A 60 7D 39 C9 AD  .#@....B.LZ`.9..
#     00C0: 7F BF B0 6D 40 BB E3 39   6E 78 44 5E E3 9A 62 8B  ...m@..9nxD^..b.
#     00D0: 55 F4 7B 6A 42 77 BF 7F   C9 4E 0A C2 13 14 91 AE  U..jBw...N......
#     00E0: 9D 2B BF 23 53 CE A0 41   F9 7C B8 99 23 F0 74 78  .+.#S..A....#.tx
#     00F0: 11 9F D5 35 F3 D8 D1 56   C7 46 CD 75 D7 90 A9 02  ...5...V.F.u....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.236 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F0 1D 9F 51 02 6B ED FD   3B 1A 90 AB 62 25 47 3B  ...Q.k..;...b%G;
#     0010: 9C 81 06 DD 54 89 D8 81   D8 2E B5 FC F5 D9 A8 90  ....T...........
#     0020: F1 87 4F CF 6A 90 61 13   8C C6 C5 49 91 F8 3C 3D  ..O.j.a....I..<=
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.236 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.295 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "99 0B 76 7C D4 AF AF 06 1E 7E 98 8F F1 ED 5A 21 88 D3 08 AB 57 51 78 A5 43 FB 7C 5E E4 B1 E0 32",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 05:23:30.548 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 05:23:30.549 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-26 05:23:30.565 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-26 05:23:44.104; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:44.454 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 1C CE 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:03.000 UTC",
#       "not  after"         : "2024-01-24 05:23:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:44.467 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.628 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.628 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.630 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.630 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.634 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.648 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "85 95 A0 BE 6F 34 1F 03 40 B3 BD 81 61 BF EF B2 AE 13 7A AB 04 46 72 05 1E 93 B1 1F 94 D1 62 C1",
#     "session id"          : "E2 07 D2 74 80 51 69 BD F3 F2 B1 96 FE 1E A6 60 CC 18 0C AE AE BE 30 03 9E 12 F6 DF 70 38 86 FA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: DB 64 20 DA 5A 1F EA BA   83 7A 38 97 95 D6 E7 E2  .d .Z....z8.....
#               0010: 22 C8 C9 07 9F 99 01 16   B3 C0 5F 1C 72 9C C9 58  "........._.r..X
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "BC F5 75 AD 50 B1 A4 79 EF A3 30 43 7C 0D D4 90 4A 92 1E 6D 4D E4 1F 6C C6 1C DB 8F 1D 89 88 DB",
#     "session id"          : "E2 07 D2 74 80 51 69 BD F3 F2 B1 96 FE 1E A6 60 CC 18 0C AE AE BE 30 03 9E 12 F6 DF 70 38 86 FA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA D8 D8 49 9E 3E 25 52   F8 D3 4E 63 9A 04 03 55  ...I.>%R..Nc...U
#             0010: C6 BD C1 C0 93 A9 23 55   27 B7 F1 20 99 E1 92 7A  ......#U'.. ...z
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.671 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.682 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.684 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.685 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.701 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "cert

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:24:57.923 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43478/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14523ms
ok 78 stop command for single port in 18606ms
ok 79 status detects locally running solr in 9648ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7428ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1126ms
ok 82 listing out files in 3011ms
ok 83 copying files around in 6646ms
ok 84 upconfig in 2606ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1244ms
ok 87 Cleanup in 2086ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 55s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/wvenjdlkwvo4y

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8247 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8247/

All tests passed

Build Log:
[...truncated 1559 lines...]
BUILD FAILED in 1h 5m 50s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vkvyixryih34q

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8246 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8246/

All tests passed

Build Log:
[...truncated 1562 lines...]
BUILD FAILED in 1h 5m 16s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jabc27uv4zxky

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8245 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8245/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43585/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-25 18:20:52.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:20:52.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43585/solr] to [https://127.0.0.1:43585].
# WARN  - 2023-10-25 18:20:53.162; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:20:53.201; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16373ms
ok 74 start solr with client truststore and security manager in 19811ms
not ok 75 start solr with mTLS needed in 56234ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-vHw9CF/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43585 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43585 (pid=3882620). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43586 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43586 (pid=3882788). Happy searching!
#
#     INFO  - 2023-10-25 18:21:54.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:21:54.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:21:55.831; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:21:55.834; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:21:55.839; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.912 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 BB 0D 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:41.000 UTC",
#     "not  after"         : "2024-01-23 18:21:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#         0010: FA 54 1B A6                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.920 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 4C AB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:32.000 UTC",
#     "not  after"         : "2024-01-23 18:21:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.935 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.511 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.511 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.524 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.566 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "16 76 70 F3 0D 64 76 17 F0 F4 DC 77 CC 6A CF B3 89 31 19 0C 71 13 FA F1 86 0C C5 85 5A C4 E2 C2",
#   "session id"          : "57 D1 9D D5 89 F9 9D B5 A1 4A F6 AD 70 81 76 F4 1C 5E 12 01 FC 89 48 1A 18 8B 6E F9 5E 00 E2 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 37 5A BA 22 67 C0 63 9B   E1 7E 61 AE 2D 0D B7 97  7Z."g.c...a.-...
#             0010: 40 35 65 AD F6 C7 FC 16   E8 8F 19 15 E1 9C FD 63  @5e............c
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.965 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "06 BE 06 EA CF A4 DB AE A1 53 55 49 2B B4 CB 1B 9F 6A 83 17 EF A4 4E B9 D0 0C 8F 01 48 A8 4C 65",
#   "session id"          : "57 D1 9D D5 89 F9 9D B5 A1 4A F6 AD 70 81 76 F4 1C 5E 12 01 FC 89 48 1A 18 8B 6E F9 5E 00 E2 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3A C4 78 32 00 58 FC 09   73 12 84 34 14 6C 46 43  :.x2.X..s..4.lFC
#           0010: 3C 64 1D 1D 9C BD 1A D8   1F 65 AE DD 8E 53 FC 30  <d.......e...S.0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.965 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.966 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.983 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.983 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.990 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.995 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.995 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.030 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.045 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.047 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.051 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.052 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.052 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.054 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.069 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.069 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.070 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.081 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 22 71 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:37.000 UTC",
#       "not  after"         : "2024-01-23 18:21:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 1B 4B B5 54 BE C8 0F   4A AD E2 ED C8 07 82 7C  W.K.T...J.......
#           0010: 1E B2 5D FA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.082 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.225 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.426 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E A7 97 E1 B0 C1 39 8F   65 8B 29 88 E7 C1 87 6E  >.....9.e.)....n
#     0010: 8E C7 6D 94 FA F8 EF A7   B2 56 4E 49 EE 8E 1D 3F  ..m......VNI...?
#     0020: 10 EE 2C E0 08 C6 2D 1E   A5 25 5D D9 89 C9 F2 21  ..,...-..%]....!
#     0030: 81 C9 15 7C F7 FD 9B A6   B0 EB 23 BD 2A 30 F6 83  ..........#.*0..
#     0040: D0 A6 03 DC EC 14 FB AD   3B 10 BC 4A DA D8 D1 CA  ........;..J....
#     0050: 6E E0 1F 53 84 41 9A C5   35 AA E5 0F 9F 88 28 1F  n..S.A..5.....(.
#     0060: 18 02 BF 46 54 52 6C 00   02 95 CB 00 8C 37 F3 E3  ...FTRl......7..
#     0070: 54 39 DF A2 5C FA 55 31   35 A0 FA 95 32 32 6F 1B  T9..\.U15...22o.
#     0080: 49 AD 65 6F B6 C7 13 78   EB 40 C3 E3 2E C1 72 4B  I.eo...x.@....rK
#     0090: 31 D4 B4 C7 89 E8 52 BC   AE 34 9A EE 0B 38 DB 86  1.....R..4...8..
#     00A0: BB 5B 62 9B 86 60 16 F5   57 1E A9 AA 5F B4 AD A0  .[b..`..W..._...
#     00B0: 10 B5 D6 46 F3 F0 EE 86   4F 6A 5E 5A 23 CF 87 50  ...F....Oj^Z#..P
#     00C0: 46 E0 D4 54 5F 0C 90 5B   CC 82 3F 47 52 44 52 F9  F..T_..[..?GRDR.
#     00D0: 02 46 A2 B1 D0 E5 EB 62   15 98 8A A6 D4 94 2A EE  .F.....b......*.
#     00E0: 41 21 F0 A8 0C 43 27 7D   B7 23 1F D1 42 6C 90 AC  A!...C'..#..Bl..
#     00F0: B8 1A DA B6 C9 2E B3 54   BB 72 3D A9 DA 6C 8E 8A  .......T.r=..l..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.428 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 79 17 4F 12 BC 7B 42 C5   DD 57 1C F9 2C 7B CD 4F  y.O...B..W..,..O
#     0010: 49 E5 8E 74 99 2B 95 4F   EE 97 7C BB 4F E8 D2 87  I..t.+.O....O...
#     0020: 45 FE 5B 7A 4E A7 BE 09   EF BF 2A 3D 21 AB 7E CA  E.[zN.....*=!...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.430 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.432 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.444 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 BB 0D 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:41.000 UTC",
#       "not  after"         : "2024-01-23 18:21:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#           0010: FA 54 1B A6                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.527 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.527 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 4D 72 41 D1 E7 5A F3   F9 02 5B CF 69 25 37 63  tMrA..Z...[.i%7c
#     0010: B8 F9 57 A8 A2 1F D2 68   1E FE BD 7B A7 D8 F3 43  ..W....h.......C
#     0020: 73 C4 2F 77 79 F8 AE 27   E2 15 0B 1B 48 40 AD 13  s./wy..'....H@..
#     0030: 1B 77 10 00 DA 4D 82 02   F4 7E 79 B2 63 6B 92 5A  .w...M....y.ck.Z
#     0040: F1 58 79 E2 53 7E 36 DB   E6 53 89 94 6E 06 C4 FF  .Xy.S.6..S..n...
#     0050: 1E 06 A1 2B 76 8C 32 4C   F1 03 52 72 0B 1B 8A EF  ...+v.2L..Rr....
#     0060: 96 E7 47 A9 83 04 39 30   33 3E E5 48 A1 F9 34 31  ..G...903>.H..41
#     0070: D2 C4 02 43 46 D2 6F F7   83 6B BE DC C0 30 2F 8C  ...CF.o..k...0/.
#     0080: 24 B8 E9 FA 71 83 DF 20   CE 4E 4F F3 DE 4C 4B 5A  $...q.. .NO..LKZ
#     0090: 38 EA A9 FD 92 8E 6C 88   A9 49 61 F0 6C 2C C7 FA  8.....l..Ia.l,..
#     00A0: 25 4B B8 3E 91 77 02 64   61 C9 D1 E8 E0 E9 9D A8  %K.>.w.da.......
#     00B0: F6 81 E5 E6 33 BD 3F A8   28 2B 0D 6F 2C 5C C3 12  ....3.?.(+.o,\..
#     00C0: 23 F7 1C C9 F2 8A 40 A4   18 CE 21 69 D8 E2 62 EA  #.....@...!i..b.
#     00D0: 6E 53 BB 11 A0 C8 9B 3A   9F 49 D8 4E 54 31 FF FB  nS.....:.I.NT1..
#     00E0: F9 EE 6C 66 D3 3B 63 2F   26 51 51 97 38 E5 9E D6  ..lf.;c/&QQ.8...
#     00F0: E0 7A 94 4F 7E 26 DC 0B   04 83 06 51 FA D6 3A 39  .z.O.&.....Q..:9
#   }
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.529 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 85 44 F4 8E E1 73 F7   C3 CE C5 05 53 E3 92 DA  ..D...s.....S...
#     0010: BB 2F 2D 7C BC 99 DA 23   EC CD AF 70 BD E5 0A AA  ./-....#...p....
#     0020: 7E A2 58 AB 9C AD EF 09   95 60 66 73 57 97 FE 6B  ..X......`fsW..k
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.529 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.624 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "21 42 09 80 A8 06 13 1A 22 09 D7 B5 DD 6F 49 E7 78 31 E7 C6 81 01 42 7A 84 2B 4A 21 4F 7D A2 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 18:21:58.263 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 18:21:58.264 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 18:21:59.797; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:21:59.802; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:22:00.174; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:22:00.176; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:22:00.177; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.212 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 BB 0D 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:41.000 UTC",
#     "not  after"         : "2024-01-23 18:21:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#         0010: FA 54 1B A6                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.216 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 4C AB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:32.000 UTC",
#     "not  after"         : "2024-01-23 18:21:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.228 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.395 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.396 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.399 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.399 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.404 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.418 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EE 64 AE 69 E7 A7 E5 97 F3 B8 89 EA 6F 15 2B 98 6B D2 80 75 25 26 2C 43 2E EF 90 3E 07 FA EA BF",
#   "session id"          : "2A 65 8D 92 87 11 A2 AB 6D 11 AE 36 56 D3 62 44 86 5C C8 11 C2 BB 87 FA 2A F1 9E 4B C4 26 B3 73",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D9 C9 B2 D8 1E 67 4C BC   60 BD 63 F3 F5 30 8A B4  .....gL.`.c..0..
#             0010: 77 4B 9B AA B3 A2 DC 27   B5 DF 5D 99 BC 20 E8 76  wK.....'..].. .v
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.520 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7B 40 39 87 CB 63 D4 31 0D 47 9F 70 58 E3 D4 7C 97 2D 4F 31 D4 36 11 2C 7A 36 F0 0C 54 D7 A2 23",
#   "session id"          : "2A 65 8D 92 87 11 A2 AB 6D 11 AE 36 56 D3 62 44 86 5C C8 11 C2 BB 87 FA 2A F1 9E 4B C4 26 B3 73",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C9 4E AE A2 53 92 B9 EF   CE 3E B9 C1 FB 36 78 2A  .N..S....>...6x*
#           0010: 36 82 26 87 EE 5F FB 43   7E 7A A5 3D 9F 46 FE 7C  6.&.._.C.z.=.F..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.524 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.549 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.551 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.553 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.576 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 22 71 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:37.000 UTC",
#       "not  after"         : "2024-01-23 18:21:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 1B 4B B5 54 BE C8 0F   4A AD E2 ED C8 07 82 7C  W.K.T...J.......
#           0010: 1E B2 5D FA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.576 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.635 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.639 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 01 03 69 39 AB 00 17 C9   67 B0 35 23 A8 45 B5 0F  ..i9....g.5#.E..
#     0010: A5 EC 2E 36 8C C9 33 17   AE 96 3C 9E A4 2E 46 7C  ...6..3...<...F.
#     0020: 58 8F E0 5C FD 23 15 1E   54 E6 87 50 EE B6 53 0A  X..\.#..T..P..S.
#     0030: 62 E6 1C F1 D8 B9 B0 36   A9 38 01 F3 44 F5 F2 02  b......6.8..D...
#     0040: 11 38 E3 06 AA AC E5 4F   4E E3 D7 FB 96 CE 25 30  .8.....ON.....%0
#     0050: 3B 88 3E A6 D4 B9 F4 AF   19 02 9D 34 96 1C 7A 15  ;.>........4..z.
#     0060: 2A 98 63 01 3B B7 8B 6A   19 E3 2C 51 B6 77 50 4F  *.c.;..j..,Q.wPO
#     0070: 67 E7 29 43 2B D4 EA 19   DE A6 FE B2 D9 6E F1 57  g.)C+........n.W
#     0080: 9B 26 8F 05 54 09 A6 C1   20 60 66 E7 40 74 36 5A  .&..T... `f.@t6Z
#     0090: 05 1E 8B 87 02 99 91 1C   70 BF BB 4B FA C3 7B 9B  ........p..K....
#     00A0: 39 54 3C 9F 89 D4 5C 7E   82 E3 A1 FB 6B EF 0C E8  9T<...\.....k...
#     00B0: 3E 37 AE BB F3 B7 9C EF   F7 05 AB FD CE 16 52 28  >7............R(
#     00C0: CE C2 FD 92 6C 56 93 42   A5 7F 88 3B 74 23 2E CD  ....lV.B...;t#..
#     00D0: 57 37 18 78 96 21 FC 87   BC 5E D8 78 EE 1E 1B 7B  W7.x.!...^.x....
#     00E0: 72 86 5F 2A 93 7E 78 DA   C1 A5 90 9E F1 3A 0A 14  r._*..x......:..
#     00F0: BA 34 96 D1 AD FE 3C 2C   B6 60 75 5B 91 8A 05 10  .4....<,.`u[....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.641 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF AC 03 A8 6C FB 7D FC   AB B0 53 3A AC 2F E4 81  ....l.....S:./..
#     0010: AD 5C C9 28 89 A9 0A 80   06 9B 27 94 48 B8 B2 05  .\.(......'.H...
#     0020: 43 55 B0 0A 38 14 1E CB   29 3A C1 63 82 4D D6 AD  CU..8...):.c.M..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.642 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.643 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.643 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.646 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 BB 0D 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:41.000 UTC",
#       "not  after"         : "2024-01-23 18:21:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#           0010: FA 54 1B A6                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.668 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 A8 2A 21 86 6D D0 4B   DE 9B 45 8A 27 59 8C E9  v.*!.m.K..E.'Y..
#     0010: AC DC 22 98 A6 EA 15 00   50 8E 64 2B 1C 78 49 CA  ..".....P.d+.xI.
#     0020: C6 85 D2 12 39 76 3B 24   C9 72 D0 FB 83 AF C9 AB  ....9v;$.r......
#     0030: E4 4F 07 AB ED EE EA D9   05 F0 E5 39 15 E7 2A 65  .O.........9..*e
#     0040: EE DF EC 6C EA 5C 01 BC   25 3C 07 9E 6E E7 6F 23  ...l.\..%<..n.o#
#     0050: 10 5E 77 22 48 FA 18 3A   F1 26 0F 7D A4 13 D9 F8  .^w"H..:.&......
#     0060: 95 11 8C D2 8C 4C 23 14   5E 0B F9 C2 99 F9 FC 87  .....L#.^.......
#     0070: 8D C3 D6 6A D6 B9 B4 59   24 43 B7 1C 81 8C C1 3B  ...j...Y$C.....;
#     0080: 73 15 37 5E 15 6D 95 F3   14 3B 11 9E 13 3E 73 16  s.7^.m...;...>s.
#     0090: 38 59 61 F7 4F CB 0F 8E   E1 39 F7 62 D9 B2 48 01  8Ya.O....9.b..H.
#     00A0: C1 E7 57 04 E7 51 A0 BD   C4 5E A2 B0 E1 9B 85 4E  ..W..Q...^.....N
#     00B0: 64 7A 24 45 AC 28 7E 27   00 E6 E9 3E AD 62 02 68  dz$E.(.'...>.b.h
#     00C0: E7 6A 76 F4 8D 4D D4 5A   EB 40 BD DA D5 57 01 19  .jv..M.Z.@...W..
#     00D0: A0 43 29 F4 6E 48 B0 A3   53 42 CF B2 4B BF 85 36  .C).nH..SB..K..6
#     00E0: 59 75 0D 06 21 68 38 AB   2C F2 9B 43 A5 0B C5 A0  Yu..!h8.,..C....
#     00F0: CC 43 2B B3 17 65 18 84   59 A0 DF CB FA 01 00 3A  .C+..e..Y......:
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.670 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F8 D5 59 42 0E 95 C6 E5   11 3C AD B4 C5 5B 78 21  ..YB.....<...[x!
#     0010: 12 2E 2F BF C6 12 46 70   0D CB F3 8F 74 EA 03 83  ../...Fp....t...
#     0020: 34 B3 F7 71 4C E8 C8 3B   38 B4 4C A7 D5 D4 3D B8  4..qL..;8.L...=.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.670 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.756 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.758 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4E 70 2F D9 30 2D E8 F6 47 3F 5D 36 F6 5F CD D6 BB 29 1C 49 82 2F 4C AF C7 2B 2D 11 81 4B 3B 93",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 18:22:01.179 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 18:22:01.180 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-25 18:22:14.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:14.606 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 4C AB AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:32.000 UTC",
#       "not  after"         : "2024-01-23 18:21:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:14.619 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.150 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.152 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.152 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.156 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.166 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.167 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.167 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.169 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "44 3A 41 10 E5 FC 32 73 FE 1A C4 9B EA BB 2F 73 E6 75 03 F2 C8 07 8E 8F B6 7E D2 01 EF 9C BB 5B",
#     "session id"          : "7F A8 02 2F 73 73 85 FF F9 53 CC 7F 4D C7 BC 86 A4 BB BD A4 2D E7 1E DD 54 43 47 B4 68 28 4B 23",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A5 E5 6F 71 6B C9 3E 11   75 CD 80 45 2B F8 B4 7D  ..oqk.>.u..E+...
#               0010: 7D 36 32 96 54 06 CF 71   2B E9 F3 85 0D EF 4A 50  .62.T..q+.....JP
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C2 D7 8C C9 12 37 9B F7 D2 C9 C3 5D A3 39 A3 F2 A9 2C 48 A1 8B A8 CE 5E 14 12 EE CB 8D 61 0F 67",
#     "session id"          : "7F A8 02 2F 73 73 85 FF F9 53 CC 7F 4D C7 BC 86 A4 BB BD A4 2D E7 1E DD 54 43 47 B4 68 28 4B 23",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 10 79 03 7B 87 CF EE   01 13 CF AF 0C D0 F3 88  D.y.............
#             0010: EE 50 CB DD 85 30 A3 B1   95 4A 8B 0D 3B 61 59 33  .P...0...J..;aY3
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.200 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.202 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.205 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificat

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:23:32.655 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43586/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14409ms
ok 78 stop command for single port in 17752ms
ok 79 status detects locally running solr in 9341ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7522ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1095ms
ok 82 listing out files in 2881ms
ok 83 copying files around in 6561ms
ok 84 upconfig in 2554ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1251ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1242ms
ok 87 Cleanup in 2077ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 7m 4s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3lv2fewxtke4q

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8244 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8244/

1 tests failed.
FAILED:  org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget

Error Message:
java.lang.AssertionError: The non-source node '127.0.0.1:46587_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>

Stack Trace:
java.lang.AssertionError: The non-source node '127.0.0.1:46587_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>
	at __randomizedtesting.SeedInfo.seed([9A3018CA9339638A:B45BCCF0A65AB2FE]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget(MigrateReplicasTest.java:303)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 4133 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32885/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-25 12:54:27.654; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:54:27.658; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:32885/solr] to [https://127.0.0.1:32885].
# WARN  - 2023-10-25 12:54:28.514; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 12:54:28.552; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16965ms
ok 74 start solr with client truststore and security manager in 19748ms
not ok 75 start solr with mTLS needed in 50740ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-O1u2aT/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 32885 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32885 (pid=3409191). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 32886 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 32886 (pid=3409316). Happy searching!
#
#     INFO  - 2023-10-25 12:55:29.615; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:55:29.635; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:55:30.465; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:30.467; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:30.470; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.542 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9E 6F EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:17.000 UTC",
#     "not  after"         : "2024-01-23 12:55:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#         0010: D5 86 BD 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.546 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 F0 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:08.000 UTC",
#     "not  after"         : "2024-01-23 12:55:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.581 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.518 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.519 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.523 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.531 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.544 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.544 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.550 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.552 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7B AF E4 4E 62 C9 96 F6 0F 53 16 44 13 D7 C8 AD 8F C3 73 92 BD 66 81 2C 92 79 7A E6 A9 DB 9A 38",
#   "session id"          : "3A 9A C6 B4 ED 7E 7F 85 05 3E 1C A4 72 97 8D 16 A7 27 4F C2 97 B8 36 8D 71 AD 05 09 A3 95 58 CE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B7 3D 67 13 5F 11 57 F5   B0 DB E8 52 7D 6F F1 9C  .=g._.W....R.o..
#             0010: 64 30 07 4C 65 60 69 1E   07 52 64 BE 97 78 70 38  d0.Le`i..Rd..xp8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.745 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4E 49 16 C7 10 17 BA 12 2A E9 7C A4 F7 8E FC 4D EF DD AC 9D D1 2B 82 23 C1 60 CC D2 D6 5B 1C 77",
#   "session id"          : "3A 9A C6 B4 ED 7E 7F 85 05 3E 1C A4 72 97 8D 16 A7 27 4F C2 97 B8 36 8D 71 AD 05 09 A3 95 58 CE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 45 30 79 07 ED 7C CC A1   FA F4 58 B7 6F 18 B4 18  E0y.......X.o...
#           0010: EB D6 02 09 F3 89 1B 6F   E6 38 4E D9 A6 13 F7 3D  .......o.8N....=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.745 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.746 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.756 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.768 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.768 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.808 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.810 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.811 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.844 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.852 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.853 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.865 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 82 49 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:13.000 UTC",
#       "not  after"         : "2024-01-23 12:55:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 8A 18 F3 43 28 C4 46   F5 03 E2 CC 5A 31 F6 BE  :...C(.F....Z1..
#           0010: 73 18 AF 03                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.865 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.967 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.977 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 65 69 C7 3A 6B 34 87   7C 8B C3 33 02 A1 08 5D  .ei.:k4....3...]
#     0010: 55 B3 3D 33 8F 5F 9F 27   EA FE A0 BE 84 C8 2E D7  U.=3._.'........
#     0020: 1F 63 00 D0 32 C0 CB CD   5E 9D 1D ED E5 15 79 97  .c..2...^.....y.
#     0030: C3 32 91 49 94 97 2D B1   41 7B 11 C7 AD F5 4A 6F  .2.I..-.A.....Jo
#     0040: C9 6B 5C 06 18 E1 0E 47   A7 13 A2 F0 68 87 55 09  .k\....G....h.U.
#     0050: 74 FF 93 26 17 2F 52 FA   69 01 A3 23 29 6B 2B FF  t..&./R.i..#)k+.
#     0060: 19 76 0E B4 06 7C 57 96   6B 9E C5 38 6B 87 74 40  .v....W.k..8k.t@
#     0070: 27 3D 39 FE B9 1B F0 D2   6A 3B B4 C9 D5 1B DB 80  '=9.....j;......
#     0080: 07 F4 1D B2 CA E7 12 19   4F 23 4C D1 86 44 36 CE  ........O#L..D6.
#     0090: 25 7E 65 63 FC D4 7B 24   E8 19 EB AE 00 9D A0 E0  %.ec...$........
#     00A0: AC D8 54 5D B8 1F 07 DA   D6 E7 6F 49 A5 9D DC 1A  ..T]......oI....
#     00B0: D5 96 F1 5D AA EF 72 F2   D8 74 07 8B 36 0E 8D 65  ...]..r..t..6..e
#     00C0: BD 75 53 7B 55 D7 47 A2   88 89 EF C6 57 11 53 40  .uS.U.G.....W.S@
#     00D0: 6C BA E3 6A 9A AA 25 04   7B E1 05 88 16 24 72 92  l..j..%......$r.
#     00E0: 61 92 EE 6B DD D5 22 54   85 04 D0 F3 EC EB 87 36  a..k.."T.......6
#     00F0: 1A 8C CE 1B 71 29 09 24   66 2E 2B 46 7C F3 F1 E8  ....q).$f.+F....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.978 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A7 90 29 17 0F 4E 7F 04   4A 69 D9 3B 12 39 62 77  ..)..N..Ji.;.9bw
#     0010: DE 2A 89 92 50 DC A6 8B   09 EA 76 6F DF 32 01 FB  .*..P.....vo.2..
#     0020: 05 83 A3 2F 5D B1 80 71   62 7D 9F E1 75 F8 43 B5  .../]..qb...u.C.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.981 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.988 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9E 6F EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:17.000 UTC",
#       "not  after"         : "2024-01-23 12:55:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#           0010: D5 86 BD 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.042 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 71 77 2D D3 9E A4 9A   CD 58 DB 63 F0 F7 61 1F  .qw-.....X.c..a.
#     0010: 7E 42 F3 CE A3 77 BB 74   24 E9 79 BA FE F1 FB 36  .B...w.t$.y....6
#     0020: 16 AB 87 05 B9 33 C4 F3   34 A0 73 DE 6C 6A 74 6D  .....3..4.s.ljtm
#     0030: E5 40 8B 2E 91 8A C5 D4   28 CD B7 BF 0F F2 71 3F  .@......(.....q?
#     0040: 8F CD 64 56 69 78 74 3E   80 33 B4 91 B7 38 B5 49  ..dVixt>.3...8.I
#     0050: B5 36 D6 B7 66 82 02 C4   CA 88 3B A6 BE A8 89 64  .6..f.....;....d
#     0060: 84 4A 54 2B EC 5E C2 C0   34 AF A2 57 45 9C 5B B1  .JT+.^..4..WE.[.
#     0070: 02 56 5B 02 A3 73 A5 D7   37 0F 95 7E 4E F8 F1 93  .V[..s..7...N...
#     0080: 94 1C 19 EA 55 62 0F 5E   54 AC 97 37 E6 15 57 59  ....Ub.^T..7..WY
#     0090: F9 49 4E DA F9 77 C9 8A   00 0E 96 E9 AC 6E C8 B6  .IN..w.......n..
#     00A0: 16 0B 16 36 D8 21 9C 87   C9 FE 4C 35 FB 45 76 56  ...6.!....L5.EvV
#     00B0: F4 16 24 5C 03 59 F4 38   94 BA EF D7 65 5A FF A1  ..$\.Y.8....eZ..
#     00C0: 14 B5 9A 85 01 EE BD A6   3E 8B 57 91 19 8E DD 79  ........>.W....y
#     00D0: 3B 42 FD 3D 69 1E 95 3E   F3 C5 E2 7A C8 23 5E C8  ;B.=i..>...z.#^.
#     00E0: 2A 9A AE 91 08 BC 96 38   51 0A 1A 10 F3 26 1B D6  *......8Q....&..
#     00F0: 4E 6A A4 24 8A 41 BD 2E   38 16 D6 B9 E6 43 02 02  Nj.$.A..8....C..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.052 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 0C F2 D2 AC FF 61 BE   D6 88 26 3D 4F 3E DE 93  ......a...&=O>..
#     0010: 83 EE A0 FB F2 01 38 3A   F7 7B CC 12 3F 03 0D 0D  ......8:....?...
#     0020: F5 47 AF C4 10 29 83 21   53 07 09 45 87 62 59 03  .G...).!S..E.bY.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.052 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.146 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "98 0C 17 65 12 AF 9B 38 38 72 48 51 B2 BE 45 D1 24 E2 C4 3E F4 B9 22 DC 6D E2 31 4B B0 B1 BD 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:55:33.028 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:55:33.029 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 12:55:34.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:55:34.819; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:55:35.231; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:35.233; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:35.234; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.270 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9E 6F EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:17.000 UTC",
#     "not  after"         : "2024-01-23 12:55:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#         0010: D5 86 BD 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.274 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 F0 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:08.000 UTC",
#     "not  after"         : "2024-01-23 12:55:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.286 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.461 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.461 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.463 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.463 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.482 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6D CF 58 6B AF E1 BC 0B 3F 90 17 E0 59 22 7A 91 68 04 7A 23 9F 70 61 45 36 BA 45 4B 16 9E FD 90",
#   "session id"          : "5B 37 E8 46 95 E4 24 27 0B 7F B6 9D C7 85 8A 9F 06 FA 60 7A 99 58 A3 A1 43 C4 8C 1B 9D 16 D7 B4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 12 B3 FF C6 AB D5 B4   00 9D 84 13 F1 9C 4A DE  ..............J.
#             0010: 5F 3E 60 8E 69 0E 98 8C   BC 77 64 17 52 0A 4B 69  _>`.i....wd.R.Ki
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 31 46 73 0D 18 39 E0 17 CF BB D8 37 FE 87 BE 3F 24 A3 F6 86 E1 FE F8 D5 B1 5E A2 2B 18 CC DE",
#   "session id"          : "5B 37 E8 46 95 E4 24 27 0B 7F B6 9D C7 85 8A 9F 06 FA 60 7A 99 58 A3 A1 43 C4 8C 1B 9D 16 D7 B4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A2 B9 03 F1 1D F0 78 7E   9D 80 C8 C0 A8 F3 A5 F1  ......x.........
#           0010: 94 CF 2C C6 C8 4E B5 93   49 7C C6 BE E6 BF D4 60  ..,..N..I......`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.613 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.620 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.627 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.628 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.640 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 82 49 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:13.000 UTC",
#       "not  after"         : "2024-01-23 12:55:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 8A 18 F3 43 28 C4 46   F5 03 E2 CC 5A 31 F6 BE  :...C(.F....Z1..
#           0010: 73 18 AF 03                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.641 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.713 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.719 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D FA 54 A3 57 10 C8 6C   30 1D 4E 62 B3 81 05 94  M.T.W..l0.Nb....
#     0010: EE F9 3C 75 08 F0 DC 51   4C 56 DF 3B 8D AD 31 72  ..<u...QLV.;..1r
#     0020: DC 85 CC 67 F6 69 61 80   DC 5C D0 A8 5A 5A E9 6F  ...g.ia..\..ZZ.o
#     0030: 24 F6 F6 07 D4 AA F5 A3   48 D3 75 A0 B8 4D 12 33  $.......H.u..M.3
#     0040: 9A 41 66 0F 26 43 CB 6C   B5 3B 53 7A B4 80 65 44  .Af.&C.l.;Sz..eD
#     0050: 73 68 81 15 08 24 7F 48   46 7A C9 BC F6 9C B3 96  sh...$.HFz......
#     0060: EE 22 E6 8F 82 F7 65 9D   8F B7 0C 85 FF 66 A6 80  ."....e......f..
#     0070: 0D 14 DF 95 C9 62 09 4D   D9 82 6D BA 29 52 FB 46  .....b.M..m.)R.F
#     0080: DB F2 29 8E 99 57 D0 BC   01 6D 0A 81 BB 8A 51 D8  ..)..W...m....Q.
#     0090: 9E 61 FB 61 D5 4C A9 58   EC 08 20 3A 20 3D C5 CC  .a.a.L.X.. : =..
#     00A0: 16 DE 6B E1 BB 48 73 8E   0F C4 E8 97 2E 91 7E 38  ..k..Hs........8
#     00B0: 43 80 12 50 B5 AC DC 67   D8 0C EB D2 AB F3 D7 BC  C..P...g........
#     00C0: CB C8 3F 5F 49 44 A4 28   9B 26 A8 17 5B 08 42 33  ..?_ID.(.&..[.B3
#     00D0: 3D 17 B7 69 3B 8E 5E 4E   F9 F0 36 73 DD F1 67 AB  =..i;.^N..6s..g.
#     00E0: F5 3B 39 C7 24 E9 22 43   17 CC DE E5 71 4C BC CA  .;9.$."C....qL..
#     00F0: BA 3A EA 1F 59 71 D6 98   1A 70 BF DC D4 9B 7C EC  .:..Yq...p......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.721 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0D 0D 5B 88 6E E6 2D 01   46 D9 70 82 F3 D0 E7 1D  ..[.n.-.F.p.....
#     0010: 21 82 92 EC 2D 8E 97 7D   87 1B 8A AC 4F 16 25 85  !...-.......O.%.
#     0020: F5 E3 97 F4 0E 19 A0 F9   04 D5 EA 1D 22 20 40 3B  ............" @;
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.722 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.726 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9E 6F EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:17.000 UTC",
#       "not  after"         : "2024-01-23 12:55:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#           0010: D5 86 BD 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.754 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 6B F4 9E 87 E3 F0 0F   F1 36 F8 F8 B7 07 91 08  wk.......6......
#     0010: D2 5E EC 9D B3 E2 33 6A   BA 7F 89 EB 6A 43 18 C8  .^....3j....jC..
#     0020: D7 39 5C 76 B5 F5 47 85   C3 1F 06 03 E4 EC 88 5D  .9\v..G........]
#     0030: A2 2F BD 49 16 8D E8 06   5B 72 1F 83 E3 1E 10 B3  ./.I....[r......
#     0040: B5 E2 72 60 06 56 D1 39   38 01 4D C3 4D E7 5D 68  ..r`.V.98.M.M.]h
#     0050: 97 02 FC FD 6D 86 45 6D   6B 68 B0 C4 21 23 79 80  ....m.Emkh..!#y.
#     0060: 9E 44 43 97 18 80 C1 C4   2F D7 B2 AD 53 B1 9D 04  .DC...../...S...
#     0070: 2A A3 0D D0 91 7C 73 9C   A5 CE BA 6B DA 6C 4C D0  *.....s....k.lL.
#     0080: 8E E9 FE 2F 45 88 FA 8E   DE B0 F8 01 38 9F 78 04  .../E.......8.x.
#     0090: A8 B0 E1 94 90 27 D7 2B   EC B7 BD 6F 1A 59 CE 8C  .....'.+...o.Y..
#     00A0: 52 2D D0 56 79 4C 1F 05   42 1F 5B DC 11 DB 9C 7C  R-.VyL..B.[.....
#     00B0: 74 43 BF 30 B5 5F 19 FD   2F B8 89 CA 5D A3 67 76  tC.0._../...].gv
#     00C0: 8F 5C EC 2A 38 4F 6D 28   C4 02 14 F8 F2 50 67 20  .\.*8Om(.....Pg
#     00D0: 81 93 ED FD 40 F0 16 55   E0 2B 41 B6 93 8E 70 BE  ....@..U.+A...p.
#     00E0: 6D AD 20 BC B0 15 5B C9   3F 07 62 5B 62 8A 00 5C  m. ...[.?.b[b..\
#     00F0: CC E8 45 62 6B B0 C2 A2   40 B8 D7 2B A6 2B AD 46  ..Ebk...@..+.+.F
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.755 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 06 76 5C FA 2B 18 C8 29   4B 8D 6B 7F EE 3C 2B EB  .v\.+..)K.k..<+.
#     0010: ED 0E 9E 93 B9 AF 10 8D   B7 B8 66 73 5B 14 67 14  ..........fs[.g.
#     0020: F1 08 34 34 6C A8 59 D2   9E A5 CA 15 6D 4B 13 DC  ..44l.Y.....mK..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.756 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.777 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.822 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "74 24 AC 3E D6 EF 95 D0 D2 BA 4E E3 4A 73 61 DA 27 9B 67 53 D5 31 6E BF C5 46 36 EE EB 0E 6F 13",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:55:36.137 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:55:36.138 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-25 12:55:49.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:49.447 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 26 F0 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:08.000 UTC",
#       "not  after"         : "2024-01-23 12:55:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:49.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.718 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.718 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.720 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.720 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.724 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.737 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "18 43 B8 DF AF 54 96 27 C6 73 15 6D 40 62 4A A0 28 00 A8 F9 7B 41 89 A1 D7 9C A9 91 59 BB FB BE",
#     "session id"          : "B5 1F D2 AD F1 1A F5 1D 60 50 41 1E 30 80 CA 7E 72 37 B1 C7 84 C2 E5 CF D6 85 A7 06 0E 03 8D 6A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4C 78 2F 11 83 FC B9 53   EF B4 AF BB 22 D2 AB C5  Lx/....S...."...
#               0010: 71 74 C0 7F F7 B2 92 9E   13 42 D1 1D 03 AA 3C 43  qt.......B....<C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "66 8B 39 96 7D 18 C6 59 75 5E 79 3F 3A F9 3E 1E B1 DD D5 EC 32 E2 B7 77 1C C2 B1 E1 94 B3 7C E8",
#     "session id"          : "B5 1F D2 AD F1 1A F5 1D 60 50 41 1E 30 80 CA 7E 72 37 B1 C7 84 C2 E5 CF D6 85 A7 06 0E 03 8D 6A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C 58 A9 6F 66 5C 3C BC   98 76 7C D6 96 6E 82 CE  .X.of\<..v...n..
#             0010: 24 B2 B1 08 19 E9 74 80   FB 09 16 24 12 84 E3 38  $.....t....$...8
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.757 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:49.760 UTC|SS

[...truncated too long message...]

cutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:57:02.433 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.475 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:32886/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14639ms
ok 78 stop command for single port in 18385ms
ok 79 status detects locally running solr in 9683ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7494ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1092ms
ok 82 listing out files in 3034ms
ok 83 copying files around in 6573ms
ok 84 upconfig in 2632ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1255ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
ok 87 Cleanup in 2107ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.MigrateReplicasTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=9A3018CA9339638A -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/73svf2ok7acmw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8243 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8243/

All tests passed

Build Log:
[...truncated 1519 lines...]
BUILD FAILED in 1h 5m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/bdkwg4nsmaxrs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8242 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8242/

All tests passed

Build Log:
[...truncated 1493 lines...]
BUILD FAILED in 1h 5m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/fzxrsupd7fppu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8241 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8241/

All tests passed

Build Log:
[...truncated 1414 lines...]
BUILD FAILED in 1h 5m 26s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7yw2sobcvxisi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8240 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8240/

All tests passed

Build Log:
[...truncated 1568 lines...]
BUILD FAILED in 1h 6m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uprod6xs27iuo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8239 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8239/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([8D7ACC67C69FB847:BAE13879FE5365E3]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2022 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=8D7ACC67C69FB847 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 9s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/a6ukutag3p6ie

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8238 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8238/

All tests passed

Build Log:
[...truncated 1438 lines...]
BUILD FAILED in 1h 5m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/w6pyzygehomfq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8237 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8237/

All tests passed

Build Log:
[...truncated 1443 lines...]
BUILD FAILED in 1h 4m 42s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/6sdseuprn4yjs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8236 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8236/

All tests passed

Build Log:
[...truncated 1435 lines...]
BUILD FAILED in 1h 5m 51s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3shwx3kssdwj6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8235 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8235/

All tests passed

Build Log:
[...truncated 1449 lines...]
BUILD FAILED in 1h 3m 45s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vrmgz3zyrlkrk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8234 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8234/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([394CC427F3ECF24C:ED73039CB202FE8]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1980 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=394CC427F3ECF24C -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/epgwchjfnbdlg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8233 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8233/

All tests passed

Build Log:
[...truncated 1445 lines...]
BUILD FAILED in 1h 5m 30s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3bvmmozuozpvm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8232 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8232/

All tests passed

Build Log:
[...truncated 1399 lines...]
BUILD FAILED in 1h 6m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/yugmfbwmr4kcc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8231 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8231/

All tests passed

Build Log:
[...truncated 1458 lines...]
BUILD FAILED in 1h 4m 8s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uss42e7oadbmq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8230 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8230/

All tests passed

Build Log:
[...truncated 1423 lines...]
BUILD FAILED in 1h 3m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/xqmtwvy4j3epm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8229 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8229/

1 tests failed.
FAILED:  org.apache.solr.search.TestFiltering.testRandomFiltering

Error Message:
java.lang.AssertionError: FAILURE: indexSize=67 iiter=2 qiter=67 request=[q, {!frange v=val_i l=20 u=86 cache=false}, fq, {!frange v=val_i l=7 u=11 cache=true tag=t}, fq, {! cache=true tag=t}id:RAND1679204360 OR val_s:{00028 TO 00059}, fq,  val_i:3 val_i:5 val_i:6 val_i:7 val_i:8 val_i:9 val_i:10 val_i:11 val_i:14 val_i:21 val_i:25 val_i:27 val_i:30 val_i:32 val_i:33 val_i:34 val_i:35 val_i:36 val_i:39 val_i:40 val_i:41 val_i:42 val_i:43 val_i:44 val_i:45 val_i:48 val_i:49 val_i:51 val_i:52 val_i:54 val_i:56 val_i:60 val_i:61 val_i:62, facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}val_i:[00061 TO 00106] AND val_i:{00060 TO 00107}]

Stack Trace:
java.lang.AssertionError: FAILURE: indexSize=67 iiter=2 qiter=67 request=[q, {!frange v=val_i l=20 u=86 cache=false}, fq, {!frange v=val_i l=7 u=11 cache=true tag=t}, fq, {! cache=true tag=t}id:RAND1679204360 OR val_s:{00028 TO 00059}, fq,  val_i:3 val_i:5 val_i:6 val_i:7 val_i:8 val_i:9 val_i:10 val_i:11 val_i:14 val_i:21 val_i:25 val_i:27 val_i:30 val_i:32 val_i:33 val_i:34 val_i:35 val_i:36 val_i:39 val_i:40 val_i:41 val_i:42 val_i:43 val_i:44 val_i:45 val_i:48 val_i:49 val_i:51 val_i:52 val_i:54 val_i:56 val_i:60 val_i:61 val_i:62, facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}val_i:[00061 TO 00106] AND val_i:{00060 TO 00107}]
	at __randomizedtesting.SeedInfo.seed([52FBBACC94C7D024:4D98190971E0902D]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.search.TestFiltering.testRandomFiltering(TestFiltering.java:576)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 3041 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestFiltering.testRandomFiltering (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestFiltering.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestFiltering.testRandomFiltering" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=52FBBACC94C7D024 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 52s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ooqpujx3cz2me

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8228 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8228/

All tests passed

Build Log:
[...truncated 1429 lines...]
BUILD FAILED in 1h 2m 10s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/q3knwsj67rvkk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8227 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8227/

All tests passed

Build Log:
[...truncated 1409 lines...]
BUILD FAILED in 1h 4m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/rxszpphxsjpzg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8226 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8226/

2 tests failed.
FAILED:  org.apache.solr.HelloWorldSolrCloudTestCase.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([6B1E8E1597B8FEF6]:0)


FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([6B1E8E1597B8FEF6:5C857A0BAF742352]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 7440 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35529/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-20 05:35:43.624; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:35:43.629; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35529/solr] to [https://127.0.0.1:35529].
# WARN  - 2023-10-20 05:35:44.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 05:35:44.529; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 18386ms
ok 74 start solr with client truststore and security manager in 20546ms
not ok 75 start solr with mTLS needed in 53346ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-44C8sf/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35529 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35529 (pid=2314723). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35530 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35530 (pid=2314845). Happy searching!
#
#     INFO  - 2023-10-20 05:36:49.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:36:49.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 05:36:50.758; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:50.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:50.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.802 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 BB BA 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:35.000 UTC",
#     "not  after"         : "2024-01-18 05:36:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#         0010: 05 67 A1 A9                                        .g..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.806 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 83 73 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:26.000 UTC",
#     "not  after"         : "2024-01-18 05:36:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.820 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.288 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.375 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.379 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.380 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.401 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.429 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.430 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.430 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.436 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1F 8A 53 C5 7A 80 60 A6 28 80 D6 63 98 EE 52 F6 7F 4C 60 56 B1 0D 78 FC AC A8 AE 2C AF 63 A9 B4",
#   "session id"          : "42 74 40 00 C4 90 8C DC 0A D0 D2 B0 86 81 BB 1E 1C C8 DB B2 22 2D AA 53 F4 C4 03 48 C3 70 40 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 85 20 5B 1B 53 D4 0A C6   0E 84 1F 3A 80 00 8D CF  . [.S......:....
#             0010: 8C 72 99 4A 01 0D A5 E5   14 E7 5C B2 CC 8B 43 5F  .r.J......\...C_
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.652 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "89 ED 1E 3A 1A 1B 6C FC F6 37 88 FA 94 B2 DB 3C 28 20 08 48 49 CF B5 3F 97 4F 38 60 EE D3 B4 B5",
#   "session id"          : "42 74 40 00 C4 90 8C DC 0A D0 D2 B0 86 81 BB 1E 1C C8 DB B2 22 2D AA 53 F4 C4 03 48 C3 70 40 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 47 B0 81 91 4D D8 A6 A5   FF F5 45 2D 4F BE EB E4  G...M.....E-O...
#           0010: 51 F4 C6 56 65 EA 1E 05   DF 8D BA 34 14 DB D9 40  Q..Ve......4...@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.653 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.653 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.669 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.711 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.713 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.718 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.727 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.740 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.749 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.750 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.750 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.758 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 78 03 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:31.000 UTC",
#       "not  after"         : "2024-01-18 05:36:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 34 B4 36 7D DE 2F 2E   40 3A B6 2A 39 B7 EB C3  .4.6../.@:.*9...
#           0010: 11 D0 02 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.876 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.890 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 7C EA 68 A7 09 35 DD   6F D4 DB 2F 97 6D 0E 0D  ...h..5.o../.m..
#     0010: A1 A5 7E 40 14 C6 1D E3   C9 B3 46 45 45 49 CA 8F  ...@......FEEI..
#     0020: 8D 1B 3B D9 92 E2 F9 6D   75 6B F8 76 60 63 F6 88  ..;....muk.v`c..
#     0030: 49 B0 D8 E4 EF 8F 0D D9   01 46 6D 3E BD E9 45 63  I........Fm>..Ec
#     0040: 09 F6 93 AD E1 28 18 4D   10 C1 CA 93 38 62 8F C5  .....(.M....8b..
#     0050: 1C 3A 31 B9 26 4E 17 2E   CA 11 D8 80 E4 13 8A 3F  .:1.&N.........?
#     0060: CA 11 BD 5D 07 8F AE 05   19 6A 5E FF 83 90 F0 DA  ...].....j^.....
#     0070: 28 BC 30 1A D8 EE 02 F0   58 98 30 ED CE 68 21 57  (.0.....X.0..h!W
#     0080: 47 B4 9E D8 53 B0 A2 50   2A 11 F2 9D 66 12 27 6A  G...S..P*...f.'j
#     0090: 68 32 D8 67 A2 0D 92 C4   AF 2B 79 23 6D C7 C5 31  h2.g.....+y#m..1
#     00A0: 13 A6 A9 B8 DB 55 34 26   71 5C 2A AB F8 45 A0 F2  .....U4&q\*..E..
#     00B0: CF 97 B5 BE AC D7 88 33   7B A6 04 C7 D6 BF FB 03  .......3........
#     00C0: 81 D1 13 68 30 D8 0B 4F   18 F7 77 8F 2D AF 1C 26  ...h0..O..w.-..&
#     00D0: 0A A3 FF BD A9 E4 C7 EA   CE 9F 25 C8 64 7B 6E 7A  ..........%.d.nz
#     00E0: BB 9B 34 A8 34 1A 89 20   2B 03 46 F2 E2 BB F9 CF  ..4.4.. +.F.....
#     00F0: 33 F0 74 CE 76 3D 5F 52   FC A0 B3 A3 CA EB 55 CE  3.t.v=_R......U.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.893 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A0 8D 29 A6 49 01 5D CC   9C 0D 0B D4 10 4D EA CF  ..).I.]......M..
#     0010: 9B 5A 6F BC CF 62 6F EF   5B B8 34 52 E3 9D 48 18  .Zo..bo.[.4R..H.
#     0020: 04 49 B6 BF 21 4B A7 46   0D 11 77 50 03 D8 34 69  .I..!K.F..wP..4i
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.897 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.898 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.899 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.899 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.900 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.901 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.903 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.904 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.906 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 BB BA 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:35.000 UTC",
#       "not  after"         : "2024-01-18 05:36:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#           0010: 05 67 A1 A9                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.059 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 06 A3 EC FB 08 78 26   17 51 49 24 E8 91 33 0B  _.....x&.QI$..3.
#     0010: 1F D7 F1 65 56 9D 31 1E   60 6C 48 80 C9 C7 B4 20  ...eV.1.`lH....
#     0020: 6D D0 42 BC B8 EF B2 78   6C 60 F3 2E 28 95 57 92  m.B....xl`..(.W.
#     0030: BF FB 7E A7 0F FE C1 E7   F2 30 66 1C F9 BE 2C 0D  .........0f...,.
#     0040: C5 29 9E F8 5A 70 A6 F8   D5 00 F9 34 44 26 8B 2E  .)..Zp.....4D&..
#     0050: 11 F3 CE 1B 41 2B 0A 2A   16 62 19 2F 3F 5C DF 84  ....A+.*.b./?\..
#     0060: C6 AE 33 F8 12 EF 3B BF   5A 3D FC 7A 76 E8 D9 34  ..3...;.Z=.zv..4
#     0070: CA A2 97 CD DA BB 52 D1   E5 6C AA A8 1E 1E 1F C3  ......R..l......
#     0080: 4C 2B DF DA B7 10 45 D1   93 6B 79 1F 37 75 62 8F  L+....E..ky.7ub.
#     0090: C5 F9 08 32 A3 C3 D0 CC   78 FB 2F 0A 67 77 06 C4  ...2....x./.gw..
#     00A0: BA 95 5D BD 46 4D 02 91   CD F6 0A 2D 33 56 00 6A  ..].FM.....-3V.j
#     00B0: D4 4B 2E DD 66 B5 3A B3   47 90 BB 85 58 DA 98 A0  .K..f.:.G...X...
#     00C0: 4E 97 C2 B8 9B CF 56 C9   E9 24 1D B6 5C 6B BC 54  N.....V..$..\k.T
#     00D0: AF 6B 96 56 BF BD 4A DB   E1 EA 55 92 BC 4A 95 98  .k.V..J...U..J..
#     00E0: 15 C9 77 B5 19 D8 93 34   8D CA 10 77 7F 40 9A 06  ..w....4...w.@..
#     00F0: DA 1E FF E6 61 AF E6 85   64 0C B3 7B 32 D1 50 65  ....a...d...2.Pe
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.061 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B4 CD 2D 54 92 10 02 80   C4 1C BA 06 5E 75 FE E2  ..-T........^u..
#     0010: CC D2 E7 FB 19 F8 4C 2A   80 0F 44 35 BD C5 1C EE  ......L*..D5....
#     0020: 6B 87 6D E5 9A 82 D7 72   EA B5 74 D7 07 7C 82 9C  k.m....r..t.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.061 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.135 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0D FE 4F 3E 80 92 ED BB 1F 10 5E 5C 66 F7 4C 8C A6 B3 D4 27 72 29 6C AA E4 10 0B 13 23 44 DC 76",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 05:36:52.940 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 05:36:52.941 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 05:36:54.321; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:36:54.326; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 05:36:54.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:54.749; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:54.749; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.787 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 BB BA 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:35.000 UTC",
#     "not  after"         : "2024-01-18 05:36:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#         0010: 05 67 A1 A9                                        .g..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.791 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 83 73 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:26.000 UTC",
#     "not  after"         : "2024-01-18 05:36:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.804 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.089 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.091 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.092 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.096 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.107 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.108 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.108 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.110 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "44 49 50 B9 AB 0C 33 B9 E3 5E D2 11 83 78 38 6B 80 7A 9E 3E 6F 47 D4 7A CF 54 5A 0D 8B 4E 66 03",
#   "session id"          : "60 48 98 DE 33 F3 59 75 D5 AB 0F 7B 95 FB 67 40 47 2D D7 8D FF A6 92 DF 10 43 57 5F CA B9 63 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B5 3C 90 96 87 88 65 D3   12 A6 6B 2E 6D 66 61 29  .<....e...k.mfa)
#             0010: 2A F3 2F 9B 1B E2 6B 73   E1 BD 81 17 73 86 21 43  *./...ks....s.!C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.228 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "ED F9 AA D5 A9 F7 D4 37 EA 80 95 AB FE CE 91 0B A5 E5 B3 BC 48 3A 8E 24 62 6B 25 25 C4 CD D9 A5",
#   "session id"          : "60 48 98 DE 33 F3 59 75 D5 AB 0F 7B 95 FB 67 40 47 2D D7 8D FF A6 92 DF 10 43 57 5F CA B9 63 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7A D5 25 C3 96 39 94 78   B3 D7 32 31 F0 9F 2B F9  z.%..9.x..21..+.
#           0010: CF F3 63 37 B6 8A 73 9B   F8 E6 A0 EB E2 D1 95 0C  ..c7..s.........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.237 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.249 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.254 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.256 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.271 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.272 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.273 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.273 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.284 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 78 03 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:31.000 UTC",
#       "not  after"         : "2024-01-18 05:36:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 34 B4 36 7D DE 2F 2E   40 3A B6 2A 39 B7 EB C3  .4.6../.@:.*9...
#           0010: 11 D0 02 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.285 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.343 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.346 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 C7 AB C2 52 BA E3 17   D4 F3 6A CC CF 31 7C 19  0...R.....j..1..
#     0010: 04 1B 1E 4C 0B DC 6F FF   83 CB B4 A5 E4 27 63 68  ...L..o......'ch
#     0020: 5D AB E7 76 6E 7E B9 D6   D1 F7 C4 99 A2 FB 9C 7B  ]..vn...........
#     0030: B8 40 63 3F 96 02 8C 80   3A DA A5 EC ED 65 E5 EB  .@c?....:....e..
#     0040: 9A 69 D7 6C 05 2D AC 52   30 51 B0 5A 7F B7 70 72  .i.l.-.R0Q.Z..pr
#     0050: FA 3F F8 EF 41 00 25 83   DE 00 7D EE EB 6F 31 C2  .?..A.%......o1.
#     0060: 61 EF 8C 54 74 6B F0 C6   82 52 31 99 26 D0 18 C4  a..Ttk...R1.&...
#     0070: 9B A6 D6 4D 8B 37 64 6E   49 92 77 45 BD 93 CB 52  ...M.7dnI.wE...R
#     0080: D8 E7 A0 E5 FA 85 2B 57   CF 55 90 AE 84 97 D8 FE  ......+W.U......
#     0090: B7 B5 A0 80 8F A4 33 D6   F9 56 29 F8 5E 9B E5 4A  ......3..V).^..J
#     00A0: FE E4 A6 3C D0 DE 01 97   E4 6D B3 36 E2 B6 6F 3A  ...<.....m.6..o:
#     00B0: 96 5D 61 F7 F9 B9 C2 20   C6 D9 01 90 95 D5 03 9E  .]a.... ........
#     00C0: 47 E5 18 05 90 5F 06 16   0F 31 67 0C 7B 76 F8 97  G...._...1g..v..
#     00D0: B7 DD 9C 7D 79 C8 4E FE   8B DB 75 89 BF E2 79 63  ....y.N...u...yc
#     00E0: 0D 22 6F 6C F8 66 5A E2   D0 0B 92 20 34 EF EA 45  ."ol.fZ.... 4..E
#     00F0: 66 6B 9E D7 09 07 94 43   C1 40 25 81 FC FB 84 B7  fk.....C.@%.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.347 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 6F 1E 9D C0 89 4E 44   D0 B1 D9 88 A4 65 DA C7  .o....ND.....e..
#     0010: 96 A1 7A C8 2D 34 1A ED   BA 7F 16 2D CE AB 82 D1  ..z.-4.....-....
#     0020: 5F 17 5D 4B 66 FD 81 49   D0 7B D7 1C 5F 2C AA 62  _.]Kf..I...._,.b
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.349 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.351 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.353 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 BB BA 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:35.000 UTC",
#       "not  after"         : "2024-01-18 05:36:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#           0010: 05 67 A1 A9                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.376 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8A 58 3C 82 B3 BA 06 67   05 C6 DD 03 98 99 DC 21  .X<....g.......!
#     0010: 04 6C 93 8D C5 A3 44 3B   67 02 89 67 6C 91 4E 9B  .l....D;g..gl.N.
#     0020: D6 74 55 74 A2 0C 85 54   0E 02 B1 44 4F 94 0E 62  .tUt...T...DO..b
#     0030: 3A BA 32 78 98 45 C3 ED   23 66 06 11 E9 81 40 99  :.2x.E..#f....@.
#     0040: CE C0 00 71 C4 60 8D 11   78 C1 9B 3D F2 DB D4 A2  ...q.`..x..=....
#     0050: 4E 3C 49 E5 B1 A3 91 31   D7 18 2C 26 47 C5 6D CA  N<I....1..,&G.m.
#     0060: 60 B8 33 39 CD 3F 92 63   A0 98 46 4A EA 5E 15 2C  `.39.?.c..FJ.^.,
#     0070: 76 D4 74 80 08 18 DA EF   24 81 CD 34 F0 E5 3F 59  v.t.....$..4..?Y
#     0080: 61 C9 49 A3 6B 54 A3 2C   AF 61 E4 FF 04 40 88 40  a.I.kT.,.a...@.@
#     0090: 31 8D 66 C9 FD 60 89 4E   4F 6E 7B 64 5A 7A B5 49  1.f..`.NOn.dZz.I
#     00A0: AE 31 12 F0 1F 8F B5 64   31 5E 08 49 B9 09 BE 77  .1.....d1^.I...w
#     00B0: C8 20 1C CD F9 3B 73 AA   DA 45 39 EC B0 C0 68 4B  . ...;s..E9...hK
#     00C0: 2E 04 84 E8 43 C4 20 07   65 2E 9D 45 ED CE 86 8F  ....C. .e..E....
#     00D0: 26 72 3F D6 1B 87 38 AF   49 1A 0D 7E B5 1E DD 2A  &r?...8.I......*
#     00E0: 0E 16 2D FA DF D1 E8 E6   3C C4 CC A2 24 62 B0 D0  ..-.....<...$b..
#     00F0: 44 8D 32 0E 11 C7 B4 66   02 6A D5 13 88 57 7E 9E  D.2....f.j...W..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.378 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B4 DC 7B A8 F1 8E 87 49   F1 E4 DE C6 EC D5 B5 80  .......I........
#     0010: EE E0 05 4C BC B2 15 0D   B8 AC 78 84 47 C5 6B 8D  ...L......x.G.k.
#     0020: 28 EA 62 B1 6E 78 20 4D   10 3C A6 A1 3A BC 1B BA  (.b.nx M.<..:...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.378 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.432 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1F F3 E2 FE 81 E1 1E AF 16 AA 51 23 11 E9 EB 96 86 AB E6 7A 75 B2 42 12 BE 7B 45 AE 42 12 3D 96",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.785 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-20 05:36:55.844 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 05:36:55.845 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-20 05:37:07.821; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 05:37:08.182 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 83 73 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:26.000 UTC",
#       "not  after"         : "2024-01-18 05:36:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 05:37:08.196 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.352 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.353 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.354 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.354 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.358 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.371 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "39 E8 61 85 BB 9A F5 1E 1D 65 DE F1 AF B7 53 65 F2 E0 CA AC 08 98 B1 69 DE 0C 08 46 68 3B E9 71",
#     "session id"          : "A1 89 71 38 F2 9A 06 D6 FE 5F 88 4C 09 85 42 37 22 A6 33 0D AC 97 CF 21 11 54 3D 5E D7 53 CB 9D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4D 78 56 30 26 D5 74 D9   42 E8 91 BB 2E C3 50 05  MxV0&.t.B.....P.
#               0010: D0 35 3D 54 54 D6 C4 FA   E7 03 EB BD 1A 8A BB 56  .5=TT..........V
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "33 49 48 44 66 5B 22 EF 24 E6 F7 7A 5E F7 96 21 3C 71 C7 68 32 F8 D1 3E 81 B3 68 13 81 6B 59 C5",
#     "session id"          : "A1 89 71 38 F2 9A 06 D6 FE 5F 88 4C 09 85 42 37 22 A6 33 0D AC 97 CF 21 11 54 3D 5E D7 53 CB 9D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A3 89 9F 46 07 A9 24 2D   84 CE 49 7D 35 D3 E2 30  ...F..$-..I.5..0
#             0010: BC AE 9E 3E 35 BC 47 6D   B0 92 50 93 ED 12 EA 06  ...>5.Gm..P.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.396 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.398 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|202

[...truncated too long message...]

28)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14810ms
ok 78 stop command for single port in 17995ms
not ok 79 status detects locally running solr in 1551ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7739ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1545ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3119ms
ok 83 copying files around in 6658ms
ok 84 upconfig in 2768ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1242ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1255ms
not ok 87 Cleanup in 2548ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6B1E8E1597B8FEF6 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII

  - org.apache.solr.HelloWorldSolrCloudTestCase.classMethod (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.HelloWorldSolrCloudTestCase.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.HelloWorldSolrCloudTestCase.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6B1E8E1597B8FEF6 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 2h 40m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2ufy5pasw4gmc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8225 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8225/

All tests passed

Build Log:
[...truncated 1433 lines...]
BUILD FAILED in 1h 4m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/clkcyatxuvrcg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8224 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8224/

All tests passed

Build Log:
[...truncated 1472 lines...]
BUILD FAILED in 1h 2m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/54ylzj7m3jjfa

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8223 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8223/

All tests passed

Build Log:
[...truncated 1264 lines...]
# ERROR: Error from server at http://localhost:38115/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16033ms
ok 60 Check help command in 4557ms
ok 61 basic post with a type specified in 5751ms
ok 62 basic post WITHOUT a type specified in 11647ms
ok 63 crawling a directory in 4536ms
ok 64 crawling a web site in 4724ms
ok 65 commit and optimize and delete in 4001ms
ok 66 args mode in 6412ms
ok 67 stdin mode in 3403ms
ok 68 post solr log into solr via script in 10163ms
ok 69 post solr log into solr via cli in 7188ms
ok 70 allowPaths - backup in 16231ms
ok 71 start solr with ssl in 19073ms
not ok 72 use different hostname when not checking peer-name in 20806ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 38115 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38115 (pid=1341639). Happy searching!
#
#     INFO  - 2023-10-19 18:56:21.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:56:21.105; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:56:21.609; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 18:56:21.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 18:56:21.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 18:56:31.631; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 18:56:31.637; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 18:56:32.014; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:38115/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 18:56:33.594; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:56:33.602; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:38115/solr] to [https://127.0.0.1:38115].
# WARN  - 2023-10-19 18:56:34.369; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 18:56:34.405; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17600ms
ok 74 start solr with client truststore and security manager in 19802ms
not ok 75 start solr with mTLS needed in 51518ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rl5LBQ/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38115 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38115 (pid=1344380). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38116 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38116 (pid=1344495). Happy searching!
#
#     INFO  - 2023-10-19 18:57:37.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:57:37.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:57:37.826; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:37.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:37.830; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.878 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 A0 09 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:23.000 UTC",
#     "not  after"         : "2024-01-17 18:57:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#         0010: 70 CB 1A F8                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.882 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 2C 14 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:15.000 UTC",
#     "not  after"         : "2024-01-17 18:57:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.897 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.266 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.267 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.270 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.270 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.277 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.350 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.350 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.352 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2D 9C 6A FB 99 1A 45 9F 11 AF 9B 39 DB FE 2B 50 BB 0B 12 A0 B4 91 04 0A A0 6D 8A B9 3A D5 49 FF",
#   "session id"          : "F1 ED 64 DF 41 08 D6 0F 13 A3 11 12 BA 2C 0D 1B 87 9D 39 98 FA D5 7E FE FF 46 0D F3 FE 58 77 0C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C1 B8 B6 12 73 25 58 72   97 8C AB 55 9C 73 8B EA  ....s%Xr...U.s..
#             0010: 46 3C EF BA CC 7F D4 62   64 E3 4C 58 88 8A 88 03  F<.....bd.LX....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 84 1C E8 3E E0 C4 AF 4F CD 1C 9A 25 6E 1D E4 F9 52 2E AF BB F6 AC 0A 84 53 E0 6B CE E4 97 CE",
#   "session id"          : "F1 ED 64 DF 41 08 D6 0F 13 A3 11 12 BA 2C 0D 1B 87 9D 39 98 FA D5 7E FE FF 46 0D F3 FE 58 77 0C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4C F9 3E AC 83 ED 01 3A   EA 7E C3 70 1C AD 3A 34  L.>....:...p..:4
#           0010: 71 9F AA AA 59 2F 07 FF   3C 01 AC AA 05 5B 0C 27  q...Y/..<....[.'
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.794 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.794 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.799 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.850 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.865 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.892 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.901 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.901 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.905 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.907 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.907 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.923 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 9D 21 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:19.000 UTC",
#       "not  after"         : "2024-01-17 18:57:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 5D 75 BC F6 1E 50 51   58 E4 30 2C C2 73 6A 2A  q]u...PQX.0,.sj*
#           0010: 15 39 61 15                                        .9a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.924 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.436 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.440 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 49 1D 05 7C F1 55 CC   35 7A 08 9A F7 ED 55 A5  .I....U.5z....U.
#     0010: 46 92 0C 67 A8 7B 1A DB   08 9F CC 5F 68 FD 0C CF  F..g......._h...
#     0020: 0A 3A 9C F8 74 86 22 6B   E9 6B 2E 00 1C F5 51 F8  .:..t."k.k....Q.
#     0030: F2 4F 7B BE 07 E1 5B CD   3A 67 CE 8D 83 1B 85 72  .O....[.:g.....r
#     0040: 67 43 0A A4 67 0E 09 5A   48 E0 D8 81 8F F7 E9 D9  gC..g..ZH.......
#     0050: 39 E2 09 3C EE F9 15 73   91 6E EC EB 51 0B F2 D1  9..<...s.n..Q...
#     0060: C5 57 84 C9 62 E6 F5 63   6B 3B E4 49 8C CE C2 21  .W..b..ck;.I...!
#     0070: A8 3C E9 33 D6 52 26 17   FE BB 4A 6A 6C D5 E8 65  .<.3.R&...Jjl..e
#     0080: D9 DD 5F 18 3A 23 5C EF   60 C5 80 58 1A E1 28 79  .._.:#\.`..X..(y
#     0090: AF 9F 81 E9 81 EE 91 B8   47 1F 15 E3 30 CC F6 6E  ........G...0..n
#     00A0: 39 0E 25 03 88 34 DC 8E   C6 46 52 70 BA 2A 5C B9  9.%..4...FRp.*\.
#     00B0: 35 93 1A 46 79 49 4D 7A   15 93 7E 09 4B A5 41 77  5..FyIMz....K.Aw
#     00C0: 37 81 BB 28 57 A2 43 B0   B2 00 E0 49 8B 1F 53 17  7..(W.C....I..S.
#     00D0: 21 C5 5F C2 C7 23 04 07   DF 07 2A FB BF 40 C5 2A  !._..#....*..@.*
#     00E0: EC 5E 78 BE C0 79 38 08   13 F6 63 45 01 AD 3A 44  .^x..y8...cE..:D
#     00F0: 7B 3C A3 40 16 E9 32 8C   94 66 07 F9 2A 7D B8 97  .<.@..2..f..*...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.442 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B 4A 73 5E B1 83 81 3A   F8 60 86 65 9D 49 8E 6B  .Js^...:.`.e.I.k
#     0010: 08 3A 01 D2 C5 D5 3E 64   5B 61 40 AC CF 72 22 5E  .:....>d[a@..r"^
#     0020: 6A 0B 08 B2 80 F6 12 3F   14 73 55 3B 13 FC BC F1  j......?.sU;....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.444 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.446 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.448 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 A0 09 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:23.000 UTC",
#       "not  after"         : "2024-01-17 18:57:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#           0010: 70 CB 1A F8                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.506 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 96 CB 55 CF 6A A6 9E   DE 4C A7 78 CF 69 DA BB  E..U.j...L.x.i..
#     0010: 47 57 CB A9 73 B8 1F 5D   44 21 03 D1 6A DB 04 AE  GW..s..]D!..j...
#     0020: 0F 4D 4A 83 1E 3D 4E 7C   48 E4 D1 C6 F4 6F 97 C2  .MJ..=N.H....o..
#     0030: 3B A9 68 9C 8A 64 1A 83   12 78 03 2E 7E A0 5F BE  ;.h..d...x...._.
#     0040: AE A7 ED 2A C4 77 24 CB   D0 2C 50 B7 DD 7B 47 DA  ...*.w$..,P...G.
#     0050: 7F 42 BF FF 88 D5 79 83   87 B2 A2 11 69 53 B4 23  .B....y.....iS.#
#     0060: FD C5 DA D2 DE 9D 53 BB   C2 53 9E 54 E1 DD 27 88  ......S..S.T..'.
#     0070: 47 FA 40 F3 70 DF 4A 5C   3D 46 5B DB 44 8E BF F5  G.@.p.J\=F[.D...
#     0080: 7B 20 87 75 1C 58 85 2C   00 3D B9 7A EC A0 0D 7B  . .u.X.,.=.z....
#     0090: C0 2A 17 4B 55 C6 4D 05   22 15 18 68 49 F3 FE CC  .*.KU.M."..hI...
#     00A0: FF 69 88 F9 AE 44 89 B0   D7 37 70 2A 32 FE E7 7E  .i...D...7p*2...
#     00B0: E1 AC 33 24 E6 D8 A6 3F   E0 DF 49 4B 43 B1 25 AD  ..3$...?..IKC.%.
#     00C0: 4C 69 9F F2 BB 09 1B 50   31 0E 92 6F 51 D0 96 7C  Li.....P1..oQ...
#     00D0: 6C 68 3B 92 16 82 FB 9F   70 2E 74 02 B9 E7 A1 20  lh;.....p.t....
#     00E0: 12 9B 4E 6A C1 3A B3 9F   9D BB 62 59 44 2D 74 59  ..Nj.:....bYD-tY
#     00F0: 42 4A A6 13 67 64 DC 8B   35 29 F9 C9 F5 F4 56 08  BJ..gd..5)....V.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.511 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D7 CF 5E E4 D5 E3 ED 75   08 2B 9B 83 C5 44 BA C5  ..^....u.+...D..
#     0010: 77 F0 5B E7 5C 97 B2 D3   34 0C 92 E9 A4 EA BE 2B  w.[.\...4......+
#     0020: 52 90 09 6B 07 F8 20 E6   C3 D1 FF 50 A2 4D 53 06  R..k.. ....P.MS.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.515 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.603 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1C AC 6B DE CE E3 D8 18 3A CE 9E 80 01 A1 85 B1 CF B6 A1 8D 2D 28 13 8D 43 5B 38 67 01 DE 5B 60",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 18:57:40.061 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 18:57:40.061 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 18:57:41.822; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:57:41.826; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:57:42.190; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@43b4fe19(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:42.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:42.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(ca,h=[localhost],a=[],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.224 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 A0 09 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:23.000 UTC",
#     "not  after"         : "2024-01-17 18:57:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#         0010: 70 CB 1A F8                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.228 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 2C 14 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:15.000 UTC",
#     "not  after"         : "2024-01-17 18:57:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.240 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.408 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.409 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.410 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.410 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.425 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.426 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.426 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.428 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "85 3A C8 10 19 94 5A 74 AF C5 1B 39 B3 58 24 9F 05 B4 6B 25 38 CC 11 41 CA 5D 29 D0 4D 2E 67 51",
#   "session id"          : "15 7A DE 21 1A CC 65 79 25 04 0D 09 08 F1 0C 25 45 18 97 C3 38 7B 52 B9 3C EC 1B E3 0F 4F 38 2E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 42 00 B9 1B BD A4 A1 CC   35 4F E7 41 40 B2 97 94  B.......5O.A@...
#             0010: B4 B8 A8 1F 15 7C C5 38   0B FB 59 F0 E1 8F 3D 61  .......8..Y...=a
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "62 02 4C F4 DD DE 7F B4 FD 68 40 44 53 F1 05 97 02 91 38 D5 7B 34 C6 07 28 9A 2C 4E BD 59 7F A4",
#   "session id"          : "15 7A DE 21 1A CC 65 79 25 04 0D 09 08 F1 0C 25 45 18 97 C3 38 7B 52 B9 3C EC 1B E3 0F 4F 38 2E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B6 7A 15 C2 14 77 7E E0   E8 B2 8B AF 02 82 5E D1  .z...w........^.
#           0010: 42 45 12 FA C8 B7 03 94   C8 FF FC D1 99 F8 D5 07  BE..............
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.538 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.540 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.542 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.562 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 9D 21 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:19.000 UTC",
#       "not  after"         : "2024-01-17 18:57:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 5D 75 BC F6 1E 50 51   58 E4 30 2C C2 73 6A 2A  q]u...PQX.0,.sj*
#           0010: 15 39 61 15                                        .9a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.562 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.615 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.618 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 60 18 34 B9 D5 69 20   CF 00 F0 34 F3 33 7A C7  8`.4..i ...4.3z.
#     0010: 61 FE 77 DF CD 49 80 F6   0D 96 06 DF A8 7F 19 0B  a.w..I..........
#     0020: 83 B1 03 61 63 B2 1E DC   3E 26 C5 18 28 40 40 CE  ...ac...>&..(@@.
#     0030: D4 C9 D8 A5 AF B0 B3 70   A4 62 14 7E FB C1 80 8A  .......p.b......
#     0040: 71 3E 16 30 54 90 6F EB   26 FE 86 53 A2 B0 29 1B  q>.0T.o.&..S..).
#     0050: 38 3B B5 A7 15 46 60 DE   E6 66 0E 69 BA 92 AF 5F  8;...F`..f.i..._
#     0060: F9 27 B4 AB CC 2B 17 E4   F5 4C 5E 73 CC F9 B4 18  .'...+...L^s....
#     0070: 9A BE FE 0A B5 F0 BD 41   69 C6 3F EE 05 CC F2 D6  .......Ai.?.....
#     0080: CA 99 FA 66 3B AE 59 B7   CC 1C 9C E9 FD B8 D1 80  ...f;.Y.........
#     0090: 2C F0 07 67 67 A3 8E 62   41 57 18 33 01 C4 F5 6A  ,..gg..bAW.3...j
#     00A0: C6 82 3C AE 6C 09 0F C1   A3 61 7A 78 21 7B 73 2C  ..<.l....azx!.s,
#     00B0: A7 C2 96 12 96 AE D1 1F   3E B0 85 3E 4E C1 09 AD  ........>..>N...
#     00C0: 2B 62 48 D1 4C 4E 82 04   4C F1 8B 6D DE 65 89 CC  +bH.LN..L..m.e..
#     00D0: 28 D1 CD 24 38 73 64 48   65 44 0E 93 C3 BA 18 3F  (..$8sdHeD.....?
#     00E0: 9A 2C A5 27 D8 49 87 7D   AB 94 19 60 03 79 0B 27  .,.'.I.....`.y.'
#     00F0: 64 35 03 9D 8E 54 17 58   A5 4F F1 4A CC A5 75 2E  d5...T.X.O.J..u.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.619 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C C3 35 FF CC 37 D8 99   DD 26 86 2E C9 B3 43 B0  ,.5..7...&....C.
#     0010: 6E 11 3F CA 62 C1 58 76   F4 74 33 E1 0A C2 70 0F  n.?.b.Xv.t3...p.
#     0020: 07 F8 65 6F D2 52 D8 F6   4E A3 D0 22 95 D6 E4 8E  ..eo.R..N.."....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.621 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.624 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 A0 09 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:23.000 UTC",
#       "not  after"         : "2024-01-17 18:57:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#           0010: 70 CB 1A F8                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.647 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 DE 2F 2C CE CA C1 BF   45 00 02 49 90 5F 42 77  D./,....E..I._Bw
#     0010: 88 DE DD 75 02 BD 1A 70   33 2E FB 35 28 2C 83 0D  ...u...p3..5(,..
#     0020: 8F F5 D6 B4 52 4D 2F 6E   40 8C 46 6C BA 49 ED CA  ....RM/n@.Fl.I..
#     0030: 3F E9 13 4C AB 2B 83 D4   53 29 DE 94 91 14 CD BD  ?..L.+..S)......
#     0040: E0 03 8B 9A ED 3A 3F D6   58 60 7C D7 6F BB 43 52  .....:?.X`..o.CR
#     0050: 04 3D 2A 92 30 27 D1 64   56 86 B9 A3 43 DA ED E7  .=*.0'.dV...C...
#     0060: 21 DC F5 72 BC 3E E1 D5   12 84 F7 F0 33 A6 F4 8F  !..r.>......3...
#     0070: 56 5D 8F 65 D8 FA AA C6   7E 3C 9C 9E 46 C2 EE 38  V].e.....<..F..8
#     0080: 7B 47 D3 21 D8 3F 45 93   46 4A 24 E6 0A F3 F7 31  .G.!.?E.FJ$....1
#     0090: 10 FF 9A E7 F5 C0 FD D1   A6 97 E4 6A 0C 59 7B A4  ...........j.Y..
#     00A0: 71 75 11 AD 89 51 7D 35   13 5D 70 7B 90 87 C0 F6  qu...Q.5.]p.....
#     00B0: 56 AC 46 CF 64 99 99 E7   D5 2A 0E DB BC C9 92 56  V.F.d....*.....V
#     00C0: 0A 16 C7 85 E4 5A 92 2A   BE A7 78 8E DD AD E3 7C  .....Z.*..x.....
#     00D0: D7 C7 ED BC F4 0C 48 7A   BF 38 79 4A E9 03 37 0D  ......Hz.8yJ..7.
#     00E0: 23 75 01 2E 7D 0D 4D 4F   01 1D 67 E6 4C 15 86 54  #u....MO..g.L..T
#     00F0: CE 48 7D B5 91 CD 6A 1B   6B 92 63 8F 28 70 01 06  .H....j.k.c.(p..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.648 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 85 BB 9C C4 10 31 78   E4 D7 20 4A 1E 1A A1 C0  D.....1x.. J....
#     0010: B8 EC 50 EB 79 09 24 8B   AE FD 34 23 91 B4 AE 5C  ..P.y.$...4#...\
#     0020: F8 B3 FF 8A 4D 5B C4 71   3D B9 3E 6B 45 4E 71 A3  ....M[.q=.>kENq.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.648 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.943 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "80 C0 FE EE 9F 76 5A 00 B5 DE 34 D5 B3 68 1A B4 56 77 11 AA 97 DC DB 34 A4 95 A7 E8 CB DB 8D A3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 18:57:43.202 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 18:57:43.203 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-19 18:57:56.260; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:56.839 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 2C 14 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:15.000 UTC",
#       "not  after"         : "2024-01-17 18:57:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:56.853 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.008 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.010 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.010 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.028 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C7 AF 7E D9 D8 71 02 B2 19 A4 6C BD 96 26 62 8B 58 71 FF D2 78 F0 D5 D4 5E 61 82 57 A4 FA 2F 79",
#     "session id"          : "60 DE F9 89 88 57 D8 9C 08 29 57 4F 4B 80 2B 83 F3 7A 4E 56 52 C2 5B B4 D5 C1 50 DE 35 13 59 AB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 74 B4 C8 33 D2 20 23 77   C7 2E 7F 10 51 2F 06 BC  t..3. #w....Q/..
#               0010: 35 67 92 F4 00 93 A9 31   EC 03 84 0B 10 B5 7F 37  5g.....1.......7
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.049 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D3 CC AF CE 13 91 52 FC A2 DA C1 7D E7 8C 3F 45 7B 18 D9 19 A7 DC 6D 2B F6 2F D0 91 80 AC 60 DF",
#     "session id"          : "60 DE F9 89 88 57 D8 9C 08 29 57 4F 4B 80 2B 83 F3 7A 4E 56 52 C2 5B B4 D5 C1 50 DE 35 13 59 AB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD 6F A3 1F D5 F7 39 B0   9F 58 70 19 62 32 A2 54  .o....9..Xp.b2.T
#             0010: 68 3D 35 1A 52 81 8C 01   1A 72 B6 8D 97 21 09 7E  h=5.R....r...!..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.049 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.052 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.060 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.062 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.063 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UT

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14738ms
ok 78 stop command for single port in 17603ms
not ok 79 status detects locally running solr in 1536ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7454ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1562ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3378ms
ok 83 copying files around in 7639ms
ok 84 upconfig in 2626ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1247ms
not ok 87 Cleanup in 2477ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ieg3ecbumkyzk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8222 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8222/

All tests passed

Build Log:
[...truncated 1261 lines...]
# ERROR: Error from server at http://localhost:35609/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16252ms
ok 60 Check help command in 4565ms
ok 61 basic post with a type specified in 5653ms
ok 62 basic post WITHOUT a type specified in 11672ms
ok 63 crawling a directory in 4402ms
ok 64 crawling a web site in 5133ms
ok 65 commit and optimize and delete in 3805ms
ok 66 args mode in 6535ms
ok 67 stdin mode in 3435ms
ok 68 post solr log into solr via script in 9763ms
ok 69 post solr log into solr via cli in 7244ms
ok 70 allowPaths - backup in 16700ms
ok 71 start solr with ssl in 18831ms
not ok 72 use different hostname when not checking peer-name in 20342ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 35609 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35609 (pid=878658). Happy searching!
#
#     INFO  - 2023-10-19 15:43:41.540; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:43:41.546; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:43:42.082; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 15:43:42.163; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 15:43:42.164; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 15:43:51.961; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 15:43:51.966; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 15:43:52.374; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:35609/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 15:43:53.729; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:43:53.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35609/solr] to [https://127.0.0.1:35609].
# WARN  - 2023-10-19 15:43:54.595; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 15:43:54.630; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16583ms
ok 74 start solr with client truststore and security manager in 19456ms
not ok 75 start solr with mTLS needed in 52314ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-HRwwlx/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35609 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35609 (pid=881353). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35610 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 35610 (pid=881523). Happy searching!
#
#     INFO  - 2023-10-19 15:44:56.245; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:44:56.258; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:44:57.099; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:44:57.102; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:44:57.104; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.189 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 0B 8E 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:42.000 UTC",
#     "not  after"         : "2024-01-17 15:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#         0010: BC B5 F1 5B                                        ...[
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.199 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 6B CB 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:33.000 UTC",
#     "not  after"         : "2024-01-17 15:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.225 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.713 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.713 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.721 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.722 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.753 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 DD BE 42 80 BC 41 49 2A 15 2E 8A 71 74 D3 FB 28 52 A1 39 38 F3 00 18 A2 08 68 94 86 08 60 19",
#   "session id"          : "BB BD 62 A9 2B 83 3E E6 72 1F 8D 9D 88 ED 14 0B 03 C3 92 26 FE 53 B6 C4 64 58 84 36 56 D8 24 7B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 34 A7 9F 12 D9 5C 7A   E8 7B A3 D5 95 C9 D3 BA  .4....\z........
#             0010: 08 80 83 7A 46 54 34 0F   B3 04 72 95 9A 88 36 5B  ...zFT4...r...6[
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.312 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "20 41 09 C9 D5 F7 0B 8B AC 20 FE 71 7D 07 F6 4E 56 5D 9F 0F 4B 63 59 0E A6 7B 9E 4F 2F B8 16 F9",
#   "session id"          : "BB BD 62 A9 2B 83 3E E6 72 1F 8D 9D 88 ED 14 0B 03 C3 92 26 FE 53 B6 C4 64 58 84 36 56 D8 24 7B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DE 6E B7 20 F5 F5 FB 63   EC 7E 75 74 96 79 76 4F  .n. ...c..ut.yvO
#           0010: AA B1 EC 82 80 6B 4C DA   49 76 C8 89 6E 85 D9 2D  .....kL.Iv..n..-
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.313 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.316 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.339 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.340 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.345 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.351 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.351 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.352 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.354 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C F1 6B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:38.000 UTC",
#       "not  after"         : "2024-01-17 15:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 38 5F 50 7C F3 B4 44   AD AA CA 2D B2 08 F1 8A  .8_P...D...-....
#           0010: C8 6B 9B C5                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.354 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.493 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.502 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 53 1A 73 17 C7 57 34   52 40 92 40 97 E1 BE 6D  QS.s..W4R@.@...m
#     0010: 58 7A 5C 54 13 29 45 D1   EF 1B E1 A3 24 F9 74 BC  Xz\T.)E.....$.t.
#     0020: CC 31 EF 89 0E 49 64 86   C0 BE 30 7E 0B 1F FC 70  .1...Id...0....p
#     0030: 67 6C 4C BE 1B 6E 91 E0   58 94 55 07 3B 29 B3 C5  glL..n..X.U.;)..
#     0040: 26 9E 9A 1D 40 82 48 DF   A5 EB 18 33 A1 56 44 AD  &...@.H....3.VD.
#     0050: DB 99 FB 17 FB DB 66 BE   AC 7F 02 D7 05 4F A9 9D  ......f......O..
#     0060: 80 84 F1 C5 1A BE C6 4E   D8 36 61 13 80 EB B1 D4  .......N.6a.....
#     0070: 1E 42 5C F5 8E 71 8F EF   09 AC 02 0A 90 B9 04 AB  .B\..q..........
#     0080: 10 56 8F AC A7 6E 43 2D   D5 B2 EF 33 B9 5B 6B 41  .V...nC-...3.[kA
#     0090: AE C2 6B 1A DC 42 9A 2D   89 5E 61 DE 78 58 AC AD  ..k..B.-.^a.xX..
#     00A0: B9 D6 83 8B 9F 00 DF 2A   7B 3D 0A DA 57 B6 60 FD  .......*.=..W.`.
#     00B0: BD 71 D4 20 C2 4B 00 05   8A C7 00 A8 C0 EC 3C 99  .q. .K........<.
#     00C0: AE 42 8B CD 17 A0 4C 21   B3 EE 7F A4 6B A8 17 17  .B....L!....k...
#     00D0: 0F 1C 5E 3B 91 91 FA 96   DD CE ED B4 9C BA 73 3A  ..^;..........s:
#     00E0: BD A7 0F 56 3C 92 27 D3   1A 00 D8 D2 D9 83 03 41  ...V<.'........A
#     00F0: 5D DE FC 84 AC 82 ED 7A   BE 29 4D F2 37 E9 F9 EF  ]......z.)M.7...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.504 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C 7B 5C 9A D6 13 23 79   FC 48 85 9A 51 F0 67 34  <.\...#y.H..Q.g4
#     0010: 78 00 45 58 26 25 31 96   0A A2 37 D5 74 2E CF 0E  x.EX&%1...7.t...
#     0020: D4 86 CD 59 37 1A 97 30   2B 1B F2 A0 20 35 19 8F  ...Y7..0+... 5..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.506 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.507 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.507 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.513 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 0B 8E 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:42.000 UTC",
#       "not  after"         : "2024-01-17 15:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#           0010: BC B5 F1 5B                                        ...[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.552 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 6F E3 C0 85 26 CE A3   DD 95 E1 51 9E 47 D2 9B  Vo...&.....Q.G..
#     0010: 67 C3 80 3D 71 57 3D 60   BA D2 91 03 85 47 D9 8E  g..=qW=`.....G..
#     0020: BB 0B A5 A3 F2 05 D1 9A   12 11 94 B9 CC F3 DF BD  ................
#     0030: 63 A6 61 9B 02 6F A7 08   9D BB 96 08 74 72 A9 5E  c.a..o......tr.^
#     0040: 3A 8C 07 C4 FF F0 44 37   C4 99 64 BB DA C9 CD DE  :.....D7..d.....
#     0050: 8E A3 CB 61 BE 1D F6 66   34 0F 5D 3C E6 BF 5B D5  ...a...f4.]<..[.
#     0060: 62 0B 47 3A D9 86 04 02   F2 B6 37 00 3C 5A 38 2E  b.G:......7.<Z8.
#     0070: B3 89 56 2A 53 13 9A 04   2A 4D 47 5B 4C 85 7F FF  ..V*S...*MG[L...
#     0080: 1E 32 D9 CB 3E 1E D4 74   A5 4F F6 DC A6 F5 C4 46  .2..>..t.O.....F
#     0090: E7 51 12 6E 20 41 F1 F4   99 DE 19 CF 11 3B 3A 12  .Q.n A.......;:.
#     00A0: 02 D2 0B 3A 49 AF 68 EE   44 0D 91 98 1A 64 F9 7B  ...:I.h.D....d..
#     00B0: F3 51 80 3F 83 68 C7 15   A6 E7 7D 50 8C 76 22 7C  .Q.?.h.....P.v".
#     00C0: 93 2B 14 42 5E 9D DE 7B   4A 75 2F F7 80 82 5F 58  .+.B^...Ju/..._X
#     00D0: 94 C2 BD EB 13 38 B0 42   30 76 C9 48 1D 25 D7 00  .....8.B0v.H.%..
#     00E0: 1A F1 AC B3 AE A3 33 FD   AD BD 5A A1 01 D9 1B DA  ......3...Z.....
#     00F0: A2 30 92 3C 2C 2A 88 F7   90 6F 35 12 0A 04 FF 50  .0.<,*...o5....P
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.555 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E3 22 33 6B 76 07 CF 7F   E1 01 AB 84 19 37 85 94  ."3kv........7..
#     0010: 68 80 BC B0 DD 1B 8E A9   8A F3 C2 E5 E8 03 BC DD  h...............
#     0020: D9 BD 90 18 B2 96 EF A4   49 59 1C A9 88 B9 6B FF  ........IY....k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.560 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.708 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E3 66 A4 EF 46 3E 81 4D B0 BC 65 35 C9 FD 84 DA 3A 11 88 3E 4B 98 EC E5 28 F3 00 1E 25 09 C9 A1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 15:44:59.581 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 15:44:59.582 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 15:44:59.594 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-19 15:45:01.121; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:45:01.126; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:45:01.536; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:45:01.538; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:45:01.539; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.583 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 0B 8E 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:42.000 UTC",
#     "not  after"         : "2024-01-17 15:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#         0010: BC B5 F1 5B                                        ...[
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.587 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 6B CB 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:33.000 UTC",
#     "not  after"         : "2024-01-17 15:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.600 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.781 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.781 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.783 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.783 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.788 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.800 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.801 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.803 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "55 F1 03 31 5A 18 84 E3 12 7D 9C 6A 23 2B 3C 0D B5 2D BE D8 B6 00 CE 4C 63 44 4D 8F F9 D5 6E 67",
#   "session id"          : "E5 85 93 5E 91 C0 06 1C 6E F6 86 13 11 BF C6 B4 EC 12 59 B0 CE 83 AA 0D A1 49 D8 95 D1 9A 5F 21",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 7A 19 0C 42 95 94 E7   CC D9 73 73 06 BE 36 2C  .z..B.....ss..6,
#             0010: 71 E4 CC B3 64 DF 71 44   18 AF 19 D5 24 99 38 35  q...d.qD....$.85
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.928 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "68 22 63 4C E4 08 08 0F 56 50 33 A6 7E E8 2B E5 F8 7B 61 C1 F9 DC 11 15 9C 69 34 AD 9C 88 EF B4",
#   "session id"          : "E5 85 93 5E 91 C0 06 1C 6E F6 86 13 11 BF C6 B4 EC 12 59 B0 CE 83 AA 0D A1 49 D8 95 D1 9A 5F 21",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B3 6C EC 8D 17 5A F3 22   71 98 59 94 DA 2D 88 5B  .l...Z."q.Y..-.[
#           0010: C0 D6 A9 79 84 F3 29 89   95 0E 80 CA 49 C0 A1 6F  ...y..).....I..o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.929 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.929 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.933 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.935 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.942 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.946 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.974 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.985 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.986 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.993 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.993 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.997 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.997 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.998 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.998 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.000 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C F1 6B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:38.000 UTC",
#       "not  after"         : "2024-01-17 15:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 38 5F 50 7C F3 B4 44   AD AA CA 2D B2 08 F1 8A  .8_P...D...-....
#           0010: C8 6B 9B C5                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.000 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.072 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.075 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D 01 69 FF 50 26 14 A4   39 1B 01 2B E9 38 D2 9A  m.i.P&..9..+.8..
#     0010: 8D 16 FB D3 77 59 F0 45   23 C9 E2 C7 2A E0 AF D1  ....wY.E#...*...
#     0020: 29 BE 83 8B 39 01 60 56   BE 11 4D AB 99 C1 61 CC  )...9.`V..M...a.
#     0030: 85 C3 12 8D 0A 0D 60 F0   96 47 8D B4 C1 BB CB 9A  ......`..G......
#     0040: 8A 1F BE 60 C2 11 6A D6   33 02 BA B5 2D 08 15 59  ...`..j.3...-..Y
#     0050: F3 D4 3E 17 95 32 4A D6   73 8F 12 BF 2D 37 2B 4B  ..>..2J.s...-7+K
#     0060: F5 78 1D 09 E0 F2 8C 3D   02 70 30 42 AA 38 88 6D  .x.....=.p0B.8.m
#     0070: 5E C5 3B 91 8F 70 14 1C   8C A9 C5 57 0F AA AD 59  ^.;..p.....W...Y
#     0080: 08 E3 7D B8 21 9B A2 B2   81 34 2B F2 30 CF 8D 5A  ....!....4+.0..Z
#     0090: D2 79 2E 5E 8A E1 40 B8   EE BF F9 54 8A C4 80 0C  .y.^..@....T....
#     00A0: F6 21 1F 78 42 39 08 5D   93 C3 F9 5C 80 49 5E 4E  .!.xB9.]...\.I^N
#     00B0: 9F 14 80 4C 72 72 B3 C6   98 0F 4C 6C BF 9C D6 80  ...Lrr....Ll....
#     00C0: 9F 45 09 B5 DE F6 D0 E3   41 F0 3C 26 A9 7D 9B 1A  .E......A.<&....
#     00D0: C6 9D 83 B0 94 48 6E FE   70 F0 02 32 02 36 54 12  .....Hn.p..2.6T.
#     00E0: 4C AE BE 31 20 93 E5 FB   0B 10 CE 3D 33 DA 97 0F  L..1 ......=3...
#     00F0: 16 CF 1E 7E 21 4F F7 CE   73 7F BD A8 FF D4 7C 5C  ....!O..s......\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.077 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 77 13 1F 54 BA C7 40 50   DF 73 A4 F1 24 1F 1B E4  w..T..@P.s..$...
#     0010: 49 51 A9 44 23 24 7B 7A   39 30 71 6C 22 AF 94 7A  IQ.D#$.z90ql"..z
#     0020: 7C 4B D5 B1 C4 F9 E3 E4   4B 93 A9 39 DD 92 81 40  .K......K..9...@
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.078 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.079 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.079 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.083 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 0B 8E 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:42.000 UTC",
#       "not  after"         : "2024-01-17 15:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#           0010: BC B5 F1 5B                                        ...[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.107 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E DD 02 CB F3 D0 EF C2   26 77 1D 38 96 58 23 F2  ........&w.8.X#.
#     0010: 35 9A 4C A5 42 D7 81 7C   9A 4A 2A D9 B2 F7 BD 21  5.L.B....J*....!
#     0020: 23 A4 54 C9 8B 30 6F AA   28 6A A7 92 33 B1 88 94  #.T..0o.(j..3...
#     0030: 19 67 39 25 ED CB 04 E0   00 A9 B7 85 94 66 CE 60  .g9%.........f.`
#     0040: 7B 52 53 9E A2 40 A0 46   67 B7 3C 4B 32 8F 86 F3  .RS..@.Fg.<K2...
#     0050: 18 56 2B B5 CE 2A 3F 04   8E FD 29 82 E0 05 C7 03  .V+..*?...).....
#     0060: 01 FF FB F7 0F C4 56 0C   C1 3C 72 22 69 68 2A 0C  ......V..<r"ih*.
#     0070: 01 94 C8 FD F3 E2 94 D2   1B A7 E3 A2 A2 FE 68 FA  ..............h.
#     0080: C9 45 21 05 D0 4B 99 0F   48 57 F4 53 9A 2E 7B 10  .E!..K..HW.S....
#     0090: B4 F4 87 9F E9 8F 9E 2B   F6 7F 8B 92 7A 6A D3 99  .......+....zj..
#     00A0: 42 F8 F8 EF C8 10 2A 69   36 F7 14 A4 21 84 83 FA  B.....*i6...!...
#     00B0: 31 C7 00 98 08 80 0E 9D   8E F8 C8 2F A3 5B 57 F5  1........../.[W.
#     00C0: AB B5 CF 30 30 38 19 01   C9 AA 46 D0 E1 F1 60 DC  ...008....F...`.
#     00D0: 08 BE 8C 40 C2 53 A7 60   BB F5 F5 42 D0 9B 7A EC  ...@.S.`...B..z.
#     00E0: BF D6 5E 8A EA 17 90 E5   A2 45 A2 54 1A D5 92 86  ..^......E.T....
#     00F0: 5F 44 96 C8 C1 B1 33 CA   66 FF A3 0D 57 51 EF D9  _D....3.f...WQ..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.108 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D8 23 EB 93 46 C4 B1 C2   3F 73 37 E5 0E B4 35 BC  .#..F...?s7...5.
#     0010: E9 8D D6 62 2C 05 A1 A9   88 C5 EC 01 F2 C4 7E 0D  ...b,...........
#     0020: E7 F4 4D BF 87 28 A4 F2   8B 77 60 DD 11 2F FE BD  ..M..(...w`../..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.108 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.164 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6B 9C F1 EA 57 FC C6 DC 8C 41 64 FA 86 75 3E 1B F9 2A F5 42 99 08 FC 84 99 0E D8 B6 09 DC D5 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.201 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-19 15:45:02.478 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 15:45:02.479 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 15:45:13.965; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:14.314 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 6B CB 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:33.000 UTC",
#       "not  after"         : "2024-01-17 15:44:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:14.327 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.485 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.485 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.488 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.488 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.505 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C4 3D CF BD DD B9 AA 99 33 3E 0F 57 B0 0A 52 06 1E CC BD C2 6D C4 97 AD BF 1B 07 57 15 BD B6 E1",
#     "session id"          : "EE D1 B9 82 D8 11 02 26 0E 42 68 03 C7 D4 36 B0 AA 2B 59 57 79 1D 9E A7 51 61 D4 4F 64 D8 19 F3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: EB E6 32 CC FA D1 43 47   C0 23 CA A0 64 27 FA FC  ..2...CG.#..d'..
#               0010: 08 A7 53 59 AC E2 E5 13   DF 49 72 83 6C E1 7F 0E  ..SY.....Ir.l...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 3C C0 E8 92 E8 55 33 C1 12 C2 A6 C2 E3 2F 2D 44 16 FB 71 08 F6 E7 1C A7 B6 4A C8 8E 97 49 BC",
#     "session id"          : "EE D1 B9 82 D8 11 02 26 0E 42 68 03 C7 D4 36 B0 AA 2B 59 57 79 1D 9E A7 51 61 D4 4F 64 D8 19 F3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 35 25 2E 68 12 14 B8 08   AB 5D F1 15 3F 6C 65 D0  5%.h.....]..?le.
#             0010: D8 BF B5 9E 48 16 BF DC   01 C3 D3 A6 BA CC B0 2E  ....H...........
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.532 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.534 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.535 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.538 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions hands

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14536ms
ok 78 stop command for single port in 17486ms
not ok 79 status detects locally running solr in 1535ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7490ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1525ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3020ms
ok 83 copying files around in 6581ms
ok 84 upconfig in 2584ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1248ms
not ok 87 Cleanup in 2500ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/huduz46q6gnru

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8221 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8221/

All tests passed

Build Log:
[...truncated 1476 lines...]
BUILD FAILED in 1h 1m 34s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7zuyr6vafsynm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8220 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8220/

All tests passed

Build Log:
[...truncated 1263 lines...]
# ERROR: Error from server at http://localhost:33669/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16323ms
ok 60 Check help command in 4829ms
ok 61 basic post with a type specified in 5850ms
ok 62 basic post WITHOUT a type specified in 11494ms
ok 63 crawling a directory in 4638ms
ok 64 crawling a web site in 4589ms
ok 65 commit and optimize and delete in 3836ms
ok 66 args mode in 6432ms
ok 67 stdin mode in 3308ms
ok 68 post solr log into solr via script in 10186ms
ok 69 post solr log into solr via cli in 7089ms
ok 70 allowPaths - backup in 16274ms
ok 71 start solr with ssl in 19119ms
not ok 72 use different hostname when not checking peer-name in 20566ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 33669 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33669 (pid=281217). Happy searching!
#
#     INFO  - 2023-10-19 10:46:20.895; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:46:20.900; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:46:21.378; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 10:46:21.501; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 10:46:21.501; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 10:46:31.423; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 10:46:31.428; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 10:46:31.792; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:33669/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 10:46:33.231; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:46:33.235; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:33669/solr] to [https://127.0.0.1:33669].
# WARN  - 2023-10-19 10:46:34.069; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 10:46:34.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16894ms
ok 74 start solr with client truststore and security manager in 20073ms
not ok 75 start solr with mTLS needed in 51663ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-inB6hc/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33669 [|]   [/]   [-]   [\]
# Started Solr server on port 33669 (pid=283958). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33670 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 33670 (pid=284065). Happy searching!
#
#     INFO  - 2023-10-19 10:47:37.089; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:47:37.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:47:37.633; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:37.635; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:37.636; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.119 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 CB 36 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:22.000 UTC",
#     "not  after"         : "2024-01-17 10:47:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#         0010: E3 90 C4 1B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.123 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 8A B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:14.000 UTC",
#     "not  after"         : "2024-01-17 10:47:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.155 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.484 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.485 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.489 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.509 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "52 A4 87 C4 A0 22 69 1C CD 20 A7 E6 5B AE B0 F6 9F FA F2 1C 91 4F EF 44 80 52 EE C2 AC 02 24 C9",
#   "session id"          : "A6 3F FB 15 75 BC 74 44 31 0C FD FE ED E3 E0 93 FB CD F0 D7 A4 0B 47 DD 73 D0 ED 34 4E 9C 3C 1D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 49 FC C3 0A 04 18 07   FB F7 0F 4F 79 47 BB B8  YI.........OyG..
#             0010: 90 58 0E E9 35 4B 5C A9   90 DA 70 FF B8 0D 28 1A  .X..5K\...p...(.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CB E3 7D 6F 3D 44 AD F9 7B 45 E1 8A 8C DA A5 22 A8 D2 CC 5B 4C 7B 55 94 CD 80 C4 85 0C F6 D6 39",
#   "session id"          : "A6 3F FB 15 75 BC 74 44 31 0C FD FE ED E3 E0 93 FB CD F0 D7 A4 0B 47 DD 73 D0 ED 34 4E 9C 3C 1D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7C 7D 22 45 75 5E 8C 9B   8B AD 22 E2 57 37 25 21  .."Eu^....".W7%!
#           0010: 5C 4C 8C 3D BE C9 40 A0   88 D4 93 8C 7A D6 B9 75  \L.=..@.....z..u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.687 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.687 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.706 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.710 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.711 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.714 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.714 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.717 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.717 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.718 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.731 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 09 A4 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:18.000 UTC",
#       "not  after"         : "2024-01-17 10:47:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 9F 68 EE A5 4B EE B9   8B 57 47 FD 68 75 D3 98  ..h..K...WG.hu..
#           0010: 88 3B 98 3B                                        .;.;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.731 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.819 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.831 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 47 CF 3F 11 C2 1C 81   F2 BA 22 87 85 90 1C 45  2G.?......"....E
#     0010: 79 E2 A9 D4 A5 6A CC 1B   73 4D EE C0 BA CE F7 D8  y....j..sM......
#     0020: A7 5F 93 B4 24 4C B0 30   AF 03 D8 C8 99 3D 64 D0  ._..$L.0.....=d.
#     0030: FE 48 1F A2 B4 29 4D ED   9B 32 B5 47 2B D8 B4 85  .H...)M..2.G+...
#     0040: F7 DE 07 66 E3 4D B9 9B   76 AC 60 6B 49 AE 5D C0  ...f.M..v.`kI.].
#     0050: 35 98 68 31 1F 1E 9B FB   A4 62 82 E5 C6 A6 94 DD  5.h1.....b......
#     0060: 6D 3E 4A 32 8D 9B BF DD   16 7D 79 5D 2E 79 AE 76  m>J2......y].y.v
#     0070: 6D 11 F9 B7 74 CC 7B 10   C6 3C D3 A5 19 2A B9 2C  m...t....<...*.,
#     0080: E8 B4 D3 94 69 95 C9 79   25 8C 02 0F 2B 41 3D FD  ....i..y%...+A=.
#     0090: C1 4D 7A 1B A9 E6 38 91   F8 78 7C 81 72 37 7D 48  .Mz...8..x..r7.H
#     00A0: 0D E1 9D 50 35 10 24 C8   84 FB 72 9F 8D 93 36 08  ...P5.$...r...6.
#     00B0: 87 5E F3 EA 1B 23 B9 49   F9 ED 21 03 AB 49 35 69  .^...#.I..!..I5i
#     00C0: 8E 60 1C 09 D5 DB 9C 62   3F D3 EF BA 6E EB 33 BF  .`.....b?...n.3.
#     00D0: 4D 04 4C 3E 8F F3 89 D0   A3 29 33 BE DB E0 ED D2  M.L>.....)3.....
#     00E0: F3 85 47 F0 BF 27 05 FE   73 6A E7 88 3A 83 19 B5  ..G..'..sj..:...
#     00F0: 89 EB 34 74 C3 5B F7 99   73 9B 50 D6 14 3D 71 64  ..4t.[..s.P..=qd
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.835 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BD 29 34 BC 63 81 EE 0B   9F AF CF D2 6A 7A E9 89  .)4.c.......jz..
#     0010: 06 CA E8 EF 2C 64 36 C5   AF C8 62 8F 89 7B DA B9  ....,d6...b.....
#     0020: 37 85 2C 71 71 3D 16 F0   17 15 9D 20 3E 1B C0 20  7.,qq=..... >..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.840 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.261 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 CB 36 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:22.000 UTC",
#       "not  after"         : "2024-01-17 10:47:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#           0010: E3 90 C4 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.325 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8F E6 6F C7 6F 1B 45 F4   57 01 64 9B C2 89 00 08  ..o.o.E.W.d.....
#     0010: FC 04 CF ED 93 A8 49 A2   89 D0 CD CD C1 79 FE 03  ......I......y..
#     0020: B3 F5 5E 5C 19 7D FF 68   A7 CA 40 33 7B AF D2 34  ..^\...h..@3...4
#     0030: 59 C4 44 77 24 5E 61 E0   7C E4 CE A0 85 E5 10 8F  Y.Dw$^a.........
#     0040: 5E ED 02 83 6E 04 5A 0F   24 88 85 7A 98 52 2B DE  ^...n.Z.$..z.R+.
#     0050: 56 3B 09 C8 6E FE 35 91   AC 03 54 E5 C2 D1 BC C3  V;..n.5...T.....
#     0060: 4C C3 9F 51 32 5C 19 2B   BD 3C 20 61 90 22 18 95  L..Q2\.+.< a."..
#     0070: 16 1E 8A 88 79 98 A8 3D   06 9D D0 7A 1E 41 BF 8A  ....y..=...z.A..
#     0080: E0 22 9D 1B D0 E3 2D C5   AD 44 55 30 C6 C2 2C 93  ."....-..DU0..,.
#     0090: C8 18 B5 B7 DA 00 5C 1E   9E 4B BE D8 8E 98 2D 36  ......\..K....-6
#     00A0: 59 01 82 35 4A 3D E7 57   79 75 0E 12 FE 55 A1 8C  Y..5J=.Wyu...U..
#     00B0: 1E 13 53 D0 B0 09 A1 25   9F C7 B5 6B 2E A7 3A 49  ..S....%...k..:I
#     00C0: 9B 11 54 25 64 9F F7 65   CA A0 3E 32 78 96 35 1D  ..T%d..e..>2x.5.
#     00D0: 48 F9 E9 E1 86 2D CE C8   15 B2 26 99 E4 65 46 98  H....-....&..eF.
#     00E0: EE 53 2E D2 7D 69 6E CF   46 F5 93 87 E3 BC 39 C2  .S...in.F.....9.
#     00F0: A9 B2 09 80 C6 40 60 59   53 C6 2F 9C 1A FB 5D EF  .....@`YS./...].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.329 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D5 D0 F4 E1 87 14 A8 B1   82 D9 43 82 56 03 92 6D  ..........C.V..m
#     0010: 1F 11 AD 9F B4 B5 19 09   6D F5 A7 67 C5 8E 44 97  ........m..g..D.
#     0020: 1F 42 5F A4 56 AF 1E E0   27 E3 9F 56 F8 4C CE 9D  .B_.V...'..V.L..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.333 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 10:47:39.408 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "12 ED 3E BA 28 1D 8A DB DC 65 14 ED 27 15 D6 48 87 18 9A 50 5A 92 9C 6C 5B 75 49 C1 F9 53 B2 54",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:47:39.731 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:47:39.732 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-19 10:47:39.736 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-19 10:47:39.737 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
# INFO  - 2023-10-19 10:47:40.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:47:40.857; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:47:41.179; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:41.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:41.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.215 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 CB 36 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:22.000 UTC",
#     "not  after"         : "2024-01-17 10:47:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#         0010: E3 90 C4 1B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.219 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 8A B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:14.000 UTC",
#     "not  after"         : "2024-01-17 10:47:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.231 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.393 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.394 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.395 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.395 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.413 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "08 F7 BE 37 A8 66 14 CD 02 1D D9 FE B8 34 E1 C9 0D 13 FE D0 97 7F DA DA B6 0D 94 36 53 28 50 22",
#   "session id"          : "1F DE 15 6C 08 F5 46 42 77 66 30 B2 E4 0E CA 79 62 77 0A A1 EC 6A DD 58 8A F8 2A B2 CD FA 9F 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C 41 EC AB 28 A2 44 DF   47 DA 5F 3E 20 70 0E 88  .A..(.D.G._> p..
#             0010: 5C D9 CA 10 4E B8 44 65   75 78 7B 9A 11 8E 4A 20  \...N.Deux....J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A8 FC 50 D0 B5 6A 16 21 98 81 A8 00 5D D8 11 51 D0 17 CE AF 36 8C 66 9F 1E B0 28 7A 09 3B F6 6E",
#   "session id"          : "1F DE 15 6C 08 F5 46 42 77 66 30 B2 E4 0E CA 79 62 77 0A A1 EC 6A DD 58 8A F8 2A B2 CD FA 9F 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 23 72 32 DB 05 36 FC BD   F4 22 8D 7C 40 79 BE 80  #r2..6..."..@y..
#           0010: 28 48 73 84 0F 08 5E 73   48 14 32 91 06 D8 90 7D  (Hs...^sH.2.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.927 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.929 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.930 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.939 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.939 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.946 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.947 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.948 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.948 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.956 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 09 A4 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:18.000 UTC",
#       "not  after"         : "2024-01-17 10:47:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 9F 68 EE A5 4B EE B9   8B 57 47 FD 68 75 D3 98  ..h..K...WG.hu..
#           0010: 88 3B 98 3B                                        .;.;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.959 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.035 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.037 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A D6 B0 FE A7 63 B7 CC   F8 99 50 99 EB 64 FE A3  J....c....P..d..
#     0010: 60 23 73 61 39 1C 08 1B   CD BD 2C 07 37 78 FA D9  `#sa9.....,.7x..
#     0020: 3B 6D BC C3 68 3D 4A 1B   AF 39 D1 AA FF DF AF C2  ;m..h=J..9......
#     0030: 7F 96 56 56 7E 9C 71 D4   6D 15 ED 6F AC C3 21 01  ..VV..q.m..o..!.
#     0040: 6C B5 7F BC 13 DB 27 61   3E F1 EA CA 0A 15 FA C5  l.....'a>.......
#     0050: 59 E6 4D 33 F2 3D D0 97   16 CE CF D8 E8 1D AF D3  Y.M3.=..........
#     0060: 19 A8 54 3E 19 C9 03 DC   1D 93 4D A1 CF 5C E3 D3  ..T>......M..\..
#     0070: C9 90 7B 12 FC C7 74 32   33 B9 97 C5 6C E1 6A BA  ......t23...l.j.
#     0080: A9 6B 36 47 DE 78 58 D9   1D C6 20 78 CA 64 B0 7F  .k6G.xX... x.d..
#     0090: 28 A0 AD 50 9E 20 8F C6   7D 1D 84 E3 60 5B 93 3E  (..P. ......`[.>
#     00A0: C3 AF 0A 97 BE 0D B9 1E   0C 11 23 C8 28 6C 04 B0  ..........#.(l..
#     00B0: 97 A5 B7 F7 A1 35 B2 C3   98 17 68 E4 3C D3 05 D9  .....5....h.<...
#     00C0: 86 3C 77 9C 2C EC 8D F5   69 26 B9 34 92 D2 2B DE  .<w.,...i&.4..+.
#     00D0: 89 9B A6 16 A8 F6 C2 09   BA CE 65 E7 D7 87 0C BF  ..........e.....
#     00E0: 5E 01 6D 34 B6 5D C5 4E   D6 02 DE 9E B0 17 33 A2  ^.m4.].N......3.
#     00F0: 53 56 A7 BA 06 96 42 86   14 8C 4E 29 4A AB A6 E9  SV....B...N)J...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.039 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2D C5 D5 01 31 4C 38 04   5E 1D D0 3F B8 AF C0 77  -...1L8.^..?...w
#     0010: 28 BD 9B BE 7E FE 65 16   C1 AA 36 4A FA 37 30 89  (.....e...6J.70.
#     0020: A1 AC 9E D6 78 D9 3C 9E   49 82 A6 E6 B7 79 B6 AE  ....x.<.I....y..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.040 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.042 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.042 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.044 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 CB 36 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:22.000 UTC",
#       "not  after"         : "2024-01-17 10:47:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#           0010: E3 90 C4 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.067 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C AE 0B 70 09 82 04 E6   60 88 F9 1A 09 F4 32 07  ...p....`.....2.
#     0010: 9C A9 E7 D6 27 48 B8 C7   5D E9 0B F2 C2 8B 8B EF  ....'H..].......
#     0020: 93 07 75 16 F2 C6 AA 43   CD 4A 1A 93 7B C8 B5 E8  ..u....C.J......
#     0030: EB 7E 2B FD 23 E1 73 F3   AE A0 67 47 03 2F 25 F7  ..+.#.s...gG./%.
#     0040: 27 61 1A 1D 95 6C D2 2B   6C 80 73 82 51 8F 03 16  'a...l.+l.s.Q...
#     0050: 3B 95 F5 5F D4 09 61 CC   60 BC DA 88 79 F2 1E 0F  ;.._..a.`...y...
#     0060: E6 C4 5E 2B AA C8 B5 53   82 28 04 CC 7F E1 A2 91  ..^+...S.(......
#     0070: 28 C0 0F 77 6B 1D 5A 96   FF 0C 23 F2 A4 7F 30 51  (..wk.Z...#...0Q
#     0080: E1 B7 D4 D6 59 EC 99 81   50 9E 15 67 00 C2 DC 69  ....Y...P..g...i
#     0090: 85 B6 5C E3 29 C5 ED 5A   AC 2B 5D 8D BD FD 7A A6  ..\.)..Z.+]...z.
#     00A0: F8 39 9F F1 D2 E5 AB 01   84 14 2B E8 6A E1 BD 25  .9........+.j..%
#     00B0: CB D9 D4 F9 31 20 BF A6   F5 2F 0E 84 0E FA B8 B0  ....1 .../......
#     00C0: 80 E0 5D 93 AD E2 66 E0   F3 03 5C 6D 92 63 44 D0  ..]...f...\m.cD.
#     00D0: 2D 74 00 F2 B8 27 8D D2   B4 2B 18 67 69 67 70 D0  -t...'...+.gigp.
#     00E0: 0F 1A D6 6B 79 44 55 C4   22 EB 35 3F 66 D5 D3 4D  ...kyDU.".5?f..M
#     00F0: 88 83 39 DF D0 3F C1 E0   1C 67 A5 35 7C B4 AF AD  ..9..?...g.5....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.068 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 43 8C 88 1F 97 CD AD   25 D5 5C 58 38 41 B0 0C  .C......%.\X8A..
#     0010: C0 B8 C7 FB CC AA 75 7B   CA F9 38 F8 02 9B 7F E2  ......u...8.....
#     0020: 12 F5 75 12 30 BE 59 B6   F3 4F 77 FD 0A 96 55 78  ..u.0.Y..Ow...Ux
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.069 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.124 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "43 77 DF 85 64 EF 54 A1 E8 32 A0 D7 61 00 9D 3A 55 F2 F4 B2 3F F1 0A 4F D4 79 0A C4 23 D6 E2 DE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:47:42.384 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:47:42.385 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-19 10:47:55.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:56.169 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 C8 8A B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:14.000 UTC",
#       "not  after"         : "2024-01-17 10:47:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:56.182 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.400 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.402 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.402 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.406 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.419 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "0A 49 EB 31 3F 1A AB 89 EB D1 11 80 EA B8 B8 52 75 08 80 24 24 B6 D1 AA E1 1E 99 AB 17 D0 A3 D1",
#     "session id"          : "88 8C A3 6D E3 6A 99 FA DF BF 03 40 22 00 BE 87 CE F9 47 6A 75 D1 A4 98 E7 6F 46 62 57 2D F5 77",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6B 79 85 2B DD 69 0C D2   17 6A 7C 0E 97 26 4F D3  ky.+.i...j...&O.
#               0010: 4B CD 31 A4 68 E4 2A 22   73 6F 62 F3 89 45 B1 0E  K.1.h.*"sob..E..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.438 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "09 4E 29 9C 5E 04 FE 9A B9 55 40 6D 5E 9A 06 67 98 E5 BB 64 2D 45 9B DE 37 DA EA 64 AD 71 7E C9",
#     "session id"          : "88 8C A3 6D E3 6A 99 FA DF BF 03 40 22 00 BE 87 CE F9 47 6A 75 D1 A4 98 E7 6F 46 62 57 2D F5 77",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 82 59 8C 61 D4 32 E8   EE 5C 7F C4 FA E7 F9 FC  D.Y.a.2..\......
#             0010: F5 34 D8 63 64 98 FF 62   56 E9 1F 89 3E 5B 05 5F  .4.cd..bV...>[._
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:192|Consume

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14234ms
ok 78 stop command for single port in 18005ms
not ok 79 status detects locally running solr in 1474ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7385ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1462ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2537ms
ok 83 copying files around in 7054ms
ok 84 upconfig in 2540ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
not ok 87 Cleanup in 2498ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 22s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5vkpepstawt6a

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8219 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8219/

All tests passed

Build Log:
[...truncated 1262 lines...]
# ERROR: Error from server at http://localhost:33215/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16444ms
ok 60 Check help command in 4752ms
ok 61 basic post with a type specified in 5992ms
ok 62 basic post WITHOUT a type specified in 12080ms
ok 63 crawling a directory in 4636ms
ok 64 crawling a web site in 5628ms
ok 65 commit and optimize and delete in 3898ms
ok 66 args mode in 6475ms
ok 67 stdin mode in 3489ms
ok 68 post solr log into solr via script in 12293ms
ok 69 post solr log into solr via cli in 7737ms
ok 70 allowPaths - backup in 17387ms
ok 71 start solr with ssl in 19031ms
not ok 72 use different hostname when not checking peer-name in 20639ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 33215 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33215 (pid=4180863). Happy searching!
#
#     INFO  - 2023-10-19 08:31:11.406; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:31:11.411; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:31:11.844; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@423e4cbb(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 08:31:11.924; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 08:31:11.925; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 08:31:22.013; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 08:31:22.017; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 08:31:22.421; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:33215/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 08:31:23.807; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:31:23.811; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:33215/solr] to [https://127.0.0.1:33215].
# WARN  - 2023-10-19 08:31:24.618; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 08:31:24.668; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17730ms
ok 74 start solr with client truststore and security manager in 19795ms
not ok 75 start solr with mTLS needed in 53864ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-nXfFIr/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33215 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33215 (pid=4183549). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33216 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33216 (pid=4183719). Happy searching!
#
#     INFO  - 2023-10-19 08:32:27.933; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:32:27.942; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:32:28.497; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:28.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:28.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(ca,h=[localhost],a=[],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.565 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B CA 2C 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:14.000 UTC",
#     "not  after"         : "2024-01-17 08:32:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#         0010: 4B EA B1 C5                                        K...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.568 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 F7 25 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:05.000 UTC",
#     "not  after"         : "2024-01-17 08:32:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.582 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.962 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.083 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.085 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.085 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.104 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.104 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.107 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.114 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 B0 A0 F2 CA 10 49 66 2A CD 9E 18 0E 10 33 AC 11 A7 FB 16 95 4F FB 11 AA 25 5A 3A 6F 9B 75 90",
#   "session id"          : "CD 7B 54 91 26 26 67 B7 E3 64 A4 C1 8C 3F 00 CA CD 51 88 5A C9 C2 BD 65 2A 9E 2D BE 3E 31 9D 92",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 83 FE AF 82 E3 1E 32 CB   32 C5 AD 9A 11 28 F2 FD  ......2.2....(..
#             0010: BF 3A 10 4F C8 03 FF CA   B7 B4 83 78 CC 01 BC 43  .:.O.......x...C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.673 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F5 58 CD 02 C8 84 A5 D8 D1 4B 23 F9 58 01 27 73 9E DD F2 5D 93 34 B7 EE C3 BD FD E6 96 D0 DA E0",
#   "session id"          : "CD 7B 54 91 26 26 67 B7 E3 64 A4 C1 8C 3F 00 CA CD 51 88 5A C9 C2 BD 65 2A 9E 2D BE 3E 31 9D 92",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CE 57 EB 41 0D 69 B1 7F   06 E4 B4 A5 3D 9A A3 20  .W.A.i......=..
#           0010: 8D A2 9B F5 5E 7F DC C1   CF 0F D4 CC 5E 43 E5 6F  ....^.......^C.o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.673 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.674 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.682 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.682 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.708 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.710 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.725 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.730 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.730 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.733 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.734 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.736 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E E5 0A 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:10.000 UTC",
#       "not  after"         : "2024-01-17 08:32:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 25 62 26 72 C1 22 BD   4E D0 9B 3A 1B 24 9B 36  A%b&r.".N..:.$.6
#           0010: A6 39 ED 37                                        .9.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.736 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.823 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.827 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 4A 37 16 19 D5 17 0B   0D 38 C7 A4 CD A5 86 C3  .J7......8......
#     0010: 2B 64 29 E3 32 3B C4 5B   A3 67 3B 92 1B 56 B1 AA  +d).2;.[.g;..V..
#     0020: 30 86 4F B3 B6 BB F8 07   25 C6 13 57 16 99 92 38  0.O.....%..W...8
#     0030: E5 55 BC 6C 71 CD 84 28   9F AA 03 DE B9 14 4E 87  .U.lq..(......N.
#     0040: A9 45 E4 61 A9 8E C5 6C   06 D5 19 47 4C 9E FD B5  .E.a...l...GL...
#     0050: 81 BA 2B 9C EF 15 58 D9   77 45 47 2E F2 D8 B1 10  ..+...X.wEG.....
#     0060: 31 69 21 45 36 AA CA 63   F8 01 D9 7D 31 A1 D9 D5  1i!E6..c....1...
#     0070: 58 A0 54 00 DD 45 BD 3A   DB CF D5 A0 A0 9E 68 31  X.T..E.:......h1
#     0080: 4A 95 5D 87 68 25 3E 71   D9 2B AF 07 26 F7 C4 7C  J.].h%>q.+..&...
#     0090: 0D 8F 0C 9C 6D 78 78 CF   03 1B A1 79 3F FE AE CD  ....mxx....y?...
#     00A0: E5 45 6C 9D 96 5C 2C 71   82 E3 3A 39 10 AA 64 88  .El..\,q..:9..d.
#     00B0: CA BB C2 5B 2E 7A ED AC   77 79 95 AB D7 DA 22 0D  ...[.z..wy....".
#     00C0: 66 48 09 9B E7 5E B6 E8   6F FA 58 EF B7 A6 70 B2  fH...^..o.X...p.
#     00D0: C9 33 AC 61 1A 28 DF DE   9E D4 5C 9C BA 26 B1 BC  .3.a.(....\..&..
#     00E0: EB C6 8D FA F6 3C 1C 3F   F1 19 F6 15 11 B5 41 5B  .....<.?......A[
#     00F0: 96 7C 3D 57 18 F6 0D 16   96 23 C5 5E 92 82 4F 7B  ..=W.....#.^..O.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.834 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 98 19 F8 50 CF 66 DC   BF DE ED E7 F9 90 9F 1B  ....P.f.........
#     0010: 0A 59 5F F6 9F EC AD A3   D0 5B FB C2 94 1E 71 C2  .Y_......[....q.
#     0020: 10 61 AD C1 64 0F 8E B0   38 7C F5 65 C7 03 FC BC  .a..d...8..e....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.837 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.240 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B CA 2C 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:14.000 UTC",
#       "not  after"         : "2024-01-17 08:32:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#           0010: 4B EA B1 C5                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.308 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 34 EE 65 C9 02 88 CE   44 EB 6C 90 66 89 A9 D7  x4.e....D.l.f...
#     0010: AA A0 64 95 7B 16 8A A5   D3 E1 25 16 F4 A7 4A 69  ..d.......%...Ji
#     0020: DC A5 9C 25 E2 A8 B3 A1   FF 63 5F 33 F6 F9 32 DB  ...%.....c_3..2.
#     0030: FA 4A 8E D6 BF 47 34 0F   9A E4 76 49 79 4F CF D2  .J...G4...vIyO..
#     0040: 3B B2 5C E1 08 3B 72 2F   9B FA 01 F0 EC 96 1E F4  ;.\..;r/........
#     0050: 24 7C B5 60 FF 19 6B C9   93 23 78 DD 94 64 AD 31  $..`..k..#x..d.1
#     0060: 1F AE A0 58 56 8D 72 BB   84 A3 2F C0 A4 A9 09 C4  ...XV.r.../.....
#     0070: 4E 85 38 0F 07 C4 CC 34   70 C4 9E 29 17 F9 1E DB  N.8....4p..)....
#     0080: 38 B3 A5 FC DA 8D F4 BA   DF 06 EF 3C C0 F7 F7 00  8..........<....
#     0090: 95 21 0A 84 99 74 92 72   C6 E9 42 A9 46 6F 85 61  .!...t.r..B.Fo.a
#     00A0: B3 1F 3A 6C C7 06 C8 E4   01 EF 84 F2 36 71 1F F3  ..:l........6q..
#     00B0: 44 67 9B F3 A9 BF 7D F2   A1 D4 0F 1E 13 E7 0C 71  Dg.............q
#     00C0: E8 70 47 6B CF 55 02 DE   76 60 A8 0E 38 B3 77 83  .pGk.U..v`..8.w.
#     00D0: EB F2 4B DD 5E 57 FA 75   18 E8 9C DD 53 CF 0B 66  ..K.^W.u....S..f
#     00E0: 92 58 A4 24 C7 85 D7 53   F3 CB 9B AE 6B EA EA E4  .X.$...S....k...
#     00F0: 2E 3F A7 0D FE 4E A5 4C   4E 6E AE 7C 08 50 3F B0  .?...N.LNn...P?.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.310 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 C3 8A B0 28 45 CD 84   4E 85 BA 32 FF 4F 21 0F  ....(E..N..2.O!.
#     0010: 06 2A F2 E9 43 1A 72 B9   44 50 54 D1 53 DE 83 0B  .*..C.r.DPT.S...
#     0020: CB 78 28 28 9B 53 8C 31   7E C1 4D 54 80 E7 52 0F  .x((.S.1..MT..R.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.314 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.394 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9C 35 B1 B8 8A 5D 5D 5A 81 A0 C0 DC 56 70 3E 48 F9 3E C3 57 CA 2F 7D 8D 10 14 A5 BB 8E 95 A5 07",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 08:32:30.800 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 08:32:30.801 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 08:32:32.373; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:32:32.379; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:32:32.956; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:32.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:32.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:32.990 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B CA 2C 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:14.000 UTC",
#     "not  after"         : "2024-01-17 08:32:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#         0010: 4B EA B1 C5                                        K...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:32.994 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 F7 25 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:05.000 UTC",
#     "not  after"         : "2024-01-17 08:32:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:33.006 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.175 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.175 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.176 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.176 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.181 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.191 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.191 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.194 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD 2A C8 21 1E AA 92 25 B5 8F 78 C2 47 47 96 41 51 0E 9C F2 C2 E3 3F 39 32 2A 09 F0 D5 6E 30 B6",
#   "session id"          : "E2 DC C3 B4 2D 2A F0 2F 8F C2 01 C0 F9 5C DE C4 BD 48 CE 35 36 A8 D6 ED 88 BB F4 1D 8C B5 10 69",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 7B F7 D6 4E 23 25 F8   16 C1 52 2F 5A D0 0C 01  ....N#%...R/Z...
#             0010: EB 9D 8D 52 5E 16 A6 B1   1B DD 2D 9B 71 68 64 6A  ...R^.....-.qhdj
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.343 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4B 59 DE 59 26 E0 93 A8 AB 29 B3 5B FA 1B 4C 11 4D FE CB 49 FD F0 48 B5 96 A9 37 7A 2A 26 47 3F",
#   "session id"          : "E2 DC C3 B4 2D 2A F0 2F 8F C2 01 C0 F9 5C DE C4 BD 48 CE 35 36 A8 D6 ED 88 BB F4 1D 8C B5 10 69",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 53 73 EB BC 68 11 F8 C6   06 2F 2F ED A3 02 85 86  Ss..h....//.....
#           0010: 01 53 CC 3E AF 33 E3 5D   21 0F EB 41 49 33 5C 3E  .S.>.3.]!..AI3\>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.344 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.344 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.351 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.371 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.376 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.376 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.393 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.395 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.402 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.405 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.412 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.412 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.413 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.415 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.416 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.416 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.417 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.420 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E E5 0A 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:10.000 UTC",
#       "not  after"         : "2024-01-17 08:32:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 25 62 26 72 C1 22 BD   4E D0 9B 3A 1B 24 9B 36  A%b&r.".N..:.$.6
#           0010: A6 39 ED 37                                        .9.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.478 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 3D 75 F4 CA EC 13 BF   49 B1 79 BE 77 5F 79 95  /=u.....I.y.w_y.
#     0010: C6 4E D2 ED 13 85 66 DD   4E ED 6B FC FB C2 24 A4  .N....f.N.k...$.
#     0020: 20 5D 5E 52 08 BD F9 D6   05 26 F1 B3 31 04 F0 AA   ]^R.....&..1...
#     0030: C5 8D BA 35 B7 4B CE 46   EB 98 A8 10 68 1B E7 9B  ...5.K.F....h...
#     0040: DF 25 7A B4 93 98 74 56   78 07 A7 A6 92 E5 92 C4  .%z...tVx.......
#     0050: 99 BD 5F EC 9B 12 B8 C3   A6 F9 1F 56 9C A3 DB ED  .._........V....
#     0060: 3D A3 33 B8 30 04 AC D5   9A 2E 9B 28 5D 88 2A 58  =.3.0......(].*X
#     0070: B9 7F F4 F5 34 BF 00 CD   7F 71 7C A6 3A 95 8A 36  ....4....q..:..6
#     0080: 5A CF 07 CA 09 31 A2 1F   DC F3 C0 13 DA 96 AE 0C  Z....1..........
#     0090: CA 96 E6 80 71 1E B8 D5   AE E3 92 02 27 CD 12 9B  ....q.......'...
#     00A0: C8 A9 28 43 24 37 AE 05   93 BD B2 40 93 FD F6 30  ..(C$7.....@...0
#     00B0: DC A3 16 92 FB 47 DB E5   6F 22 E6 0B 81 36 50 AB  .....G..o"...6P.
#     00C0: 16 59 51 5E BF 8E 5C B4   3D EC 93 44 A1 19 B7 64  .YQ^..\.=..D...d
#     00D0: F2 8E 7E 9D CE B2 4E 44   07 F5 BF DA 76 42 27 99  ......ND....vB'.
#     00E0: E3 22 BC 1E 63 B5 61 46   0F 78 4F 42 1D 62 CF 94  ."..c.aF.xOB.b..
#     00F0: 7F 9C BC 05 7F D7 58 D8   96 DE 28 BD F0 C1 53 3E  ......X...(...S>
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.480 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C8 ED 85 7B 7D 0F 2E 8F   46 45 FE 6A 4D CE C2 DC  ........FE.jM...
#     0010: B2 9F B6 5D 53 B6 6A 84   4E A7 83 4F F9 23 BA EE  ...]S.j.N..O.#..
#     0020: B5 DD 08 A9 77 29 A2 DC   8F BE F7 9E 62 82 82 33  ....w)......b..3
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.481 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.485 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B CA 2C 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:14.000 UTC",
#       "not  after"         : "2024-01-17 08:32:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#           0010: 4B EA B1 C5                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.508 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 FF AD B0 28 EE 57 EA   AB DA A9 55 7C 45 B7 8F  ....(.W....U.E..
#     0010: C4 15 E9 78 AA 19 11 AB   40 A3 77 A5 E5 E0 7A 90  ...x....@.w...z.
#     0020: 5E F2 2B BD 76 D8 10 8E   AA BD 6A 7A 5F 20 58 76  ^.+.v.....jz_ Xv
#     0030: BC 3F 66 2D 3C AF 14 76   95 B6 87 0B B0 C7 E6 CD  .?f-<..v........
#     0040: 1E 50 3B 22 5C 89 05 B2   0B 3A 76 18 B9 B2 6A A2  .P;"\....:v...j.
#     0050: 0A F3 22 AA 93 D2 32 8D   F7 36 7B 7D 4E 22 20 12  .."...2..6..N" .
#     0060: 49 92 DF B3 7E BC 85 EE   52 A4 03 C2 2B F8 19 F5  I.......R...+...
#     0070: 94 2F 73 65 7C 43 17 85   49 61 DE 13 16 17 BD 7E  ./se.C..Ia......
#     0080: C9 18 F6 7F CA D3 81 6F   3C 63 07 21 2E 2A F2 83  .......o<c.!.*..
#     0090: 63 E6 4E EA 78 3A FB 76   F4 2B F7 E2 33 DA A7 01  c.N.x:.v.+..3...
#     00A0: C7 38 B5 CF 3E 31 40 1F   B2 AC F9 C9 C0 36 26 34  .8..>1@......6&4
#     00B0: D5 A7 64 A3 30 F9 0E F5   5D 6C 81 B5 C5 86 50 4D  ..d.0...]l....PM
#     00C0: 2B C8 C5 E0 F0 E9 04 04   AC CA B7 79 11 40 F2 85  +..........y.@..
#     00D0: D6 0A A8 CC F3 B0 89 AF   86 A4 0C 3E 6A 96 EB 92  ...........>j...
#     00E0: 10 5F 38 C3 73 A0 66 48   4E D2 4C 32 9C 8F E8 70  ._8.s.fHN.L2...p
#     00F0: CC A9 E6 BA 47 BC 3D 02   34 7B 62 DF 07 6C 29 B0  ....G.=.4.b..l).
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.509 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 70 9E 04 02 95 89 DD 4A   1A 68 8E C3 62 69 33 C5  p......J.h..bi3.
#     0010: 9A A3 EC 13 9B 8A 44 3C   CD 4A 96 E9 11 73 38 B2  ......D<.J...s8.
#     0020: 66 8A 64 6B 7C 9A B0 AB   BA 9B D2 D1 6E 17 C7 02  f.dk........n...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.510 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.576 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CF F6 45 0A EF 72 FD 84 EC 61 1B 88 40 ED 2B 0F 5D BA 76 59 E7 83 B8 C7 6F DF 70 45 B7 5F 94 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 08:32:34.087 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 08:32:34.087 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 08:32:46.779; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:47.116 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 F7 25 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:05.000 UTC",
#       "not  after"         : "2024-01-17 08:32:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:47.131 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.554 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.556 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.556 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.572 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.573 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.573 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.575 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "13 D1 28 09 5E 2F 6C 99 89 A3 87 B6 ED 47 4A 09 A2 EF E5 AE EB 59 51 8B 9A 8B 54 C7 E1 07 F4 BD",
#     "session id"          : "56 63 C4 02 ED 02 14 FC 15 B7 1D 09 E2 6A 2B E1 F4 16 16 17 82 26 04 8C 6A 8A 37 B6 79 19 AA 4E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4E B8 C2 D3 77 30 85 AA   DC 6B 8E FE 06 D7 76 C8  N...w0...k....v.
#               0010: A9 59 3D E3 96 72 FB C5   E2 B3 A3 10 C3 42 42 78  .Y=..r.......BBx
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.594 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CE 53 60 B2 F9 D8 2B 76 12 3C B1 F6 F3 EE B0 BE 27 5E B4 EB 7B 99 53 6F DB 68 63 C3 A4 97 22 58",
#     "session id"          : "56 63 C4 02 ED 02 14 FC 15 B7 1D 09 E2 6A 2B E1 F4 16 16 17 82 26 04 8C 6A 8A 37 B6 79 19 AA 4E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0F 72 2E CB 48 14 68 3E   96 1E 2A FD 15 57 34 5E  .r..H.h>..*..W4^
#             0010: 7E 56 E3 2E 78 63 CC A9   B2 5A 5D 42 D0 98 9D 01  .V..xc...Z]B....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.609 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.610 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.612 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14579ms
ok 78 stop command for single port in 18703ms
not ok 79 status detects locally running solr in 1570ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 8170ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1553ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2603ms
ok 83 copying files around in 7163ms
ok 84 upconfig in 2934ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1250ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 87 Cleanup in 2579ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 59s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5ak4q6jaqh5xg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8218 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8218/

1 tests failed.
FAILED:  org.apache.solr.search.TestCoordinatorRole.testNRTRestart

Error Message:
java.lang.AssertionError: initial error time threshold exceeded

Stack Trace:
java.lang.AssertionError: initial error time threshold exceeded
	at __randomizedtesting.SeedInfo.seed([6AA5A351E4D32BB0:9A31139A46CEF966]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.search.TestCoordinatorRole.getHostCoreName(TestCoordinatorRole.java:481)
	at org.apache.solr.search.TestCoordinatorRole.testNRTRestart(TestCoordinatorRole.java:406)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 10287 lines...]
# ERROR: Error from server at http://localhost:41079/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16436ms
ok 60 Check help command in 4423ms
ok 61 basic post with a type specified in 5952ms
ok 62 basic post WITHOUT a type specified in 11784ms
ok 63 crawling a directory in 4532ms
ok 64 crawling a web site in 4600ms
ok 65 commit and optimize and delete in 4002ms
ok 66 args mode in 6616ms
ok 67 stdin mode in 3421ms
ok 68 post solr log into solr via script in 10605ms
ok 69 post solr log into solr via cli in 7261ms
ok 70 allowPaths - backup in 17065ms
ok 71 start solr with ssl in 18728ms
not ok 72 use different hostname when not checking peer-name in 20578ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41079 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41079 (pid=3671573). Happy searching!
#
#     INFO  - 2023-10-19 04:47:08.112; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:47:08.117; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 04:47:08.598; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 04:47:08.701; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 04:47:08.701; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 04:47:18.431; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 04:47:18.436; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 04:47:18.813; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41079/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 04:47:20.244; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:47:20.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41079/solr] to [https://127.0.0.1:41079].
# WARN  - 2023-10-19 04:47:21.067; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 04:47:21.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17187ms
ok 74 start solr with client truststore and security manager in 19201ms
not ok 75 start solr with mTLS needed in 53337ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-w2FZdM/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41079 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41079 (pid=3674244). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41080 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41080 (pid=3674350). Happy searching!
#
#     INFO  - 2023-10-19 04:48:23.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:48:23.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 04:48:24.421; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:24.429; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:24.431; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:24.550 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D5 6E EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:10.000 UTC",
#     "not  after"         : "2024-01-17 04:48:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#         0010: CC A1 2F 2C                                        ../,
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:24.554 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 8D 67 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:00.000 UTC",
#     "not  after"         : "2024-01-17 04:48:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:24.775 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.964 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.964 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.964 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.965 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:25.053 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.053 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:25.055 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:25.055 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.059 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.071 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.071 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.071 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.073 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "93 EC 09 84 8E EC 5A 0B 54 50 66 01 5A 21 51 5A 22 A4 5F 96 BE BD A6 73 14 49 57 64 F9 4E CF 19",
#   "session id"          : "21 34 F0 98 EB 08 E1 79 B6 5F BE EA AE 21 98 F9 39 9F 2C 6E 8B D6 EC E0 90 69 DD 52 87 6F 3B D9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6E BA 83 AA 79 8B 6D 83   32 42 8D C9 50 8C 1E C8  n...y.m.2B..P...
#             0010: 5E D3 3E B1 2F D6 8A 08   B1 76 4A 9A C2 58 A3 4B  ^.>./....vJ..X.K
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.286 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B4 CF C0 5A 21 C1 1D 34 05 FA E3 AC 94 64 C2 1D E2 24 00 BD BA 1C C0 57 81 A8 8D 18 9D 5B AE 93",
#   "session id"          : "21 34 F0 98 EB 08 E1 79 B6 5F BE EA AE 21 98 F9 39 9F 2C 6E 8B D6 EC E0 90 69 DD 52 87 6F 3B D9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D3 AC 27 F5 A4 36 4B 6A   74 42 FB 7A 2A 5D 6A 99  ..'..6KjtB.z*]j.
#           0010: 2A 30 41 44 E2 09 09 67   A0 6A CE 0C 36 D4 E6 0A  *0AD...g.j..6...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.286 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.287 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.294 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.294 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.295 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.301 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.301 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.302 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.327 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.331 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.335 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.340 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.341 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.346 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.349 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.349 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.353 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.354 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.355 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.355 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.452 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 4B C2 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:05.000 UTC",
#       "not  after"         : "2024-01-17 04:48:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 EF CA 7E BE FB 6D EE   FA 14 1D 4F F1 0C CD FD  ......m....O....
#           0010: D5 CA 43 AB                                        ..C.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.452 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.545 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.549 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 8C 9B 33 70 8F 9A 31   0E C1 2C A1 66 33 3C 4D  3..3p..1..,.f3<M
#     0010: EA AF 75 63 A2 7A 81 20   69 67 21 A1 19 12 FE 59  ..uc.z. ig!....Y
#     0020: 9A 08 E0 4E 79 16 0B 42   48 E4 95 69 74 2C A2 AB  ...Ny..BH..it,..
#     0030: F0 7C 79 73 6E A2 36 E8   C5 37 25 B1 1C 9B BC EC  ..ysn.6..7%.....
#     0040: D5 D5 3A 31 58 71 24 CA   BA ED 13 A2 92 FA 07 12  ..:1Xq$.........
#     0050: 92 96 81 3A 1F 8F 9E AD   63 88 F3 D0 04 02 3E A8  ...:....c.....>.
#     0060: D2 B7 C7 A8 DB 85 7A 40   89 CD 36 56 8F E9 91 FD  ......z@..6V....
#     0070: 6B 7C 55 C8 C0 90 27 CC   F0 B0 9E DD 99 32 1F 28  k.U...'......2.(
#     0080: DE 3A 46 74 62 2A 0B FF   E8 D6 B4 C3 56 C1 69 3E  .:Ftb*......V.i>
#     0090: 78 F0 E2 FC 00 DC 04 71   B4 3C AE F9 59 56 A3 96  x......q.<..YV..
#     00A0: 1F 31 15 5C 87 61 AB 9B   CB 82 50 C6 CB A8 5E 20  .1.\.a....P...^
#     00B0: D9 7A 7E 2C 3E 18 27 11   ED B7 8B 69 85 2C E0 91  .z.,>.'....i.,..
#     00C0: 4E 44 6F E3 4C 42 98 AF   B5 3C 42 24 15 1D 76 B7  NDo.LB...<B$..v.
#     00D0: E2 71 4D AC 10 86 9F A3   CC 14 2A A1 82 53 E6 12  .qM.......*..S..
#     00E0: D8 89 36 D1 15 1E 8F A2   D5 4C BF AB D9 C7 44 0B  ..6......L....D.
#     00F0: C7 35 20 4B F0 2E 3E CB   C4 3E C9 9D 43 A6 A1 2A  .5 K..>..>..C..*
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.551 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 15 09 17 1B 48 1D DA D9   E1 7F 48 48 48 0F 93 71  ....H.....HHH..q
#     0010: 1A 93 84 E4 05 28 22 45   F0 30 32 E0 B9 67 B1 A4  .....("E.02..g..
#     0020: C0 2A 0B 59 E5 25 B6 6B   66 97 73 DA EB 64 24 CF  .*.Y.%.kf.s..d$.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.552 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:25.554 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.554 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.554 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.555 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D5 6E EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:10.000 UTC",
#       "not  after"         : "2024-01-17 04:48:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#           0010: CC A1 2F 2C                                        ../,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 E7 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:02.000 UTC",
#       "not  after"         : "2024-01-17 04:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.588 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 36 6D 19 C7 8D BD E1 ED   9D 33 36 07 72 30 71 00  6m.......36.r0q.
#     0010: 41 E0 D8 B6 7C 44 D2 D1   31 F6 18 94 C2 B8 32 BF  A....D..1.....2.
#     0020: B1 E2 D7 33 EE F6 C6 98   5C B7 8C 75 88 05 5D EC  ...3....\..u..].
#     0030: 26 36 23 B7 3F EB BC B2   55 AE BA A3 22 4F 1E F8  &6#.?...U..."O..
#     0040: 45 C1 FD 83 AE CD A9 12   4A B3 58 7C 8A E2 A4 4D  E.......J.X....M
#     0050: 70 E6 E4 C3 1A 8F 9A 58   01 3C 97 7B 13 32 31 B2  p......X.<...21.
#     0060: 4F E5 D0 A4 94 1D 20 DA   83 CD 31 23 2E 1A 8E B7  O..... ...1#....
#     0070: CE DB F7 A9 0F 0F C3 30   86 62 E9 B8 9B F9 AA 1F  .......0.b......
#     0080: 34 EA 35 47 07 DB 96 99   D9 BC 3E 06 B9 82 FD C5  4.5G......>.....
#     0090: 61 D5 B8 27 A3 76 7D 7F   C6 86 13 C4 A1 A8 93 73  a..'.v.........s
#     00A0: 93 ED 82 A5 B0 92 B5 91   B3 73 81 F6 3F 8D CE 34  .........s..?..4
#     00B0: 72 B9 28 52 17 75 14 65   95 35 5B 8A B6 A3 37 CC  r.(R.u.e.5[...7.
#     00C0: D6 0E C4 84 B7 9F 01 2A   75 C3 60 6C 52 B9 30 A6  .......*u.`lR.0.
#     00D0: 6E 0A 9B 56 6B D7 CA C0   30 A2 EF 7E 33 23 48 58  n..Vk...0...3#HX
#     00E0: A7 6A 60 8E 68 F2 03 B0   79 9F 1D 2C A4 0D CF 4D  .j`.h...y..,...M
#     00F0: F9 9F 3B 1B B9 A0 1F 1F   65 EC 03 DA 47 5F 95 43  ..;.....e...G_.C
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.590 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4A 78 66 7C D6 55 C4 7C   88 1F 7F 1B 83 C5 85 EC  Jxf..U..........
#     0010: D0 36 D6 26 5B C7 7B A3   D3 A3 84 93 2B 0A F5 52  .6.&[.......+..R
#     0020: 09 43 D4 EC 2F 3B 97 EF   8D A2 26 81 B0 D0 20 F7  .C../;....&... .
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.594 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.670 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 AB 6B 67 EA 8F 23 56 A7 47 B0 00 97 0D 20 A9 2A BC 27 D4 D4 A5 72 B8 E9 82 57 7A 01 C7 A9 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 04:48:26.483 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 04:48:26.485 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 04:48:28.546; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:48:28.551; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 04:48:28.946; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:28.949; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:28.949; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(ca,h=[localhost],a=[],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:28.985 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D5 6E EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:10.000 UTC",
#     "not  after"         : "2024-01-17 04:48:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#         0010: CC A1 2F 2C                                        ../,
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:28.989 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 8D 67 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:00.000 UTC",
#     "not  after"         : "2024-01-17 04:48:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:29.001 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:29.173 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.173 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:29.175 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:29.175 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.180 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.191 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.192 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.194 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F6 3E 05 FD F8 9C B3 AD 14 A1 DB 82 75 8D 29 9F 59 56 FC 67 02 55 F8 EE C8 38 B9 62 B3 7B CF F6",
#   "session id"          : "1C 36 D0 F6 EE AA 1D 6E 00 71 B1 93 B4 54 02 01 39 18 49 13 17 BC 5C FC 2F BE F8 16 13 D1 48 5A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C3 5F C2 D4 42 33 07 C7   2A CF D6 23 D6 13 DF F7  ._..B3..*..#....
#             0010: BA 28 36 F0 3B B0 EB E2   27 9F 3E 1A 31 3A B8 19  .(6.;...'.>.1:..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.321 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "34 1D AC ED 47 A5 E2 97 00 BD 97 D7 FC CC C1 DF B1 6A 2B E4 1D 81 12 9B 8C 1C 9B 5A 3E 5D F9 8A",
#   "session id"          : "1C 36 D0 F6 EE AA 1D 6E 00 71 B1 93 B4 54 02 01 39 18 49 13 17 BC 5C FC 2F BE F8 16 13 D1 48 5A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F4 C1 60 2E 99 12 6B F7   34 B5 14 BA 17 2D 4C B9  ..`...k.4....-L.
#           0010: 19 6E 60 4F A4 9B 77 91   8E CD 0C 87 93 19 25 40  .n`O..w.......%@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.322 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.322 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.326 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.328 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.329 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.343 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.345 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.346 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.367 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.367 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.368 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.368 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.369 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.369 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.370 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.370 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.373 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 4B C2 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:05.000 UTC",
#       "not  after"         : "2024-01-17 04:48:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 EF CA 7E BE FB 6D EE   FA 14 1D 4F F1 0C CD FD  ......m....O....
#           0010: D5 CA 43 AB                                        ..C.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.373 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.621 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.624 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 3D 54 C7 E8 41 7B EE   CF CE 97 E1 4A 5F DF 5B  U=T..A......J_.[
#     0010: 7B FA F9 2F 94 C2 95 F9   92 60 63 91 7A 27 90 EC  .../.....`c.z'..
#     0020: 95 FA DB B0 D3 EE C6 5E   35 C5 F3 F4 05 86 A7 0B  .......^5.......
#     0030: E3 15 A2 3D 90 ED F6 8F   9F 3F BF 61 C6 61 30 17  ...=.....?.a.a0.
#     0040: F0 EC 69 FE 41 BF 9D DA   A0 23 9F F9 78 B2 9E DA  ..i.A....#..x...
#     0050: 8C 00 A6 0B C4 C4 10 8E   32 98 33 AE FF 33 53 4F  ........2.3..3SO
#     0060: 72 73 43 E6 27 68 FE 9D   84 41 9C D3 2D 28 D1 7C  rsC.'h...A..-(..
#     0070: 3A B4 E0 BA 87 43 E7 5D   0F BA 4B 79 1F E8 F9 A1  :....C.]..Ky....
#     0080: 9F 51 29 34 0C 88 FA 4C   17 94 6F 7E 32 18 CC 07  .Q)4...L..o.2...
#     0090: DA 6B 72 EC 80 29 41 16   64 AF 1F 26 04 F0 53 14  .kr..)A.d..&..S.
#     00A0: 38 9D 95 DB 08 76 B0 21   86 4D CD C0 15 D4 BA D2  8....v.!.M......
#     00B0: EC BE C6 84 B1 EB 11 E0   43 F9 F2 80 12 FF B1 57  ........C......W
#     00C0: 4E 73 97 97 1F AD 93 3C   04 0B 55 94 5E CD 34 ED  Ns.....<..U.^.4.
#     00D0: 97 AB 12 31 B7 38 6F 95   DB 94 5A 02 DC B6 30 E8  ...1.8o...Z...0.
#     00E0: 84 08 CC 04 19 6C 98 79   E1 A4 B9 F9 9C 91 D0 07  .....l.y........
#     00F0: 95 98 9F A9 EC 71 19 E2   65 06 86 71 FE 23 D2 D9  .....q..e..q.#..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.626 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3E F1 98 94 E1 60 07 92   4E A7 A0 54 D4 B2 C4 A4  >....`..N..T....
#     0010: 32 2B 7A D8 27 FB 2B 2C   35 C9 48 EA FF D4 98 F7  2+z.'.+,5.H.....
#     0020: B5 45 7D E2 1A 07 02 F9   A8 93 F5 80 FD E5 B3 53  .E.............S
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.627 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.629 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.629 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.631 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D5 6E EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:10.000 UTC",
#       "not  after"         : "2024-01-17 04:48:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#           0010: CC A1 2F 2C                                        ../,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 E7 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:02.000 UTC",
#       "not  after"         : "2024-01-17 04:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.653 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3F BF C2 43 E6 D4 69 3D   DA 5F BD F7 28 33 9B F1  ?..C..i=._..(3..
#     0010: 5B E7 81 13 0D F6 56 58   5A A2 9B 6F C0 0B 22 7F  [.....VXZ..o..".
#     0020: 3B 88 22 99 EF 2E 1C 6A   76 E5 A5 49 57 54 74 32  ;."....jv..IWTt2
#     0030: 39 C1 C2 3E 3C 16 0C CE   A3 22 49 A0 3F B8 84 DA  9..><...."I.?...
#     0040: 19 AE 29 A1 54 47 0B 30   29 05 F1 76 7C F6 9B FE  ..).TG.0)..v....
#     0050: A5 8D FB 09 5B BA 53 EA   CC E4 DB 96 F6 65 47 03  ....[.S......eG.
#     0060: 99 04 96 AE 09 C1 7E 99   3F B0 4E 97 6D 73 7E 9C  ........?.N.ms..
#     0070: F7 2E CA 5B A7 76 62 BF   A4 88 11 F4 D8 0B 87 1E  ...[.vb.........
#     0080: BB 9E 09 A4 D4 00 97 0D   A0 63 FA 31 A5 B0 08 7B  .........c.1....
#     0090: 20 4A 5F FD 65 7E E9 8A   DF 35 B3 5F 5F B1 30 95   J_.e....5.__.0.
#     00A0: 65 DF F3 13 F5 68 23 A5   C5 91 18 B3 1E F1 2B 8E  e....h#.......+.
#     00B0: DC 4F 97 EB 92 1C F9 D7   A5 41 70 27 5B 6A 44 33  .O.......Ap'[jD3
#     00C0: 3A 69 0C 49 C7 12 06 74   67 6A 93 1B 5B BC 7F 09  :i.I...tgj..[...
#     00D0: 34 01 C4 AB 8C 25 89 07   FE E2 26 20 DA 86 F9 9E  4....%....& ....
#     00E0: D0 18 98 7A 0A 6F 64 58   5B 92 A5 79 CD 28 67 5B  ...z.odX[..y.(g[
#     00F0: 1E B6 0F E8 84 D8 19 2F   B8 51 B3 50 69 37 88 B7  ......./.Q.Pi7..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.654 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FF 00 22 A3 4F 26 F4 66   BC C2 00 51 8D 74 71 04  ..".O&.f...Q.tq.
#     0010: 45 22 2B 56 73 E8 02 43   6E 2E D3 9C 95 CA E3 11  E"+Vs..Cn.......
#     0020: 06 4F ED 94 98 0F 66 1E   C9 B9 55 5B 26 A3 B8 25  .O....f...U[&..%
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.654 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.704 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C9 1A A0 21 29 38 34 F1 F5 70 4D 8F F5 99 FF A4 D9 16 8D 80 08 A4 B7 12 82 C8 F0 18 96 49 DE D8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 04:48:29.972 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 04:48:29.974 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-19 04:48:42.004; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:42.409 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 8D 67 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:00.000 UTC",
#       "not  after"         : "2024-01-17 04:48:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 E7 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:02.000 UTC",
#       "not  after"         : "2024-01-17 04:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:42.422 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:42.585 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.585 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:42.587 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:42.587 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.591 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.602 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.602 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.602 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.605 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "EB 38 AD CC ED 4E B5 39 F0 B1 72 B8 C1 33 9D 76 C5 16 E1 45 25 32 55 7F 9A 2C E0 24 55 1D 06 08",
#     "session id"          : "03 66 04 0D B8 CA 93 80 EE B4 64 21 F6 F8 5B E4 6E 65 74 42 4C 11 8A 80 B0 FA 0C B5 4B CA 43 04",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: BE 51 16 48 FB 25 05 03   03 6D C9 7A 35 AC CC E5  .Q.H.%...m.z5...
#               0010: B3 F7 76 0D 10 1F 02 EC   90 CB DF 17 F5 2C 6E 72  ..v..........,nr
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:42.620 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F4 35 0C F7 BB 47 1B BF 6B 4A 70 92 0E 61 CF 85 1F CF 15 9F 91 F0 AD EA EE 68 E0 C0 1C F4 0C 4F",
#     "session id"          : "03 66 04 0D B8 CA 93 80 EE B4 64 21 F6 F8 5B E4 6E 65 74 42 4C 11 8A 80 B0 FA 0C B5 4B CA 43 04",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#      

[...truncated too long message...]

llInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14798ms
ok 78 stop command for single port in 17974ms
not ok 79 status detects locally running solr in 1538ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7615ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1535ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2978ms
ok 83 copying files around in 6809ms
ok 84 upconfig in 2651ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1243ms
not ok 87 Cleanup in 2527ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestCoordinatorRole.testNRTRestart (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestCoordinatorRole.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestCoordinatorRole.testNRTRestart" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6AA5A351E4D32BB0 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 6m 23s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/hvluol7ftncsw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8217 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8217/

All tests passed

Build Log:
[...truncated 1434 lines...]
BUILD FAILED in 1h 3m 24s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/xdg5czc56hjs4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8216 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8216/

All tests passed

Build Log:
[...truncated 1262 lines...]
# ERROR: Error from server at http://localhost:41773/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16540ms
ok 60 Check help command in 4354ms
ok 61 basic post with a type specified in 5878ms
ok 62 basic post WITHOUT a type specified in 11646ms
ok 63 crawling a directory in 4730ms
ok 64 crawling a web site in 5121ms
ok 65 commit and optimize and delete in 3992ms
ok 66 args mode in 6617ms
ok 67 stdin mode in 3372ms
ok 68 post solr log into solr via script in 12458ms
ok 69 post solr log into solr via cli in 9708ms
ok 70 allowPaths - backup in 19501ms
ok 71 start solr with ssl in 23594ms
not ok 72 use different hostname when not checking peer-name in 23814ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41773 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41773 (pid=3157641). Happy searching!
#
#     INFO  - 2023-10-18 22:52:42.197; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:52:42.203; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 22:52:42.654; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 22:52:42.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 22:52:42.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 22:52:54.641; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 22:52:54.646; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 22:52:54.989; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41773/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-18 22:52:56.383; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:52:56.387; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41773/solr] to [https://127.0.0.1:41773].
# WARN  - 2023-10-18 22:52:57.193; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 22:52:57.240; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17071ms
ok 74 start solr with client truststore and security manager in 19250ms
not ok 75 start solr with mTLS needed in 53069ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-kFB0IL/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41773 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41773 (pid=3160814). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41774 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41774 (pid=3160922). Happy searching!
#
#     INFO  - 2023-10-18 22:53:59.537; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:53:59.551; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 22:54:00.265; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:00.267; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:00.268; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:00.305 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 24 41 AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:45.000 UTC",
#     "not  after"         : "2024-01-16 22:53:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#         0010: 85 F4 75 AD                                        ..u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:00.310 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 DC 6A FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:36.000 UTC",
#     "not  after"         : "2024-01-16 22:53:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:00.324 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:00.713 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:00.720 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:00.721 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.734 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.767 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.767 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.770 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 99 74 42 AC 89 B8 D9 D2 72 79 7A 3D 7D EE BC 77 87 D4 29 6B 1B 21 C0 22 B2 1F B7 A1 4D 4C 06",
#   "session id"          : "85 48 FC EC A2 D9 BA 17 84 C6 E6 F1 D0 16 44 5B CD 2A EF F7 C3 02 30 A5 A7 89 80 5C 03 EC 5B 91",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EC F7 34 EB EB 00 69 2A   1E E1 F6 97 9B 82 56 5A  ..4...i*......VZ
#             0010: 22 98 B2 90 DC DE D5 59   B2 27 FE 5F C6 A8 9B 7E  "......Y.'._....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.215 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8D 04 9D 12 22 4A D2 7E 6D 20 A8 3C 15 E5 FF FC 3F 9A AE 56 EB 7E 41 BC 1E 22 C4 D8 D7 A1 FB 0D",
#   "session id"          : "85 48 FC EC A2 D9 BA 17 84 C6 E6 F1 D0 16 44 5B CD 2A EF F7 C3 02 30 A5 A7 89 80 5C 03 EC 5B 91",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CE AC 03 6E AC FF D9 06   AC 04 CA F4 71 6C 04 08  ...n........ql..
#           0010: 60 E3 18 8B EC 28 91 2A   1E 48 AD 0B 83 56 7C 30  `....(.*.H...V.0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.234 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.234 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.236 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.236 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.237 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.300 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.310 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.318 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.325 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.327 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.330 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.331 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.332 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.335 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.335 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.344 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 D1 4F CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:41.000 UTC",
#       "not  after"         : "2024-01-16 22:53:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 68 75 F2 9D 33 20 90   FF D0 94 18 6A B3 D2 92  .hu..3 .....j...
#           0010: 43 55 B1 A8                                        CU..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.344 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.447 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.456 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 74 BE 78 19 0E 14 49   FB 05 69 1B D7 32 24 CB  wt.x...I..i..2$.
#     0010: 2A 8B 45 23 05 D4 4A D0   0E 1E C9 48 5F 73 82 B6  *.E#..J....H_s..
#     0020: 3E 8C 95 48 82 49 49 BA   3A 3F BE F1 D2 7C 5F 8E  >..H.II.:?...._.
#     0030: 9A A8 74 C1 2C 7D BD 8D   24 9D C5 5E 6D 12 EA FF  ..t.,...$..^m...
#     0040: 8B F7 FE 9F 20 6E D2 04   7F 0E 1B 3B E5 83 50 19  .... n.....;..P.
#     0050: 29 C3 52 34 47 D9 ED B6   55 2D D6 9D D0 A0 6F EA  ).R4G...U-....o.
#     0060: 15 04 10 62 6A A2 4A AE   1F 5C 24 DE 71 CA E4 66  ...bj.J..\$.q..f
#     0070: CC 0B 8E DC 9B B1 1F 5B   4F F0 7F F7 F5 00 8B 97  .......[O.......
#     0080: 74 79 52 DD 0B B8 77 50   F1 F1 B1 BE 1E 30 1B 97  tyR...wP.....0..
#     0090: 69 9F 68 F7 AA 81 6C 37   6E 74 3F 4B 7E 2D 11 AC  i.h...l7nt?K.-..
#     00A0: 42 2C 5F D5 08 C1 46 7B   6E 94 E2 69 97 B4 7D 0A  B,_...F.n..i....
#     00B0: BA 06 AA 4A FB 9B A9 9D   60 3F E6 13 98 D2 22 BE  ...J....`?....".
#     00C0: 72 F5 FA DF B1 CF 08 19   97 B7 D3 12 66 C1 26 A4  r...........f.&.
#     00D0: E3 CF A4 D2 BE 1E F8 84   A7 42 C0 B8 01 DC 95 FE  .........B......
#     00E0: F8 24 39 16 6D EA 6B 04   8B A6 3B A3 B8 80 57 45  .$9.m.k...;...WE
#     00F0: F0 1E 38 66 80 6E 56 D2   6F 60 7E 67 A4 79 50 7E  ..8f.nV.o`.g.yP.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.462 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 98 2F 1D 06 53 49 00 62   E3 06 52 FA 5A 3C AC 8B  ./..SI.b..R.Z<..
#     0010: CF 3A 95 77 40 0C 15 2F   BA 40 D7 7E 2D 0B 28 0B  .:.w@../.@..-.(.
#     0020: D7 EB D3 8B D6 78 B8 F7   F1 1D 67 91 39 02 A8 75  .....x....g.9..u
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.464 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:01.466 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.466 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.466 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.471 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 24 41 AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:45.000 UTC",
#       "not  after"         : "2024-01-16 22:53:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#           0010: 85 F4 75 AD                                        ..u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C C9 E2 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:38.000 UTC",
#       "not  after"         : "2024-01-16 22:53:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.523 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 D6 B2 BE B8 8D 18 15   25 27 63 0A BD 2B C0 63  5.......%'c..+.c
#     0010: 0D 6A 9F 8D 0F D4 2B D1   78 E4 79 EA 99 3A DE E6  .j....+.x.y..:..
#     0020: C7 BB FA 84 06 7D 6B 8D   90 1F 23 CD FC D4 B4 91  ......k...#.....
#     0030: 71 78 49 D0 22 44 DB 82   6D 0F 26 56 64 68 74 5D  qxI."D..m.&Vdht]
#     0040: 6D 62 DE A7 18 21 FB F4   B1 58 E6 FF FB 32 B7 3A  mb...!...X...2.:
#     0050: 9D A9 E0 4E 17 BA FD FF   BE DB CA E7 FE 29 9B 0A  ...N.........)..
#     0060: 0C DD 24 11 D1 01 3C 73   54 50 BD E9 93 B4 11 A0  ..$...<sTP......
#     0070: 3B AE B4 31 8B 45 3B 1D   5D EE 9B 14 62 88 3A FB  ;..1.E;.]...b.:.
#     0080: 2B 4F 9B 40 CA EA 01 0D   10 8F B3 32 01 AA 5F 95  +O.@.......2.._.
#     0090: 58 F6 DF 63 DB F4 74 F7   93 47 B5 00 A7 0D 97 F8  X..c..t..G......
#     00A0: 2C EC 72 5D 8E 40 61 02   44 EC FF D7 88 FC F6 73  ,.r].@a.D......s
#     00B0: BE 74 FC F3 64 26 AE 43   5B 8D 36 B9 F5 49 85 30  .t..d&.C[.6..I.0
#     00C0: 30 E5 81 00 6E A1 D4 21   8A 92 BF ED 6D 13 13 67  0...n..!....m..g
#     00D0: 15 CE ED A2 E0 98 B6 95   CD 85 74 EF F4 09 B8 FF  ..........t.....
#     00E0: A6 D7 DC 4D 3F BB 98 D3   EA ED 85 71 1C CC FF 0E  ...M?......q....
#     00F0: 74 8D C0 4E 0E DF 13 38   F7 AD F1 AB 2E 09 04 C3  t..N...8........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.525 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 D7 68 55 5F 37 FA CD   FB 7A C2 ED 0F 5F B2 17  ..hU_7...z..._..
#     0010: 38 0E 98 6D 2A 04 A9 2B   83 0A 0C 64 B1 67 42 EB  8..m*..+...d.gB.
#     0020: B1 2C 4E 82 3E D2 A7 F4   8E 02 F0 8E 53 8F 16 0D  .,N.>.......S...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.529 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.807 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "96 D3 AB 46 F8 43 C2 24 C7 30 97 4C B7 EE 11 E4 C7 A4 9A DA 7F CD 05 DE EF 26 98 C5 8F 04 D9 BC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 22:54:02.467 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 22:54:02.468 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-18 22:54:02.482 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-18 22:54:04.109; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:54:04.114; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 22:54:04.496; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:04.498; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:04.498; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:04.535 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 24 41 AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:45.000 UTC",
#     "not  after"         : "2024-01-16 22:53:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#         0010: 85 F4 75 AD                                        ..u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:04.539 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 DC 6A FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:36.000 UTC",
#     "not  after"         : "2024-01-16 22:53:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:04.551 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:04.719 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:04.721 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:04.722 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.726 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.737 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.737 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.737 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.740 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2C 58 96 D3 6F 6F 0B A2 D8 AD 82 C5 C7 4A 4A 68 EE DE 6D 79 79 C5 DB 74 D2 B8 95 A3 C3 00 0E 3A",
#   "session id"          : "5C 07 39 6D F3 4E 48 DD 59 47 54 A5 29 E2 C4 AF 01 CC FE 0D 12 F7 2C 46 A7 60 C7 1D 34 D7 0D 4F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A2 86 07 C6 91 01 E1 FD   B0 63 AF E0 58 8F 6F 04  .........c..X.o.
#             0010: 56 D8 49 64 05 E9 08 EC   98 3A 06 03 54 8C 7E 23  V.Id.....:..T..#
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.843 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "78 6A F0 B3 0F D8 86 31 CB DC 52 6A BC B7 B1 4F 66 D4 DA 16 D9 55 A1 37 5B 12 15 F2 F3 AC A0 78",
#   "session id"          : "5C 07 39 6D F3 4E 48 DD 59 47 54 A5 29 E2 C4 AF 01 CC FE 0D 12 F7 2C 46 A7 60 C7 1D 34 D7 0D 4F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 78 B4 6B D1 B5 E5 4C 76   D6 DB 36 E9 02 EE BB D4  x.k...Lv..6.....
#           0010: 05 63 5F 35 B3 E9 56 68   76 06 FD F4 40 54 EC 0B  .c_5..Vhv...@T..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.844 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.844 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.855 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.858 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.858 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.866 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.878 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.880 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.889 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.889 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.889 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.891 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.892 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.892 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.892 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.893 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.893 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.897 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 D1 4F CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:41.000 UTC",
#       "not  after"         : "2024-01-16 22:53:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 68 75 F2 9D 33 20 90   FF D0 94 18 6A B3 D2 92  .hu..3 .....j...
#           0010: 43 55 B1 A8                                        CU..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.897 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.980 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.982 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D C1 BC 6B EA 80 30 C8   E5 D9 DA 8F 18 7D C0 1D  m..k..0.........
#     0010: 32 9F 13 40 EC A9 0D F6   06 3A 32 52 33 B5 D5 15  2..@.....:2R3...
#     0020: B9 4B C6 F9 DD A5 18 1B   39 B9 D1 FD DD 74 88 08  .K......9....t..
#     0030: 33 84 F1 5E 5B BA 0F 1B   DE 5F 98 E9 4E 0C 5C 06  3..^[...._..N.\.
#     0040: 2E 48 D2 2A D2 B7 1D F2   DA 7F D9 CE 02 1D BB 23  .H.*...........#
#     0050: 02 83 DE 9A 6C 3D E4 F2   81 7C B8 7E 41 CD C2 D9  ....l=......A...
#     0060: 60 6B 1D 01 67 92 64 A3   B6 F0 B8 CA 45 9B 46 16  `k..g.d.....E.F.
#     0070: 73 AD BF 14 EE 48 10 BF   BD EC EA 00 23 54 2B 81  s....H......#T+.
#     0080: 3F 12 CC 8E F1 2E 4F E9   77 88 07 14 74 47 01 0C  ?.....O.w...tG..
#     0090: DB B4 E4 67 7F B0 5E E4   01 C2 00 D0 34 00 B0 EB  ...g..^.....4...
#     00A0: 08 43 A3 CC B9 5B 28 07   53 D8 77 F7 A7 B3 21 FA  .C...[(.S.w...!.
#     00B0: 54 3E E3 82 1B 7B A8 CD   76 5B D6 9D 81 05 BA 79  T>......v[.....y
#     00C0: 72 B6 D2 15 9B 48 B7 FC   D9 A9 70 1B D9 97 68 76  r....H....p...hv
#     00D0: 4C 1B 14 C3 7C 87 2D D5   FD E5 ED 1B 3A 38 0E A3  L.....-.....:8..
#     00E0: DB B2 7B 33 A2 99 C9 DB   05 94 EE 0D DE 3E 7C 58  ...3.........>.X
#     00F0: 5D 76 6F 6E DD 94 0B E1   69 16 83 64 51 D0 4E 8B  ]von....i..dQ.N.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.984 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 03 92 F6 3F DB 97 63 D9   AB A7 9D D4 82 72 AF 50  ...?..c......r.P
#     0010: 7B 67 55 B3 9A 52 F2 7F   13 D1 80 16 6D 6F A2 26  .gU..R......mo.&
#     0020: AE 90 2D F1 A7 3B 40 C8   49 7C 7C C2 64 C1 60 6C  ..-..;@.I...d.`l
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.986 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:04.986 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.988 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.990 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 24 41 AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:45.000 UTC",
#       "not  after"         : "2024-01-16 22:53:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#           0010: 85 F4 75 AD                                        ..u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C C9 E2 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:38.000 UTC",
#       "not  after"         : "2024-01-16 22:53:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.014 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 01 50 DC E5 18 82 E7 4F   8B 5E 7E 11 CA 44 A7 23  .P.....O.^...D.#
#     0010: 07 89 C9 C4 7F 09 87 75   A5 24 DC 27 B4 7E 27 1C  .......u.$.'..'.
#     0020: 6B 28 EF 5C 6C 5B 47 73   DD C9 E3 4F E6 CF 87 38  k(.\l[Gs...O...8
#     0030: 7A 1A 8E 04 EC 85 0B 87   8F C7 CC C3 BA BD 0C D0  z...............
#     0040: 35 5E 1F E0 6B F9 25 7F   D4 F5 50 FA 64 10 06 46  5^..k.%...P.d..F
#     0050: 0F DF 38 CF 8B 05 B9 A1   72 45 5D BB 96 32 41 2E  ..8.....rE]..2A.
#     0060: 17 02 9C 24 17 99 DA 9D   33 B0 77 E9 7E 9E 50 FA  ...$....3.w...P.
#     0070: C0 AD C2 20 2D ED C6 F5   6B 84 DF 3E 9E 02 2A 12  ... -...k..>..*.
#     0080: 43 9C 94 04 C2 88 1B A2   E0 19 20 1D 28 FE FA 58  C......... .(..X
#     0090: 9A 56 B6 4A 0E E1 6A CB   B3 78 CD D8 AA 11 68 94  .V.J..j..x....h.
#     00A0: 01 BC 82 96 CD 5F C4 43   68 60 90 D2 32 28 90 71  ....._.Ch`..2(.q
#     00B0: F6 6E BD 6A 7F C0 EE A5   0C DE FF A2 42 EA CE E1  .n.j........B...
#     00C0: 38 F0 93 8C DD 17 8E 1E   C3 4F E1 5B D6 79 00 88  8........O.[.y..
#     00D0: 3D 31 8A EC EA 04 9B B4   CD C3 02 03 33 C1 61 4B  =1..........3.aK
#     00E0: C4 13 BC 5B B5 8F BA 03   F1 C6 00 00 DA F8 B8 E3  ...[............
#     00F0: 44 8E 6E A8 E5 BC BA AA   34 09 D1 0B 83 9F E1 36  D.n.....4......6
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.015 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 AF 66 DE D4 45 FC C7   47 C4 C1 F5 AF 05 15 67  6.f..E..G......g
#     0010: CF FF D7 EA 93 38 3F 05   0F FB A1 87 0F 1B C4 7B  .....8?.........
#     0020: 4E CD F4 4C 9C 9C 14 E4   33 F0 49 38 75 17 44 59  N..L....3.I8u.DY
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.016 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.107 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CD 57 34 10 89 B0 8A 32 3D 18 A5 E1 2C 9D 9D BB 22 94 08 27 7E A5 10 75 B0 85 05 E9 B7 9D A4 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-18 22:54:05.429 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 22:54:05.430 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-18 22:54:19.241; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:19.597 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C C9 E2 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:38.000 UTC",
#       "not  after"         : "2024-01-16 22:53:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 DC 6A FE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:36.000 UTC",
#       "not  after"         : "2024-01-16 22:53:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:19.611 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:19.777 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.777 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:19.779 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:19.779 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.783 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.795 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.797 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "07 24 4C B9 BF D1 E5 F1 E3 77 39 45 AC 60 56 52 AF 40 DB 15 75 3A 79 04 F1 68 27 8A 70 6E 28 7A",
#     "session id"          : "C6 37 9F A6 DB F1 53 AD EB BB 6F B3 7F 33 B4 DF D4 CD 3B B2 06 33 6F 69 C1 14 E9 A7 FB 3B B5 C3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 97 26 9C 62 AC 7B 36 A4   35 47 0C 37 CA 43 63 1C  .&.b..6.5G.7.Cc.
#               0010: 2A 63 0D A3 D5 25 FB FF   69 6E 02 86 CD 62 EA 32  *c...%..in...b.2
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.818 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C9 2A BF AE 4D 4D 01 32 8B 1D 42 9A 86 6F 94 4E A4 D5 ED 74 49 C4 98 87 8D 4F 79 5A 8A 87 4C C7",
#     "session id"          : "C6 37 9F A6 DB F1 53 AD EB BB 6F B3 7F 33 B4 DF D4 CD 3B B2 06 33 6F 69 C1 14 E9 A7 FB 3B B5 C3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8E A9 FB 69 6F 6B 08 59   77 94 E5 9E 67 1E 20 AF  ...iok.Yw...g. .
#             0010: B8 A4 F9 AF 27 15 0D 20   2F 50 10 8A D9 76 DD 78  ....'.. /P...v.x
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.819 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.819 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.822 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:19.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.836 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.837 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.839 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.842 UTC|EncryptedExtensions.java:171|Consuming Encrypted

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14359ms
ok 78 stop command for single port in 17395ms
not ok 79 status detects locally running solr in 1528ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7505ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1569ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3033ms
ok 83 copying files around in 6638ms
ok 84 upconfig in 2633ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 87 Cleanup in 2503ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 53s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/liyzhznh33sau

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8215 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8215/

All tests passed

Build Log:
[...truncated 1430 lines...]
BUILD FAILED in 1h 2m 32s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/tzt5vy7hq6yw4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8214 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8214/

All tests passed

Build Log:
[...truncated 1262 lines...]
# ERROR: Error from server at http://localhost:40889/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16452ms
ok 60 Check help command in 5017ms
ok 61 basic post with a type specified in 5652ms
ok 62 basic post WITHOUT a type specified in 11781ms
ok 63 crawling a directory in 4489ms
ok 64 crawling a web site in 4785ms
ok 65 commit and optimize and delete in 3907ms
ok 66 args mode in 6615ms
ok 67 stdin mode in 3552ms
ok 68 post solr log into solr via script in 10075ms
ok 69 post solr log into solr via cli in 7216ms
ok 70 allowPaths - backup in 16750ms
ok 71 start solr with ssl in 19018ms
not ok 72 use different hostname when not checking peer-name in 20613ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 40889 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40889 (pid=2245093). Happy searching!
#
#     INFO  - 2023-10-18 15:48:58.500; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:48:58.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 15:48:58.938; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 15:48:59.042; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 15:48:59.042; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 15:49:08.934; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 15:49:08.938; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 15:49:09.314; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:40889/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-18 15:49:10.716; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:49:10.720; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40889/solr] to [https://127.0.0.1:40889].
# WARN  - 2023-10-18 15:49:11.519; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 15:49:11.555; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16646ms
ok 74 start solr with client truststore and security manager in 19621ms
not ok 75 start solr with mTLS needed in 54319ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ZY0ybN/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40889 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40889 (pid=2247824). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40890 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 40890 (pid=2247934). Happy searching!
#
#     INFO  - 2023-10-18 15:50:12.924; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:50:12.942; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 15:50:13.895; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:13.898; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:13.898; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:13.966 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F F8 44 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:59.000 UTC",
#     "not  after"         : "2024-01-16 15:49:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#         0010: 40 C0 AE 0B                                        @...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:13.971 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 19 6E 3A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:50.000 UTC",
#     "not  after"         : "2024-01-16 15:49:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:14.009 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:14.537 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.537 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:14.539 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:14.539 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.544 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.563 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.563 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.563 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.566 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 D1 3C 31 B5 8A 53 F3 B5 E9 C4 6C 23 BC D6 CE 26 BA 64 C6 5E 41 C9 71 16 DE 30 68 B5 61 03 A7",
#   "session id"          : "76 CF 8E 44 AF 31 60 5F 0C DB 92 2E 99 8E 11 7F 7A A9 62 A2 A4 D0 F8 56 BA AE 7B 3E F2 50 85 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 41 F1 C7 E6 67 AA FA E7   CC 3B 45 49 7B C1 A5 2D  A...g....;EI...-
#             0010: 92 DD E1 33 DD D9 39 B2   12 50 3E 99 4B 08 19 3D  ...3..9..P>.K..=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.718 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BA C8 E4 B3 DC 96 EF 3B F5 38 60 78 13 56 02 70 AA 2A 6F F9 EE F8 C6 E3 0C 58 3E B3 E7 1D 2F 51",
#   "session id"          : "76 CF 8E 44 AF 31 60 5F 0C DB 92 2E 99 8E 11 7F 7A A9 62 A2 A4 D0 F8 56 BA AE 7B 3E F2 50 85 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 71 76 EF DB 0E A0 03 5D   9E A1 03 D8 14 92 88 20  qv.....].......
#           0010: 19 A9 7F E7 98 7D 39 0F   91 B5 56 76 83 CC 2C 1F  ......9...Vv..,.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.719 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.720 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.732 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.738 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.738 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.738 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.791 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.792 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.793 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.800 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.801 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.801 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.809 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.809 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.811 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.811 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.812 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.812 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.813 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.813 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.813 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.816 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 12 B2 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:55.000 UTC",
#       "not  after"         : "2024-01-16 15:49:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 9A E6 D1 7F D5 F2 99   B7 9C A8 4A 54 B6 52 03  ...........JT.R.
#           0010: AD 94 E5 14                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.816 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.995 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.998 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 C6 60 A2 79 0E 8A E4   BE 64 B0 D3 85 FA EA 4E  8.`.y....d.....N
#     0010: A0 4C 7F 6A 87 3F CE E0   37 E4 D0 3D 97 42 64 6D  .L.j.?..7..=.Bdm
#     0020: B3 65 A7 41 5A 22 8F 2D   57 40 56 C2 D2 AF 32 CE  .e.AZ".-W@V...2.
#     0030: 2C BD E9 47 92 82 BA B8   45 BD B4 74 67 52 B0 40  ,..G....E..tgR.@
#     0040: 1D 44 4F 21 6A 5B DF 8D   3B 70 BF F3 4F C6 DF 37  .DO!j[..;p..O..7
#     0050: C7 91 F4 38 AE 38 34 3F   5F 5F 45 B8 01 2B 4E 54  ...8.84?__E..+NT
#     0060: F2 12 C2 3C FC D4 95 1B   FE 4C 7D 5D FB 61 D3 51  ...<.....L.].a.Q
#     0070: 4A E1 85 80 4B 3C 91 FA   1D 79 C6 AF 42 35 FF 5E  J...K<...y..B5.^
#     0080: 6C 30 84 8C 61 71 B3 43   29 E3 D0 31 4E 0E 59 F1  l0..aq.C)..1N.Y.
#     0090: 54 BF 36 F6 97 61 B0 40   62 FF D4 B8 EB 2F FA 5B  T.6..a.@b..../.[
#     00A0: 32 2C 25 16 AA 05 64 C0   EE 68 AD 07 5A 7F C8 C9  2,%...d..h..Z...
#     00B0: 29 7F 0F 16 CE BA 9D CC   F1 27 EE E8 16 AB 39 2D  )........'....9-
#     00C0: BF 8F DE 21 F6 F9 F4 7A   78 F4 22 1F 51 49 4A A6  ...!...zx.".QIJ.
#     00D0: 80 73 39 77 03 94 EA 21   3F AD 16 71 C9 FB 19 50  .s9w...!?..q...P
#     00E0: E8 2C C4 DD B2 46 57 75   B7 53 50 60 29 4C A3 92  .,...FWu.SP`)L..
#     00F0: F8 EF 67 5C BE FA 54 83   14 E9 10 31 C7 AB 7D 5F  ..g\..T....1..._
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.000 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 65 CB 1E 02 BE 1C EE FA   BB 26 D6 C7 00 B4 9B D7  e........&......
#     0010: 41 B8 BC 84 92 E0 A6 94   B8 0F FF A4 9E 7B 69 00  A.............i.
#     0020: A1 7B 7A 2B F3 24 D0 AB   5A 88 35 0A BD EC C3 B8  ..z+.$..Z.5.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.001 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.003 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.005 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F F8 44 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:59.000 UTC",
#       "not  after"         : "2024-01-16 15:49:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#           0010: 40 C0 AE 0B                                        @...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 21 80 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:53.000 UTC",
#       "not  after"         : "2024-01-16 15:49:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.072 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 3F 53 7A 97 ED F1 2E   9A 1D 8F 5A E1 85 7D 0B  e?Sz.......Z....
#     0010: E0 AE D1 2D D4 E7 07 C7   23 08 61 FD F6 55 BF 32  ...-....#.a..U.2
#     0020: 12 1F F7 D4 DD 1D 71 66   16 4B 00 E9 A3 B6 9A B5  ......qf.K......
#     0030: CB 28 A1 F4 F4 CC 5B 03   68 22 3C 62 BA 15 B7 9A  .(....[.h"<b....
#     0040: C1 F4 EB 1B 3C 58 B5 D1   CF D8 67 53 7D 0B B3 29  ....<X....gS...)
#     0050: B1 A8 54 41 C0 23 96 03   2A EE A7 79 60 A9 F1 F2  ..TA.#..*..y`...
#     0060: 28 35 BE 05 C1 6F 1A 16   1F 6D 7B 45 2D 7B ED 0E  (5...o...m.E-...
#     0070: 83 51 3D 18 0A 9B 85 04   07 4D 35 DB 72 5F 64 A4  .Q=......M5.r_d.
#     0080: 43 62 BC C4 DF 38 F3 D5   D0 F5 00 10 E4 C2 80 7E  Cb...8..........
#     0090: B7 D2 5B 5B 28 F8 3C 52   4A F6 14 0D F6 EB 4E 45  ..[[(.<RJ.....NE
#     00A0: 3A 84 44 CA 78 19 95 03   6B B8 48 DC F8 B5 CF 29  :.D.x...k.H....)
#     00B0: 1D CE 4F 41 AB 63 31 16   EB E6 B3 27 E8 DE A2 0B  ..OA.c1....'....
#     00C0: AE 79 F9 BC A8 DC 3F 81   51 58 90 B7 FA 65 7D 2F  .y....?.QX...e./
#     00D0: 8C 20 A0 7B 13 D9 5C 80   80 99 3A 01 E5 D7 79 27  . ....\...:...y'
#     00E0: D0 30 36 F8 73 D8 6F 31   30 18 FB 03 21 0D E0 E6  .06.s.o10...!...
#     00F0: 01 D0 9A 7B C2 CE 4A 08   70 E3 8C 04 94 80 85 0D  ......J.p.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.082 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 02 D6 B1 DA 3A D9 1A D6   DE 19 56 C9 90 2C B3 A2  ....:.....V..,..
#     0010: 6C 2A A8 C1 A9 7F 52 F2   71 2D 0E 2D FE 91 05 AE  l*....R.q-.-....
#     0020: E6 36 E3 21 B9 87 D4 9E   B2 E6 F9 E5 B3 45 BE 1E  .6.!.........E..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.082 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.191 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F4 08 93 B9 01 74 4D 16 24 5B 1D 3A 7A C4 8A 3D AB F1 8F F4 CA 17 81 67 B1 40 44 7A 57 0D 19 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 15:50:15.931 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 15:50:15.932 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 15:50:18.200; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:50:18.205; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 15:50:18.590; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:18.593; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:18.595; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:18.633 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F F8 44 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:59.000 UTC",
#     "not  after"         : "2024-01-16 15:49:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#         0010: 40 C0 AE 0B                                        @...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:18.637 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 19 6E 3A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:50.000 UTC",
#     "not  after"         : "2024-01-16 15:49:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:18.649 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:18.816 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.816 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:18.818 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:18.818 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.836 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.838 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FD B9 6F 4F 0C E7 5B BC 2D 58 64 43 75 B0 2B 53 E4 51 ED F0 95 30 D4 9D 36 1E 16 66 C8 BB 87 DC",
#   "session id"          : "1D 89 42 71 0A 0B 0D C9 BC AF 33 5A 6F 9A 94 E9 CD 4C 67 78 01 F2 06 DE CD 54 10 BF 6D 33 7C 87",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BE 4F F4 53 80 06 8F E5   AB BC 8C C3 AD 09 31 F4  .O.S..........1.
#             0010: 20 49 35 14 41 B7 9E 9E   B0 F3 28 78 EB 5D 03 65   I5.A.....(x.].e
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.961 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "59 67 FF 10 19 AB A6 90 D0 F9 47 51 6F 2C C0 61 32 86 50 A9 B1 A1 89 F2 2E 63 61 DE 9C F5 5C B2",
#   "session id"          : "1D 89 42 71 0A 0B 0D C9 BC AF 33 5A 6F 9A 94 E9 CD 4C 67 78 01 F2 06 DE CD 54 10 BF 6D 33 7C 87",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C7 49 06 7C 8A 85 0C 16   5D 6F BE EF 8F D8 AB 7C  .I......]o......
#           0010: 10 D0 52 51 A0 F2 75 D1   15 E1 FA 3C 25 F6 AA 7A  ..RQ..u....<%..z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.961 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.961 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.980 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.982 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.983 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.998 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.999 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.999 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.999 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.004 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.004 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.007 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.007 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.008 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.010 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 12 B2 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:55.000 UTC",
#       "not  after"         : "2024-01-16 15:49:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 9A E6 D1 7F D5 F2 99   B7 9C A8 4A 54 B6 52 03  ...........JT.R.
#           0010: AD 94 E5 14                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.010 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.059 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.062 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D 06 5C DA 44 E3 CD F3   BB 52 A5 FD AD E7 2C 61  ..\.D....R....,a
#     0010: B6 F3 80 64 7D 38 F8 16   6B 9D DD 6B 08 BF 17 37  ...d.8..k..k...7
#     0020: 56 7D 14 C0 2A 6F 23 2A   7E 8D 4F 44 3C BF 74 E1  V...*o#*..OD<.t.
#     0030: 53 B7 1E 8B AC 15 2F CA   A8 26 06 75 6C 15 B7 DC  S...../..&.ul...
#     0040: 62 57 9F 33 C8 0E FA EF   9C 47 43 DB 1B 05 E5 4C  bW.3.....GC....L
#     0050: A6 C0 EB 2D F4 4E 47 23   A6 EE 0C A4 17 82 4C 48  ...-.NG#......LH
#     0060: F1 66 C6 37 E0 38 FD 03   4B BA 85 A6 64 FE 5F 14  .f.7.8..K...d._.
#     0070: 04 06 2A F3 8E 25 99 DB   D5 52 E9 6C FF 4F C9 C2  ..*..%...R.l.O..
#     0080: D4 04 FD 82 BF 88 F5 FB   E9 BA 86 5B 62 1C A8 C3  ...........[b...
#     0090: 83 81 F7 F4 A8 48 62 76   0B 64 E8 04 B1 7B C4 4B  .....Hbv.d.....K
#     00A0: 5F EA E0 86 04 56 89 EE   1C 4D 05 3E DB 85 38 EF  _....V...M.>..8.
#     00B0: A9 6D 44 48 A5 00 25 86   4F 0E 1A A3 9D A7 C0 FC  .mDH..%.O.......
#     00C0: 53 5D 89 02 07 AF BB 51   B6 A4 8D 61 6B 89 53 15  S].....Q...ak.S.
#     00D0: 08 15 FD E9 87 64 03 7E   2A 8B 49 84 7A 0F C2 EA  .....d..*.I.z...
#     00E0: DF 7F 13 73 1B D1 CB DB   4E E4 0E 17 B5 0D 8D EE  ...s....N.......
#     00F0: 43 0D 99 7A DA A1 A1 88   88 90 51 C6 F3 4F 03 06  C..z......Q..O..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.063 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3B 46 CB AF 0B 7C AB C0   C9 19 7F DD 46 41 1A 53  ;F..........FA.S
#     0010: 43 10 B6 18 3D 05 1F 7E   E3 AB 66 1A D3 2E B7 B2  C...=.....f.....
#     0020: 46 BB C5 2D BA ED 8F AC   2D 91 16 9D B3 0C CB 13  F..-....-.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.065 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.067 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.069 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F F8 44 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:59.000 UTC",
#       "not  after"         : "2024-01-16 15:49:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#           0010: 40 C0 AE 0B                                        @...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 21 80 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:53.000 UTC",
#       "not  after"         : "2024-01-16 15:49:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.092 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D DA AF 89 6C 93 E1 E6   EA 03 BF 34 43 0E E9 45  ....l......4C..E
#     0010: 3E 58 AA 51 5A 99 04 EB   91 0E 4B FF 03 53 0F FE  >X.QZ.....K..S..
#     0020: 61 27 21 33 26 54 49 C6   41 B9 A5 15 E3 85 BB 33  a'!3&TI.A......3
#     0030: 12 05 4D 5B 1C E5 FE 88   DC BA CE 80 09 BB 6D 86  ..M[..........m.
#     0040: 44 26 05 65 CA 02 0E 83   2D 06 3D 4D 02 71 71 4A  D&.e....-.=M.qqJ
#     0050: C7 E3 71 24 B5 16 0C B2   1F 8D 66 DA E8 D5 C2 BA  ..q$......f.....
#     0060: E4 53 9C DE E5 96 34 3E   80 A6 42 9F 23 F3 3C 1E  .S....4>..B.#.<.
#     0070: B3 71 40 89 20 5E 60 A9   B9 6D D7 B6 B5 B6 EB AF  .q@. ^`..m......
#     0080: 89 35 B8 1F 10 89 A6 94   CE C6 D0 01 FF 53 2E 44  .5...........S.D
#     0090: 63 DC 0D 71 76 7E 5E B2   FB CF 8A F8 62 E0 8E 8E  c..qv.^.....b...
#     00A0: 99 FB F3 3D C1 61 F2 5C   BE D8 4C 1C 10 54 4E 88  ...=.a.\..L..TN.
#     00B0: DA C4 0D 0D EC 14 A7 80   26 A2 6D 58 F1 9A 11 D2  ........&.mX....
#     00C0: 85 E9 19 CE 14 C8 27 15   8C 9B AA A5 94 17 BA 6B  ......'........k
#     00D0: 2A E5 5F F5 BE AC 49 98   5C 67 77 57 3A 88 C7 5B  *._...I.\gwW:..[
#     00E0: 38 CB E6 43 25 48 9C 57   4C 24 45 F5 8F 59 3E 90  8..C%H.WL$E..Y>.
#     00F0: 51 5D 06 D2 C1 F2 58 7F   AC EF 69 05 EF FB D8 82  Q]....X...i.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.093 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B 5B 1A 81 C7 62 C9 B3   D6 5A AB 72 CF AA 87 79  .[...b...Z.r...y
#     0010: 81 AD A1 A3 5F 72 64 3F   D2 3B 98 0E B6 63 88 B4  ...._rd?.;...c..
#     0020: 88 0C 5C C6 EE 59 53 A3   FD 09 EA B7 26 0F 71 F7  ..\..YS.....&.q.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.094 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.142 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "16 42 0D 42 81 A2 4E 9B F6 AB 5F FE FB E6 AF 12 7A 77 77 A7 42 F6 5F DA 3B 49 41 92 81 BC DA 86",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-18 15:50:19.436 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 15:50:19.437 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-18 15:50:33.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:33.567 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 19 6E 3A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:50.000 UTC",
#       "not  after"         : "2024-01-16 15:49:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 21 80 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:53.000 UTC",
#       "not  after"         : "2024-01-16 15:49:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:33.581 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:33.749 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:33.751 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:33.751 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.755 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.766 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.766 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.767 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.769 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "3E A0 32 BA 4E 56 D7 16 7D 81 AE 49 58 61 C5 D4 CD 67 FA A6 F3 25 11 49 10 3A E1 E6 32 07 49 27",
#     "session id"          : "34 2F 3A 54 65 22 24 63 14 80 03 44 02 90 C3 70 3E F4 3D F6 2E 51 15 FF 57 6E 6A BF 38 E2 B6 64",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A8 1E AE C3 A7 C7 54 7F   D9 5B D5 DC 82 16 66 B6  ......T..[....f.
#               0010: F4 AA AF 37 7A 21 AC 0F   88 30 5A EA 3C BB 0D 17  ...7z!...0Z.<...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.786 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 1A 44 2A BD DC 07 69 0F 96 00 02 66 BA 77 EC 68 4B 87 AA 72 5B 0D 11 4F D4 FB 03 4C 2D 80 22",
#     "session id"          : "34 2F 3A 54 65 22 24 63 14 80 03 44 02 90 C3 70 3E F4 3D F6 2E 51 15 FF 57 6E 6A BF 38 E2 B6 64",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D8 5A 13 BB 07 69 6F 5E   D3 8F 8F 78 58 2B C7 99  .Z...io^...xX+..
#             0010: D0 03 57 AA 13 C7 37 AD   6E A5 F2 34 E0 DC C1 55  ..W...7.n..4...U
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.787 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.787 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.799 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.800 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.803 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.806 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, 

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 17980ms
ok 78 stop command for single port in 21775ms
not ok 79 status detects locally running solr in 1541ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7588ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1499ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3086ms
ok 83 copying files around in 6680ms
ok 84 upconfig in 2618ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 87 Cleanup in 2508ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 50s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vfo457tri3i2e

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8213 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8213/

All tests passed

Build Log:
[...truncated 1260 lines...]
# ERROR: Error from server at http://localhost:39301/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 15892ms
ok 60 Check help command in 4627ms
ok 61 basic post with a type specified in 5663ms
ok 62 basic post WITHOUT a type specified in 11822ms
ok 63 crawling a directory in 4398ms
ok 64 crawling a web site in 4872ms
ok 65 commit and optimize and delete in 3885ms
ok 66 args mode in 6549ms
ok 67 stdin mode in 3507ms
ok 68 post solr log into solr via script in 10268ms
ok 69 post solr log into solr via cli in 7641ms
ok 70 allowPaths - backup in 17015ms
ok 71 start solr with ssl in 18357ms
not ok 72 use different hostname when not checking peer-name in 20680ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 39301 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39301 (pid=1785805). Happy searching!
#
#     INFO  - 2023-10-18 13:02:52.054; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:02:52.059; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:02:52.449; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 13:02:52.531; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 13:02:52.534; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 13:03:02.628; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 13:03:02.633; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 13:03:03.035; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:39301/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-18 13:03:04.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:03:04.531; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:39301/solr] to [https://127.0.0.1:39301].
# WARN  - 2023-10-18 13:03:05.318; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 13:03:05.358; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17972ms
ok 74 start solr with client truststore and security manager in 19633ms
not ok 75 start solr with mTLS needed in 50841ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Su79zQ/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 39301 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39301 (pid=1788484). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 39302 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39302 (pid=1788597). Happy searching!
#
#     INFO  - 2023-10-18 13:04:07.884; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:04:07.889; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:04:09.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:09.259; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:09.260; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:09.302 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 FF E1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:54.000 UTC",
#     "not  after"         : "2024-01-16 13:03:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#         0010: 6D BB 68 07                                        m.h.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:09.312 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 A0 C0 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:46.000 UTC",
#     "not  after"         : "2024-01-16 13:03:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:09.326 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:09.725 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.726 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:09.727 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:09.727 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.732 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.742 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.745 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "92 FF 8E C7 E9 90 60 47 5E 5C 31 B3 49 31 39 14 78 A9 01 5C F7 EB C3 59 31 82 BF 2C 56 50 A4 83",
#   "session id"          : "F4 85 20 30 A1 2E FF 5B 77 50 E0 BB 6D F0 51 C3 B5 F3 C8 3B 27 C8 F6 5A D8 DA D3 6E 31 D8 76 7C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A9 4D DB 8C 23 74 B7 D7   7D 15 E9 09 ED 61 BC CD  .M..#t.......a..
#             0010: 35 0F 05 63 AD C3 D6 F6   EE C4 06 C1 09 76 53 2F  5..c.........vS/
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.173 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8B 82 5C 6B 4D C1 0D 98 77 5E 5E 50 96 C2 B2 B5 86 DA BF 2E 83 DB 19 7B C4 CD 9D 81 A0 58 24 57",
#   "session id"          : "F4 85 20 30 A1 2E FF 5B 77 50 E0 BB 6D F0 51 C3 B5 F3 C8 3B 27 C8 F6 5A D8 DA D3 6E 31 D8 76 7C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 12 71 E9 DE 12 4B 70   17 66 85 9D 68 AC 37 2B  ..q...Kp.f..h.7+
#           0010: 26 38 D5 2B 7A EC D5 7B   39 BF 3A A5 76 26 BF 5C  &8.+z...9.:.v&.\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.174 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.174 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.176 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.176 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.205 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.206 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.207 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.210 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.212 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.213 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.213 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.213 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.214 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.214 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.214 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.227 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 20 BB A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:50.000 UTC",
#       "not  after"         : "2024-01-16 13:03:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 EF AA 49 B9 FD 18 0B   3A DA C3 A3 6B A6 AC 19  U..I....:...k...
#           0010: 98 E6 8F B2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.228 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.336 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.344 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 FB 21 61 3B 68 80 87   FA 59 27 C5 08 AF 79 B7  ..!a;h...Y'...y.
#     0010: 22 0B EA 38 9B D1 FF CB   48 40 EF F1 06 96 3B 9E  "..8....H@....;.
#     0020: 33 1A 8C 45 88 A0 F3 AD   6A 7B F2 9E 7A 37 54 78  3..E....j...z7Tx
#     0030: 81 69 F3 8E 2F 3A 07 CD   95 54 7E 71 F3 9D D3 73  .i../:...T.q...s
#     0040: AB F6 A7 E3 20 39 E9 E4   C1 CA 25 48 8B FC DC C5  .... 9....%H....
#     0050: D9 3B 38 D5 95 CD FA 9B   33 58 E6 68 40 29 58 C5  .;8.....3X.h@)X.
#     0060: AA FE D4 B2 F9 E4 0F 07   8A 07 F7 98 1C 06 95 20  ...............
#     0070: 78 1B 9A 5E 7B E0 78 2B   00 22 0C 88 23 14 9A 71  x..^..x+."..#..q
#     0080: B9 30 CB C0 36 B2 1F D8   80 30 11 C2 7B F4 32 D5  .0..6....0....2.
#     0090: F0 49 59 8B 69 3E 0D 04   68 EC 7C E1 00 B3 C9 0B  .IY.i>..h.......
#     00A0: 81 B0 63 1E 69 43 16 9A   49 B0 05 A0 D1 C8 05 97  ..c.iC..I.......
#     00B0: EE 95 EF C6 77 A1 A3 69   32 4F 79 32 3F D6 A3 48  ....w..i2Oy2?..H
#     00C0: 47 CD AD BA 11 E3 43 7C   08 85 7F 75 22 F4 39 84  G.....C....u".9.
#     00D0: E0 31 38 DD FA 9D 89 8A   17 1F 0F 2B 53 F8 EF F6  .18........+S...
#     00E0: 23 21 B3 6E 92 01 05 37   70 BF 76 0D F1 D7 55 C8  #!.n...7p.v...U.
#     00F0: EE 26 18 CF 68 CE 3F A0   8F 63 83 83 EA 32 23 87  .&..h.?..c...2#.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.345 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 33 99 9E 1B 97 A3 4E DB   D4 D1 B9 01 A5 FA 61 2E  3.....N.......a.
#     0010: 8F C1 38 8B 6D 3C D8 57   E5 D8 09 9E E2 4E C7 92  ..8.m<.W.....N..
#     0020: 4A 71 3F C4 63 85 06 44   88 9B 03 1A DF AA C3 40  Jq?.c..D.......@
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.642 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:10.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.644 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.647 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 FF E1 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:54.000 UTC",
#       "not  after"         : "2024-01-16 13:03:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#           0010: 6D BB 68 07                                        m.h.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 5B 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:48.000 UTC",
#       "not  after"         : "2024-01-16 13:03:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.684 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 E1 95 35 D2 0F 1D 79   D1 DC C9 2E D4 41 1D EB  ...5...y.....A..
#     0010: D6 D7 ED C4 0F 7F 45 61   44 0C DD A0 45 3A 48 06  ......EaD...E:H.
#     0020: 7A E0 C5 8A 71 BE F7 B4   A4 25 71 F4 6B B9 89 0E  z...q....%q.k...
#     0030: 79 11 FA 8A 87 15 1A E8   0A 0D 1F 1F BA 40 C9 63  y............@.c
#     0040: 03 26 80 BE 05 0F E1 AE   6A CB 53 F0 23 64 9F 31  .&......j.S.#d.1
#     0050: E6 6C A1 73 8F 41 65 E4   4B 64 B1 43 9F 40 BA F4  .l.s.Ae.Kd.C.@..
#     0060: DF 0F FF 66 1E 8B 4F 6D   FF 8D 5C 67 16 BD 47 3B  ...f..Om..\g..G;
#     0070: C0 4F 52 1B 8E 49 A7 B8   92 F7 7A 16 9E 46 F7 CC  .OR..I....z..F..
#     0080: 47 B3 04 A6 B1 6F A7 86   63 42 40 32 70 7A 2A 83  G....o..cB@2pz*.
#     0090: 58 BC D1 13 A8 3A 85 FA   30 15 EA 4E 90 60 AA 1C  X....:..0..N.`..
#     00A0: BA 9B 50 E2 25 A8 5E A7   33 B2 2E 67 21 16 4B AF  ..P.%.^.3..g!.K.
#     00B0: 05 7D 52 A1 2B 7D FE 23   05 AC 98 C9 98 D9 A1 B5  ..R.+..#........
#     00C0: 73 D4 0A CF 95 69 39 53   24 A3 66 56 FB 83 10 1E  s....i9S$.fV....
#     00D0: 5C 0F EF AA C4 74 E9 64   A7 8E 68 28 9F 74 77 24  \....t.d..h(.tw$
#     00E0: 1F AA F9 61 4E 0C 69 5D   9F 09 57 7F 53 A5 77 AF  ...aN.i]..W.S.w.
#     00F0: 89 0B 54 90 5F 17 07 1E   DD F4 43 6E FD 0A 9F 74  ..T._.....Cn...t
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.685 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E5 21 36 8B 5D 34 68 2F   E8 3C FA FA A1 2A E0 80  .!6.]4h/.<...*..
#     0010: 69 77 C2 7A 45 CE 38 42   1E 7B 3D 71 BD 07 B3 D9  iw.zE.8B..=q....
#     0020: 51 4A B1 A1 D7 D7 83 FA   A1 33 50 DB 0A B1 39 C7  QJ.......3P...9.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.686 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.781 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EF FC B7 62 FF 18 5B D6 69 F8 96 E7 A0 18 0B 23 15 D1 33 8A C8 89 00 37 A8 82 A7 B9 33 9E 3E C6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 13:04:11.432 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 13:04:11.433 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 13:04:12.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:04:12.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:04:12.916; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:12.918; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:12.918; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:12.949 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 FF E1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:54.000 UTC",
#     "not  after"         : "2024-01-16 13:03:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#         0010: 6D BB 68 07                                        m.h.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:12.952 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 A0 C0 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:46.000 UTC",
#     "not  after"         : "2024-01-16 13:03:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:12.963 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:13.144 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.145 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:13.146 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:13.147 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.151 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.163 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.163 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.163 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.165 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "91 3F 24 D3 99 C4 61 40 43 DA 79 11 5A E0 C8 12 E1 15 7E 5D 6B F2 EF B1 92 80 75 D4 2F 38 4A C3",
#   "session id"          : "B5 6C 99 57 6D 58 B9 B5 93 01 4E 04 9E 84 F3 DA 4A 94 82 1A 04 00 06 54 8B AA 52 BF F6 64 D1 B6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1A 39 64 43 05 11 11 DC   57 9C FA E3 FC FC 73 01  .9dC....W.....s.
#             0010: 25 E8 03 DF 9C 3B 3D 14   54 B0 D8 9E 48 0E 00 73  %....;=.T...H..s
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.260 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0D 30 0A E5 8C 05 BF 72 FC CF 22 22 74 C4 A3 56 77 98 68 90 31 A5 AA 73 8D D4 A4 F4 3C 92 AC DD",
#   "session id"          : "B5 6C 99 57 6D 58 B9 B5 93 01 4E 04 9E 84 F3 DA 4A 94 82 1A 04 00 06 54 8B AA 52 BF F6 64 D1 B6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 69 7B 78 41 C9 A2 7F 3C   1B 0A F2 25 88 53 CF 6A  i.xA...<...%.S.j
#           0010: 9E 60 07 DF 09 1E 75 E3   C3 41 9C 29 7F DC 03 3D  .`....u..A.)...=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.261 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.261 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.263 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.287 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.288 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.290 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.299 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.299 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.299 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.300 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.308 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.309 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.309 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.312 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 20 BB A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:50.000 UTC",
#       "not  after"         : "2024-01-16 13:03:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 EF AA 49 B9 FD 18 0B   3A DA C3 A3 6B A6 AC 19  U..I....:...k...
#           0010: 98 E6 8F B2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.312 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.511 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.514 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F F8 44 C6 55 FC F6 AA   12 E1 3D 9A FD 0B 4F FE  o.D.U.....=...O.
#     0010: 2D 15 AA BD E1 41 C1 0D   92 CB 41 BA 3F F9 70 03  -....A....A.?.p.
#     0020: 6E 09 FC 11 40 7B C0 A7   6E BB 87 0F 41 57 46 2B  n...@...n...AWF+
#     0030: B0 DE FB 49 2A E5 F4 05   45 3E 49 B5 D2 D9 7A 00  ...I*...E>I...z.
#     0040: 4D E5 C0 21 48 0D BA F2   A9 DD E0 0F 92 8F A4 54  M..!H..........T
#     0050: A9 9C 99 55 3E DE B1 A8   F6 8F BD 06 41 0D 8F 25  ...U>.......A..%
#     0060: A5 C9 13 93 39 80 12 3B   BE A8 58 AA 9B 55 8F 6B  ....9..;..X..U.k
#     0070: 81 F7 AE 01 CB 12 1A 76   F8 F8 23 66 1C 78 B1 61  .......v..#f.x.a
#     0080: 4D B1 A1 6D 3E 21 7B 34   0A BA 47 4F BC 18 06 DC  M..m>!.4..GO....
#     0090: 35 6C EC 5C 53 83 81 A5   2F CC FE F5 3C 78 88 4E  5l.\S.../...<x.N
#     00A0: 0D B4 9F 22 30 36 BC 3C   17 0B E2 E7 6E 4D 66 9A  ..."06.<....nMf.
#     00B0: D3 37 9B 2B 27 A6 BE C5   AE CB CB 80 41 04 52 4C  .7.+'.......A.RL
#     00C0: BF B1 4A A0 2F E4 26 AA   45 2D 24 90 91 AC BE 50  ..J./.&.E-$....P
#     00D0: D8 ED 92 D2 2C D7 2E 09   D7 9D 6B 0A 05 F3 2E 23  ....,.....k....#
#     00E0: B6 34 8E C3 DF 5E 4F 98   8B FE 1D 61 C9 45 80 0E  .4...^O....a.E..
#     00F0: 13 1D BE 81 EF 1C DE 19   F1 93 FA 07 55 43 BB 90  ............UC..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.516 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 14 E9 A2 C7 34 B6 C0 6A   79 8A F4 9C FC 65 F3 D0  ....4..jy....e..
#     0010: B8 9A 28 02 54 30 76 10   22 F8 76 F8 6F 15 0E 27  ..(.T0v.".v.o..'
#     0020: D0 2E 31 44 43 4D 06 5E   57 16 9A 42 0E 86 2E 08  ..1DCM.^W..B....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.517 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:13.518 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.518 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.521 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 FF E1 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:54.000 UTC",
#       "not  after"         : "2024-01-16 13:03:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#           0010: 6D BB 68 07                                        m.h.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 5B 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:48.000 UTC",
#       "not  after"         : "2024-01-16 13:03:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.542 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 10 66 5E A8 9E 81 24   76 6D 98 92 2A 00 41 03  Q.f^...$vm..*.A.
#     0010: E4 0E 11 8B DB E1 A1 E7   38 F4 AC 1F 00 AF C0 72  ........8......r
#     0020: 26 A7 21 4A 05 02 31 54   CC A4 63 F2 81 F1 87 36  &.!J..1T..c....6
#     0030: FF BB DF A0 2C 7F 3F 92   73 FD D1 C2 F0 6B 3B 57  ....,.?.s....k;W
#     0040: C1 0B 75 7E 24 46 B7 CC   88 80 2D 8F 15 E2 78 59  ..u.$F....-...xY
#     0050: 6F 27 F0 74 09 B7 E8 C9   91 6F 0E 07 82 11 3B DE  o'.t.....o....;.
#     0060: 60 50 3D E3 8B 12 14 B1   F1 19 74 10 50 0F 72 30  `P=.......t.P.r0
#     0070: AE A7 0E D1 45 17 57 00   16 F2 A1 AC 38 B6 F1 19  ....E.W.....8...
#     0080: A2 AC C4 75 77 EC 15 83   F9 BF 0A DA 7A 8D 66 13  ...uw.......z.f.
#     0090: 20 EB D7 62 3C F5 49 91   F6 83 5F B7 4F D4 5C 6A   ..b<.I..._.O.\j
#     00A0: 6A FD 00 6E 98 C8 E9 9F   24 89 B7 4F 51 C1 29 4E  j..n....$..OQ.)N
#     00B0: B8 EB A4 10 2C C8 00 75   F0 9C 70 D3 FB 0A 3C 48  ....,..u..p...<H
#     00C0: D8 64 4F 21 51 41 19 03   AE 5B 65 F1 FC 94 C6 4B  .dO!QA...[e....K
#     00D0: 19 51 DE F8 F6 96 BE 94   15 15 B3 28 04 BF 2F 55  .Q.........(../U
#     00E0: AE 3A C9 4F 63 2A 06 02   AC 6A 6A 2E 85 B2 21 DF  .:.Oc*...jj...!.
#     00F0: 18 BB E0 D1 98 0F 01 8E   31 CB 1B FD 82 FF F4 DF  ........1.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.543 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0A 9F 8E 01 E5 60 8D 29   24 37 BA D8 90 15 93 1A  .....`.)$7......
#     0010: E6 63 A1 C1 18 2B 38 27   D7 07 46 2C 45 4C 78 E0  .c...+8'..F,ELx.
#     0020: 26 78 88 8A 64 45 86 C2   B6 EF 9F 48 2C 21 18 C1  &x..dE.....H,!..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.544 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.600 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 EC 9D EC DE FA ED 83 74 D9 A0 64 1D 54 CF 6E 93 07 12 5D FD 4E 52 04 9A FD 1A E5 4F 08 E4 3B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 13:04:13.856 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 13:04:13.860 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-18 13:04:26.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:27.273 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 A0 C0 F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:46.000 UTC",
#       "not  after"         : "2024-01-16 13:03:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 5B 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:48.000 UTC",
#       "not  after"         : "2024-01-16 13:03:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:27.286 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:27.551 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.551 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:27.553 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:27.553 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.557 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.568 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.568 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.569 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.571 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "08 D0 0B 14 A2 B8 23 72 99 B7 38 6B 15 F3 BA 6F 97 62 64 44 DC FF FD F6 CB 5A F2 ED 27 B1 B4 CB",
#     "session id"          : "E4 B1 A1 0D 8A 70 74 F8 3A 3A 87 F1 B9 3E ED 46 51 48 3D 45 D9 30 E9 54 EC D1 17 EA 4D B3 FF 25",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7C 49 C5 5B 45 0E C3 5F   36 B5 68 96 0A F3 64 34  .I.[E.._6.h...d4
#               0010: A2 8F 41 E0 37 DD 1B 28   68 C1 D7 8B E6 28 F4 4F  ..A.7..(h....(.O
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.591 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "42 A1 45 20 73 FA 0C 23 E8 A1 B0 7B B6 1C 85 7E 35 67 13 BE 3C 2E 01 80 6A 7E 17 47 AD 07 84 C5",
#     "session id"          : "E4 B1 A1 0D 8A 70 74 F8 3A 3A 87 F1 B9 3E ED 46 51 48 3D 45 D9 30 E9 54 EC D1 17 EA 4D B3 FF 25",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D4 20 19 C4 48 F0 AD 78   09 43 0E F9 24 CE E9 81  . ..H..x.C..$...
#             0010: F1 67 C3 D1 88 91 9A 4A   A6 9D 2A A4 8B 13 FD 13  .g.....J..*.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.591 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.591 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.593 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.604 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.605 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.606 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14457ms
ok 78 stop command for single port in 18419ms
not ok 79 status detects locally running solr in 1547ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7513ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1456ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2837ms
ok 83 copying files around in 6522ms
ok 84 upconfig in 2687ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
not ok 87 Cleanup in 2515ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 11s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/mhuqb72gtjeno

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8212 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8212/

2 tests failed.
FAILED:  org.apache.solr.cloud.DeleteReplicaTest.raceConditionOnDeleteAndRegisterReplica

Error Message:
java.lang.AssertionError: Failed to delete replica

Stack Trace:
java.lang.AssertionError: Failed to delete replica
	at __randomizedtesting.SeedInfo.seed([C61635BC72FA63AC]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.cloud.DeleteReplicaTest.lambda$raceConditionOnDeleteAndRegisterReplica$10(DeleteReplicaTest.java:407)
	at org.apache.solr.core.ZkContainer.lambda$registerInZk$1(ZkContainer.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.cloud.OverseerTest.testShardLeaderChange

Error Message:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=7135, name=OverseerCollectionConfigSetProcessor-72686850632384514-127.0.0.1:40201_solr-n_0000000000, state=RUNNABLE, group=Overseer collection creation process.]

Stack Trace:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=7135, name=OverseerCollectionConfigSetProcessor-72686850632384514-127.0.0.1:40201_solr-n_0000000000, state=RUNNABLE, group=Overseer collection creation process.]
	at __randomizedtesting.SeedInfo.seed([C61635BC72FA63AC:1845B24B6862965D]:0)
Caused by: org.apache.solr.common.AlreadyClosedException
	at __randomizedtesting.SeedInfo.seed([C61635BC72FA63AC]:0)
	at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryOperation(ZkCmdExecutor.java:68)
	at app//org.apache.solr.common.cloud.SolrZkClient.getData(SolrZkClient.java:436)
	at app//org.apache.solr.cloud.OverseerTaskProcessor.amILeader(OverseerTaskProcessor.java:486)
	at app//org.apache.solr.cloud.OverseerTaskProcessor.run(OverseerTaskProcessor.java:171)
	at java.base@11.0.16.1/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 61045 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.DeleteReplicaTest.raceConditionOnDeleteAndRegisterReplica (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.DeleteReplicaTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.DeleteReplicaTest.raceConditionOnDeleteAndRegisterReplica" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=C61635BC72FA63AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8

  - org.apache.solr.cloud.OverseerTest.testShardLeaderChange (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.OverseerTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.OverseerTest.testShardLeaderChange" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=C61635BC72FA63AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 41s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/xqa2ktmasy7um

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8211 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8211/

All tests passed

Build Log:
[...truncated 1391 lines...]
BUILD FAILED in 1h 5m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/4njd7ai7wkobu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8210 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8210/

All tests passed

Build Log:
[...truncated 1523 lines...]
BUILD FAILED in 1h 5m 53s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/v4cqcsla4yvnq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8209 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8209/

All tests passed

Build Log:
[...truncated 1510 lines...]
BUILD FAILED in 1h 3m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/d5o76wqjogyeq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8208 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8208/

All tests passed

Build Log:
[...truncated 1549 lines...]
BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ku62oqbcjb7us

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8207 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8207/

All tests passed

Build Log:
[...truncated 1151 lines...]
# ERROR: Error from server at http://localhost:35155/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16168ms
ok 60 Check help command in 4793ms
ok 61 basic post with a type specified in 5643ms
ok 62 basic post WITHOUT a type specified in 11882ms
ok 63 crawling a directory in 4458ms
ok 64 crawling a web site in 4775ms
ok 65 commit and optimize and delete in 4028ms
ok 66 args mode in 6830ms
ok 67 stdin mode in 3524ms
ok 68 post solr log into solr via script in 9997ms
ok 69 post solr log into solr via cli in 7138ms
ok 70 allowPaths - backup in 16462ms
ok 71 start solr with ssl in 18269ms
not ok 72 use different hostname when not checking peer-name in 20485ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 35155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35155 (pid=3836159). Happy searching!
#
#     INFO  - 2023-10-17 19:16:21.169; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:16:21.173; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 19:16:21.552; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 19:16:21.652; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 19:16:21.652; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-17 19:16:31.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 19:16:31.615; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-17 19:16:31.990; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:35155/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-17 19:16:33.384; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:16:33.389; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35155/solr] to [https://127.0.0.1:35155].
# WARN  - 2023-10-17 19:16:34.202; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 19:16:34.240; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16703ms
ok 74 start solr with client truststore and security manager in 19228ms
not ok 75 start solr with mTLS needed in 52982ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-fUth4V/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35155 (pid=3838904). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35156 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 35156 (pid=3839015). Happy searching!
#
#     INFO  - 2023-10-17 19:17:35.956; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:17:35.961; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 19:17:37.308; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:37.310; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:37.311; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:37.376 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 66 58 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:22.000 UTC",
#     "not  after"         : "2024-01-15 19:17:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#         0010: 38 4D 54 65                                        8MTe
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:37.383 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 71 E4 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:13.000 UTC",
#     "not  after"         : "2024-01-15 19:17:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:37.396 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:37.761 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:37.768 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:37.769 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.777 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.810 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.811 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.825 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 7B AB 35 21 7D ED 96 C4 D8 E1 9B AE 43 B8 C7 04 32 2E 0F B9 E0 70 16 99 29 45 BE 82 38 2A B4",
#   "session id"          : "F7 1E 6E 76 57 7B D4 98 9F 21 90 24 94 CD D3 A7 E1 83 CE BA DF 5B 07 21 5E 7B 77 A9 9E DE 90 52",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 39 B8 AD A0 C3 94 05 32   BD A5 EF 33 F6 C2 9B 2F  9......2...3.../
#             0010: AB 3D EE E9 D1 B4 B3 C7   11 73 12 84 58 53 5A 4B  .=.......s..XSZK
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.006 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 87 D5 E5 BC 25 C7 B4 4A A0 C1 04 E8 DB 94 18 FE 02 EF 70 B3 F6 3E E4 FA 08 34 22 1B 2B E1 E2",
#   "session id"          : "F7 1E 6E 76 57 7B D4 98 9F 21 90 24 94 CD D3 A7 E1 83 CE BA DF 5B 07 21 5E 7B 77 A9 9E DE 90 52",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 71 DF 53 CF FB 8B CE 9E   3B 7B 20 F6 A4 3B D4 54  q.S.....;. ..;.T
#           0010: 2E 4A 6A E6 86 CF 6D A7   59 FE 72 69 6D 19 33 1B  .Jj...m.Y.rim.3.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.006 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.007 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.008 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.008 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.010 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.010 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.013 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.018 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.044 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.046 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.048 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.060 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.061 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.061 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.063 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.064 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.065 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.065 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.675 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 E1 43 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:18.000 UTC",
#       "not  after"         : "2024-01-15 19:17:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 75 6D 90 6E AB BD 39   2B 92 CB 4D 03 0B 7A 73  .um.n..9+..M..zs
#           0010: CE 0A 0C F6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.675 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.780 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.783 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 52 80 A0 E8 F4 A7 B7 A7   EF E9 99 7C F3 69 8A 86  R............i..
#     0010: 41 BA 60 8D 68 12 69 A2   94 30 6A 9D C5 50 E9 57  A.`.h.i..0j..P.W
#     0020: 99 97 41 4B BE 79 5D C8   20 AF EA E1 CC CA 7C 6F  ..AK.y]. ......o
#     0030: 58 37 D7 F9 0E D7 7D 5D   4C 7E 88 42 C6 BC E1 B4  X7.....]L..B....
#     0040: 28 CE 86 68 D3 51 9E 41   AF 19 40 FC E7 67 1B FC  (..h.Q.A..@..g..
#     0050: FC FD 44 D5 4A D8 A4 CE   82 AE 0D FC 97 8E 7F E0  ..D.J...........
#     0060: 02 57 8E 59 E1 D0 EC 2F   3F 99 FF 39 61 3B 72 C9  .W.Y.../?..9a;r.
#     0070: D2 22 78 79 88 ED 96 48   C7 E2 E6 75 F3 7B 0B F1  ."xy...H...u....
#     0080: C4 F2 97 8B E9 7F A8 A9   A3 C9 D1 36 C7 1E D3 02  ...........6....
#     0090: 40 8A 9C 24 A7 56 AF 2E   FF C2 D6 50 AC D5 29 5D  @..$.V.....P..)]
#     00A0: 66 79 16 B5 CE 0D D0 2B   BE 7C CA D4 68 34 B5 8B  fy.....+....h4..
#     00B0: 3A 89 54 14 A1 7D 11 7D   AB C4 57 E1 B4 81 B4 8F  :.T.......W.....
#     00C0: 63 86 9C 17 7A 91 DD EB   2B 57 D5 27 84 4A 32 D1  c...z...+W.'.J2.
#     00D0: 7D 60 86 1F 96 86 34 D5   EA A0 7A C8 37 87 86 4B  .`....4...z.7..K
#     00E0: 74 BD DC 8F 36 DD FB BF   03 84 49 05 2F E2 F4 F1  t...6.....I./...
#     00F0: 0D 76 5E E7 DC AC CE E5   66 09 00 53 93 48 DC 8A  .v^.....f..S.H..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.784 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6A AF 10 04 AA 4A 7D 75   E0 EE D8 0C 22 F8 34 3A  j....J.u....".4:
#     0010: 36 BA BE 2F 38 DB B6 9D   4E 0A E0 ED 62 69 54 9E  6../8...N...biT.
#     0020: A8 53 28 06 EF 5C 52 45   E4 50 C3 B7 FB 69 60 C1  .S(..\RE.P...i`.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.798 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:38.799 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.800 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:38.800 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.800 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:38.801 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.801 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.801 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.803 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 66 58 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:22.000 UTC",
#       "not  after"         : "2024-01-15 19:17:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#           0010: 38 4D 54 65                                        8MTe
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 31 DF 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:15.000 UTC",
#       "not  after"         : "2024-01-15 19:17:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.874 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C 16 55 0F 9A 3B C2 FD   9B CA C1 16 3E 7B 03 A0  <.U..;......>...
#     0010: F3 55 50 81 2C EE BB 5C   F0 0F 0F 9A 7F A6 8D 9C  .UP.,..\........
#     0020: 85 BC B5 BE E9 B1 91 39   E5 D7 BC FC 56 BC 7C 29  .......9....V..)
#     0030: B9 E1 80 F3 F7 19 39 37   22 47 4F 5E F0 B4 DA 4A  ......97"GO^...J
#     0040: AC 84 84 9A 80 F0 22 D1   BA D0 1A 53 96 07 BB 0A  ......"....S....
#     0050: F6 CE CB DC E6 30 0E 01   91 65 D2 C6 8D 27 A0 B2  .....0...e...'..
#     0060: D5 82 64 63 D3 8E E5 AD   50 20 71 2A 88 E1 C0 75  ..dc....P q*...u
#     0070: 7C 9A A5 11 0E F4 07 5B   FF 9C A1 00 A4 0B F9 2D  .......[.......-
#     0080: D6 EE C0 08 31 FB 60 50   92 C8 52 F0 A4 BE 85 6C  ....1.`P..R....l
#     0090: D5 ED 4D 2F 21 5C 34 E6   CA 61 1A C6 23 1F D6 40  ..M/!\4..a..#..@
#     00A0: 14 EF 0C 82 3B DA BF 17   79 87 C6 0A 53 D2 1C 62  ....;...y...S..b
#     00B0: D4 2F 00 10 84 36 32 38   52 59 19 05 AB 7D 30 ED  ./...628RY....0.
#     00C0: 45 90 4D 43 76 63 3C 4C   7B 0C 3B 7E 60 6E 71 19  E.MCvc<L..;.`nq.
#     00D0: 42 5F 15 5D 16 EB A8 1A   E0 F2 C3 F4 C3 CA CF 47  B_.]...........G
#     00E0: 04 78 56 B2 D2 FD C3 AF   ED 09 44 8D E5 BC 3C 06  .xV.......D...<.
#     00F0: 21 5D C2 69 C5 F5 13 0F   3B 3C 43 C9 D0 49 19 F2  !].i....;<C..I..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.876 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 4F 82 5E 12 72 B5 1F   74 37 DE 10 6B 0B F3 ED  .O.^.r..t7..k...
#     0010: DC 2B 11 B3 8E 27 36 07   D2 79 AF 19 FB DF 51 CF  .+...'6..y....Q.
#     0020: E9 0A DA B5 0B 18 C0 A6   F2 27 8D 90 BD D1 14 8F  .........'......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.881 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:39.018 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1E FA 0D DE 01 08 A2 56 84 72 41 8A 83 33 50 AD 62 8E D8 AA CC 4F D7 C6 69 4F C0 07 36 EE FB FB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 19:17:39.411 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 19:17:39.412 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 19:17:41.344; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:17:41.349; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 19:17:41.759; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:41.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:41.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:41.799 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 66 58 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:22.000 UTC",
#     "not  after"         : "2024-01-15 19:17:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#         0010: 38 4D 54 65                                        8MTe
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:41.803 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 71 E4 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:13.000 UTC",
#     "not  after"         : "2024-01-15 19:17:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:41.816 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:41.987 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:41.987 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:41.989 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:41.989 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:41.994 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.008 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.010 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7D 87 22 20 64 4B 33 BB 1F E2 E5 6F 7B 5B 33 1A 34 24 D8 A7 93 43 51 29 E8 55 CA 87 ED E9 22 A1",
#   "session id"          : "D4 02 8F 15 5B 5C 9E 33 11 F4 19 7B B5 69 01 DE 0B 0A CB 90 D1 F6 AB 60 71 C3 85 C9 80 0D 93 CE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 50 AE B4 F1 B9 60 22 33   3F 84 39 FF 33 65 71 9F  P....`"3?.9.3eq.
#             0010: 37 A5 FF DB 91 74 19 95   D2 4C A1 B8 CC 72 F5 3D  7....t...L...r.=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.253 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 E1 0B 8A 83 C1 64 65 2D D5 E3 29 5C 68 FC C7 FE 54 F0 3B 8C 72 7D 57 54 6D EF A3 EA 0F 56 09",
#   "session id"          : "D4 02 8F 15 5B 5C 9E 33 11 F4 19 7B B5 69 01 DE 0B 0A CB 90 D1 F6 AB 60 71 C3 85 C9 80 0D 93 CE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 13 CF CD C2 7D 78 A3 1A   FA 7C A6 04 BF 9B FB 32  .....x.........2
#           0010: 48 22 1D DE 8F E5 04 70   29 09 9C EF D6 96 F5 12  H".....p).......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.253 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.253 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.255 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.258 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.264 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.265 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.287 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.289 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.291 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.300 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.301 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.301 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.303 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.304 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.312 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.313 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.313 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.316 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.322 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.322 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.323 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.333 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 E1 43 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:18.000 UTC",
#       "not  after"         : "2024-01-15 19:17:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 75 6D 90 6E AB BD 39   2B 92 CB 4D 03 0B 7A 73  .um.n..9+..M..zs
#           0010: CE 0A 0C F6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.333 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.399 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.402 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 31 23 20 C3 46 19 7A BA   92 C4 4A 18 78 70 22 56  1# .F.z...J.xp"V
#     0010: BF 10 1A 11 90 2E B3 D5   99 C1 79 4B E8 55 C0 68  ..........yK.U.h
#     0020: 0D 6B 14 22 1C 4D A8 EB   11 48 27 84 A0 DD 5A A4  .k.".M...H'...Z.
#     0030: 12 2F BA 38 BF F3 54 4F   08 63 3D 26 36 54 55 C6  ./.8..TO.c=&6TU.
#     0040: A7 E6 2E 4D 7B 1E 7B BD   92 69 A5 A2 1F 3B 18 67  ...M.....i...;.g
#     0050: C4 C7 F6 5D EE BF C6 FB   CC 32 34 C7 A1 8C 67 C6  ...].....24...g.
#     0060: D5 A8 87 9A 0D CE 9A BE   C3 72 EA F0 86 4F A2 1D  .........r...O..
#     0070: 35 63 BB 05 7E C2 FB DD   6B 1A 66 28 B1 0C 78 82  5c......k.f(..x.
#     0080: 7A 85 72 1F 1C BD 80 3B   16 46 23 1E 8A B5 29 B1  z.r....;.F#...).
#     0090: B3 79 BF A8 C0 93 D8 F1   82 72 67 B0 1C 09 7F 53  .y.......rg....S
#     00A0: 27 7B F5 C6 CD BE 66 7D   7B 67 46 B1 5A 70 90 A3  '.....f..gF.Zp..
#     00B0: AA 6C 59 64 41 ED 82 6A   E9 EB 1B A6 56 D5 48 05  .lYdA..j....V.H.
#     00C0: 34 75 DB 04 19 9E 90 CC   38 19 FF 2B D9 74 64 C6  4u......8..+.td.
#     00D0: F2 FB F9 C6 6E 77 6D A8   D3 B1 65 DE 34 EA 37 BE  ....nwm...e.4.7.
#     00E0: 03 9C A9 B9 97 8E 71 F0   FA 75 DB 9E 37 90 F6 71  ......q..u..7..q
#     00F0: F6 7F BD 6B F9 33 79 5E   07 24 D1 30 C8 E7 8B 30  ...k.3y^.$.0...0
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.403 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 21 32 2E 1A E5 56 79   FB 90 B7 06 76 36 DB 50   !2...Vy....v6.P
#     0010: C5 16 3B 7D E2 9F F5 64   A7 E4 DB 43 9E EB 34 0B  ..;....d...C..4.
#     0020: 6C 93 8A 7E 68 EC 00 C2   57 8E EB 18 95 CB 0A E5  l...h...W.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.405 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.407 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.409 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 66 58 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:22.000 UTC",
#       "not  after"         : "2024-01-15 19:17:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#           0010: 38 4D 54 65                                        8MTe
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 31 DF 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:15.000 UTC",
#       "not  after"         : "2024-01-15 19:17:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.431 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 93 F8 EA 57 A2 1F FB   A7 B8 99 97 AD 13 84 1E  ....W...........
#     0010: 00 95 AC 27 B1 87 85 67   0F E5 78 F8 B8 B9 7A 2E  ...'...g..x...z.
#     0020: C3 48 DA 46 7E 86 D6 CD   DE 21 C4 E4 7D 94 30 9F  .H.F.....!....0.
#     0030: BD 59 98 B0 A1 DD E8 73   4B 08 1A 10 3B 81 38 78  .Y.....sK...;.8x
#     0040: C5 5A 8B 41 1E 70 04 A3   48 7C A5 14 61 72 D4 CA  .Z.A.p..H...ar..
#     0050: 90 ED 82 55 5F 27 47 39   9E DF DD 4D 63 28 DE 93  ...U_'G9...Mc(..
#     0060: 4F 67 67 08 79 88 50 86   CB 66 5F 37 29 8A AF A0  Ogg.y.P..f_7)...
#     0070: 56 2F 57 DE DC 74 88 0E   56 91 A9 AC 23 7A E8 3A  V/W..t..V...#z.:
#     0080: B4 FE 50 BB 9A FE 49 D7   FE 3A 52 E6 73 05 BC 81  ..P...I..:R.s...
#     0090: 87 7C 84 AC 7D 18 68 E8   D9 B5 99 F3 5F E5 F7 84  ......h....._...
#     00A0: 3E 46 46 10 28 40 2D 2B   A3 9B 1C 8D 44 B5 34 6A  >FF.(@-+....D.4j
#     00B0: D1 DA AD 46 82 E7 D6 64   FC 8A FA 08 D6 06 9C E2  ...F...d........
#     00C0: FD B0 7A 8C 90 65 ED 5B   F5 25 C9 8E 93 82 D3 62  ..z..e.[.%.....b
#     00D0: 66 18 66 49 C3 58 56 58   F4 DD D9 A2 9D 1B 87 1E  f.fI.XVX........
#     00E0: FF 2B C0 0E FA D9 4B 59   52 6F A9 E3 5F B7 29 26  .+....KYRo.._.)&
#     00F0: BF D8 E3 81 A3 59 94 EE   86 A5 8B D3 45 A1 0A 87  .....Y......E...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.432 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B1 8D 9B C3 7E EF E9 9C   A6 09 87 5F C9 3C 19 BC  ..........._.<..
#     0010: FE 42 44 38 01 4D 37 E0   CC 7B AB 4B DB 55 40 34  .BD8.M7....K.U@4
#     0020: AF DB EC C3 F6 37 51 2B   33 A1 AD 39 30 F7 3F EE  .....7Q+3..90.?.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.433 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.492 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E6 EA E4 B5 56 75 AD 3D 6B 2E 58 D5 37 D9 89 86 FD 4C F1 B0 D5 9E 4F B1 81 9B 79 FD C3 DC 71 9C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 19:17:42.826 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 19:17:42.835 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-17 19:17:42.866 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-17 19:17:42.870 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-17 19:17:55.894; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:56.336 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 31 DF 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:15.000 UTC",
#       "not  after"         : "2024-01-15 19:17:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 71 E4 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:13.000 UTC",
#       "not  after"         : "2024-01-15 19:17:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:56.348 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:56.504 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:56.506 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:56.506 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.510 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.521 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.521 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.522 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.524 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2C F7 40 B8 54 24 6A 58 F5 EE D3 9D 67 A7 2A 7D AE 3C 69 AF 07 6D BA C1 24 12 E7 2C DD 6E 34 2B",
#     "session id"          : "9B E7 06 31 04 96 5F 79 19 27 C3 43 B5 F1 B3 D6 40 50 86 5F 4B C8 3B CA D7 03 07 68 09 48 83 CD",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CD 7D EB CD CE DF 45 DE   58 54 B8 55 D1 95 9E A5  ......E.XT.U....
#               0010: D3 C1 A5 A9 AB D1 B2 49   05 61 90 B8 0F 5D FB 43  .......I.a...].C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E2 41 0D 19 C0 ED AA 15 AA 6E FF 50 53 D4 6A 87 FB D6 AD 78 DA D8 D7 37 6E FC 29 E8 8A E5 0B AC",
#     "session id"          : "9B E7 06 31 04 96 5F 79 19 27 C3 43 B5 F1 B3 D6 40 50 86 5F 4B C8 3B CA D7 03 07 68 09 48 83 CD",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E 39 39 67 D5 95 C5 17   4B ED 69 61 F4 40 14 98  ^99g....K.ia.@..
#             0010: D3 8E 28 D9 54 BB CA EF   A8 B2 16 38 1E 77 5A 72  ..(.T......8.wZr
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UT

[...truncated too long message...]

.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:19:10.254 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35156/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14602ms
ok 78 stop command for single port in 17201ms
ok 79 status detects locally running solr in 9517ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7731ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1132ms
ok 82 listing out files in 3119ms
ok 83 copying files around in 6691ms
ok 84 upconfig in 2636ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1251ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1246ms
ok 87 Cleanup in 2127ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 36s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ikhyj4rp4aczy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8206 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8206/

All tests passed

Build Log:
[...truncated 1518 lines...]
BUILD FAILED in 1h 3m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/kfztdqul7szpa

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8205 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8205/

All tests passed

Build Log:
[...truncated 1447 lines...]
BUILD FAILED in 1h 8m 35s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/i7jrhrtdgpvw4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8204 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8204/

All tests passed

Build Log:
[...truncated 1433 lines...]
BUILD FAILED in 1h 2m 36s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2u6womqfi2z7y

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8203 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8203/

All tests passed

Build Log:
[...truncated 1442 lines...]
BUILD FAILED in 1h 5m 16s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/hb5jqwpkefxgk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8202 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8202/

All tests passed

Build Log:
[...truncated 1480 lines...]
BUILD FAILED in 1h 2m 57s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uuf3gpdn2nen2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8201 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8201/

All tests passed

Build Log:
[...truncated 1479 lines...]
BUILD FAILED in 1h 4m 11s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/gx64ftviidvzi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8200 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8200/

All tests passed

Build Log:
[...truncated 1263 lines...]
# ERROR: Error from server at http://localhost:41087/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16327ms
ok 57 Check help command in 4550ms
ok 58 basic post with a type specified in 6024ms
ok 59 basic post WITHOUT a type specified in 11748ms
ok 60 crawling a directory in 4477ms
ok 61 crawling a web site in 4699ms
ok 62 commit and optimize and delete in 4020ms
ok 63 args mode in 6529ms
ok 64 stdin mode in 3446ms
ok 65 post solr log into solr via script in 10002ms
ok 66 post solr log into solr via cli in 7058ms
ok 67 allowPaths - backup in 16927ms
ok 68 start solr with ssl in 18645ms
not ok 69 use different hostname when not checking peer-name in 21066ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41087 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41087 (pid=1953228). Happy searching!
#
#     INFO  - 2023-10-16 21:47:56.392; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:47:56.397; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:47:56.948; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 21:47:57.073; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 21:47:57.075; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 21:48:07.287; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 21:48:07.291; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 21:48:07.687; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41087/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 21:48:09.127; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:48:09.131; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 11093ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 41087 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41087 (pid=1954035). Happy searching!
#
#     INFO  - 2023-10-16 21:48:17.789; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:48:17.794; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-16 21:48:20.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:48:20.476; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 19390ms
not ok 72 start solr with mTLS needed in 51939ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2q7KJJ/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41087 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41087 (pid=1955779). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41088 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41088 (pid=1955904). Happy searching!
#
#     INFO  - 2023-10-16 21:49:06.317; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:49:06.331; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:49:07.302; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:07.304; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:07.306; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:07.349 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 43 C8 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:52.000 UTC",
#     "not  after"         : "2024-01-14 21:48:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#         0010: A5 17 51 C1                                        ..Q.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:07.353 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 7B 19 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:43.000 UTC",
#     "not  after"         : "2024-01-14 21:48:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:07.365 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.668 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.669 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.669 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.669 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:07.759 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.761 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:07.766 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:07.768 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.786 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.815 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.817 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "31 5E 0D 09 60 03 31 C5 9B 5A 70 1D 95 22 BE 54 70 AD 39 6F F9 C3 A0 86 7D C6 44 26 1C 3F 16 AC",
#   "session id"          : "F9 87 56 86 56 FB F2 FF 41 0E A0 39 97 36 A0 F8 59 32 9A 2C 8E 7B EB 07 10 86 FE DC C8 2F 2C 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E3 F9 69 4A BE 69 FE 95   AD 4E 82 B1 38 B4 D7 57  ..iJ.i...N..8..W
#             0010: FC BE 79 BE 5F B0 D9 02   2A 3C 4E 29 89 EB F0 6B  ..y._...*<N)...k
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.504 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F6 51 6A 3D 1E D0 07 85 58 DF 3D 71 F7 16 65 86 D6 A5 15 8E D1 44 53 77 AD F3 B1 AE B9 BC 2A EE",
#   "session id"          : "F9 87 56 86 56 FB F2 FF 41 0E A0 39 97 36 A0 F8 59 32 9A 2C 8E 7B EB 07 10 86 FE DC C8 2F 2C 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 6B 2E 61 5B ED 77 B2   C7 D0 B7 0D 93 25 0F 66  .k.a[.w......%.f
#           0010: 31 DA 9B 0F 13 BC B3 E4   C2 ED 6D CA FE 3E A9 7C  1.........m..>..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.504 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.505 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.513 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.524 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.546 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.547 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.564 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.567 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.570 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.585 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.586 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.586 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.590 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 3A 49 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:48.000 UTC",
#       "not  after"         : "2024-01-14 21:48:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A A6 1B D2 8A 67 29 A6   90 65 1C 5B E5 D0 DB 5F  :....g)..e.[..._
#           0010: E0 8D 1C 6B                                        ...k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.591 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.642 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.647 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 17 C2 F9 68 11 54 69   E4 B3 C1 50 E3 86 52 D0  "...h.Ti...P..R.
#     0010: EA 62 84 D9 94 FF 52 8C   C6 BA 7F E0 47 C6 08 16  .b....R.....G...
#     0020: 98 05 7F 07 3F 93 83 10   AD 3B 3B 5F CB D5 BD 52  ....?....;;_...R
#     0030: E5 43 89 E4 E5 20 EB 64   5B 8E 87 20 00 AC 77 0D  .C... .d[.. ..w.
#     0040: 1B DE 32 FC 5F E9 97 9D   58 22 0B 5D B2 26 51 1F  ..2._...X".].&Q.
#     0050: 7F 32 BC C7 38 1B AF 1B   4B 3D 79 EF 6E 7F 8C D1  .2..8...K=y.n...
#     0060: 2D 97 F4 F6 8E 74 ED FF   32 23 49 11 F8 3B B3 C9  -....t..2#I..;..
#     0070: C3 AE 97 7B 11 44 90 FD   D2 4E 47 12 BC 37 F4 1B  .....D...NG..7..
#     0080: 0F 94 65 08 F5 11 F9 41   0C 7D 39 88 42 2B 9D 4C  ..e....A..9.B+.L
#     0090: 2C 91 8B 3B F4 4B 96 4C   9B BF 7B BA CB 1F A8 7C  ,..;.K.L........
#     00A0: FD 85 7E 1D 65 94 66 CB   4C 6B D2 85 85 E8 C4 72  ....e.f.Lk.....r
#     00B0: A9 49 2D 74 B9 98 30 82   73 96 4B 28 81 E4 DC DA  .I-t..0.s.K(....
#     00C0: 06 63 6B 6B 3C D0 4A AF   88 85 BE 8D 4C D3 B4 61  .ckk<.J.....L..a
#     00D0: CD 52 30 39 98 ED C1 C2   46 B7 0D 8F 23 73 B1 29  .R09....F...#s.)
#     00E0: 53 24 93 A2 F4 EC F3 24   EE 92 30 0B CB EA D7 96  S$.....$..0.....
#     00F0: 6F 4A 02 2B 37 E2 58 95   13 C5 5F ED 51 E8 BB 51  oJ.+7.X..._.Q..Q
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.650 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1F 6F 66 99 1B 21 C5 7B   83 CC BD 42 DA 67 B3 39  .of..!.....B.g.9
#     0010: DF 23 E8 0A EC BB 2C 6E   CB ED B7 65 A7 29 9A B6  .#....,n...e.)..
#     0020: BD 37 FD 10 48 23 8B 69   5F C7 82 A5 FA 87 25 21  .7..H#.i_.....%!
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.654 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:08.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.655 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:08.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.667 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 43 C8 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:52.000 UTC",
#       "not  after"         : "2024-01-14 21:48:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#           0010: A5 17 51 C1                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 50 6A DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:45.000 UTC",
#       "not  after"         : "2024-01-14 21:48:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.724 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 F2 6B 10 6F DA CE 35   18 92 3A 32 7A 7B 79 4A  W.k.o..5..:2z.yJ
#     0010: 19 34 10 E9 31 1A 60 DD   B4 1C E0 62 02 40 DB C8  .4..1.`....b.@..
#     0020: A1 F2 4B C2 F3 94 08 BB   AF 7A 2A 1E 79 B9 B1 CB  ..K......z*.y...
#     0030: 59 E3 0B 6D 14 6E 52 CC   9E EF DD 8F 08 EF F6 D7  Y..m.nR.........
#     0040: 0C D5 CE 46 0E 5D 10 F0   D0 ED 49 70 22 A0 E4 8A  ...F.]....Ip"...
#     0050: D6 A8 BD D1 61 4E C1 A8   D1 A7 F9 1C F4 9E 07 AE  ....aN..........
#     0060: D9 E7 8A 5F D7 75 6A 4B   D5 04 F6 1F 4E 61 3C 8B  ..._.ujK....Na<.
#     0070: 09 7F CA F7 19 3D E1 31   EB 98 C7 F5 05 BF B2 5F  .....=.1......._
#     0080: C3 CB 8C 2E 2A C2 8E 4D   DD 64 26 C8 70 41 57 C2  ....*..M.d&.pAW.
#     0090: 2F F9 E4 BE 04 9E 5A F4   A7 B3 A3 08 B8 9D 55 16  /.....Z.......U.
#     00A0: BF 7D 7D AE 0F 17 51 45   A0 06 81 F8 97 37 08 B0  ......QE.....7..
#     00B0: EF D6 54 0C D7 8F 44 E8   1A 43 6C E4 66 40 46 0A  ..T...D..Cl.f@F.
#     00C0: 7C 18 1C 8A F8 40 52 9E   73 6B 87 6A 7E 5F 55 4D  .....@R.sk.j._UM
#     00D0: B2 EA F9 5E 08 B3 64 49   F9 C3 B2 7D 5B 97 EC 4F  ...^..dI....[..O
#     00E0: 88 4D 4F 60 56 DF 91 3D   40 D1 0E 94 35 35 EB 3A  .MO`V..=@...55.:
#     00F0: 29 D4 B1 41 0B 36 AE D0   8E 7B F2 7D EE B3 20 5B  )..A.6........ [
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.728 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 1D 00 25 77 64 C5 A6   62 B2 2C 99 AD 71 FD D2  ...%wd..b.,..q..
#     0010: F3 6D 16 84 73 1D 52 72   5E B4 72 48 23 ED 46 90  .m..s.Rr^.rH#.F.
#     0020: 8B 7C DC 1C D9 1C 41 01   23 72 F1 7B 85 07 6D 1F  ......A.#r....m.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.728 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.852 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "84 36 75 E8 3D 39 6C 1E 42 54 CF 79 56 9F A6 DB 5C 00 2F 1B 66 3B 11 94 14 05 ED 90 B6 10 5D C2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 21:49:09.634 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 21:49:09.636 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 21:49:10.869; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:49:10.874; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:49:11.276; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:11.278; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:11.279; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:11.317 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 43 C8 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:52.000 UTC",
#     "not  after"         : "2024-01-14 21:48:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#         0010: A5 17 51 C1                                        ..Q.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:11.321 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 7B 19 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:43.000 UTC",
#     "not  after"         : "2024-01-14 21:48:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:11.334 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:11.529 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.530 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:11.531 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:11.531 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.537 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.657 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.657 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.658 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.660 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DD 78 F5 90 EB 05 4C 13 D9 86 58 B3 AD 66 C8 23 1C 7A AE 17 C8 13 4B 4D 89 5D 01 0E EF 26 09 40",
#   "session id"          : "20 DA 50 05 62 10 37 27 73 96 39 0C BC 40 77 4E 96 BB D0 78 E7 26 0F 62 D1 5D 06 5F F7 F6 02 6A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DB 6F 4C B8 D3 B3 87 1F   10 39 01 E5 E2 B8 DA 97  .oL......9......
#             0010: 72 C5 BA BD 1F 13 E7 4D   23 65 7F C5 13 81 A2 17  r......M#e......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.768 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "19 61 01 0B AE 3B 40 34 14 95 9A 03 54 02 73 7D 1A FA 4E 19 76 2B F8 7C BB EA 78 5C 97 9D 6F 68",
#   "session id"          : "20 DA 50 05 62 10 37 27 73 96 39 0C BC 40 77 4E 96 BB D0 78 E7 26 0F 62 D1 5D 06 5F F7 F6 02 6A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 75 B9 70 89 BD B7 54   C6 5D 42 6B C4 63 2F 33  Cu.p...T.]Bk.c/3
#           0010: F4 8A 1A 30 76 5F 3E 40   27 04 98 85 BF 41 64 2B  ...0v_>@'....Ad+
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.768 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.769 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.772 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.772 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.780 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.785 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.801 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.803 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.804 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.811 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.815 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.816 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.816 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.818 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 3A 49 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:48.000 UTC",
#       "not  after"         : "2024-01-14 21:48:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A A6 1B D2 8A 67 29 A6   90 65 1C 5B E5 D0 DB 5F  :....g)..e.[..._
#           0010: E0 8D 1C 6B                                        ...k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.818 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.874 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.878 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F 12 6B C6 9E 8F 48 3B   BC ED BF 18 27 D2 AD 56  ..k...H;....'..V
#     0010: 93 9D 78 33 15 67 48 FF   01 31 F0 CE E2 59 AB A7  ..x3.gH..1...Y..
#     0020: 93 35 79 94 AD 55 C3 32   E7 93 BC 04 0A 59 4E 16  .5y..U.2.....YN.
#     0030: 74 65 6B 37 60 EF C7 B0   8C E6 CF 27 20 92 D8 AF  tek7`......' ...
#     0040: 81 B6 17 5E 77 E2 80 02   D0 F8 7E 79 72 A1 07 C1  ...^w......yr...
#     0050: 04 A6 CE 51 02 3D 5B 07   CF C4 06 55 81 97 6F 61  ...Q.=[....U..oa
#     0060: 8E D9 ED 89 F9 70 B5 BF   DD C6 0B 1E 41 32 4A 9A  .....p......A2J.
#     0070: 84 62 38 29 B3 31 84 F4   2E 2E 5B D2 4A 41 72 71  .b8).1....[.JArq
#     0080: A2 47 9F B8 A3 60 F0 7E   E3 C4 6A 74 59 7D 32 24  .G...`....jtY.2$
#     0090: 83 82 26 C9 58 E2 81 88   57 63 0F 1B F6 04 92 49  ..&.X...Wc.....I
#     00A0: 5A 85 E5 2F 64 0B F9 EA   0B FC 03 2C B4 08 AB D7  Z../d......,....
#     00B0: 7E 83 29 13 97 59 43 45   2D 06 6D 66 5F C7 19 58  ..)..YCE-.mf_..X
#     00C0: 4A BD AB 14 E1 48 7F B8   D7 75 4F 97 D8 E2 90 FD  J....H...uO.....
#     00D0: F0 1A 26 B5 FB E0 61 F5   06 98 C3 63 F3 DF 09 1D  ..&...a....c....
#     00E0: FF DC 82 96 F2 E8 19 B6   D5 6C 83 B8 B0 8A A2 D1  .........l......
#     00F0: C9 4E 39 19 3E B0 01 C2   DC CD 4C 35 E9 89 B3 C4  .N9.>.....L5....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.879 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 75 A3 A7 06 38 72 27   3D 8F 66 46 18 06 7D 21  Ru...8r'=.fF...!
#     0010: C1 98 41 56 97 3B B6 8F   93 F2 9F 98 25 B3 E7 0F  ..AV.;......%...
#     0020: 1D B8 4C 59 C8 B5 A3 27   C9 41 1B C7 3B 3C 59 DE  ..LY...'.A..;<Y.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.881 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.883 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.885 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 43 C8 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:52.000 UTC",
#       "not  after"         : "2024-01-14 21:48:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#           0010: A5 17 51 C1                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 50 6A DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:45.000 UTC",
#       "not  after"         : "2024-01-14 21:48:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.908 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 75 08 E9 98 48 4C 27 CF   9D 55 B7 9E 4A 1F 1E 4D  u...HL'..U..J..M
#     0010: 84 62 47 80 42 E6 58 5F   C3 BF DA 6C 62 C4 7A 48  .bG.B.X_...lb.zH
#     0020: BA D5 AB 2E 31 0C 84 A1   35 B0 AE F8 EA 7B EC 64  ....1...5......d
#     0030: F5 F3 30 84 8B C7 6E 35   2D EA 22 7A 32 DD 2D C3  ..0...n5-."z2.-.
#     0040: 9D 14 EC AA C2 D9 F6 6C   5C CB 2A 47 72 47 81 BA  .......l\.*GrG..
#     0050: 7F 85 82 35 4E 7F F7 A5   CD D6 2E 26 9A EA D1 CF  ...5N......&....
#     0060: 35 2B 57 BA 09 74 0A FD   30 87 1F 50 DB 80 84 CC  5+W..t..0..P....
#     0070: DF 2C 6D 00 E4 64 03 31   4B 18 76 8E EA 18 4A 16  .,m..d.1K.v...J.
#     0080: 3C 73 3B 07 2A E8 A5 0E   AA A9 9B E5 54 92 DB 8E  <s;.*.......T...
#     0090: 6D 63 67 00 BA B2 AF C5   74 78 8A 19 2E 9C 6B 13  mcg.....tx....k.
#     00A0: 05 23 01 04 5C 10 EF B2   8E BF F2 E2 90 58 1C 42  .#..\........X.B
#     00B0: 8C C9 19 8D 79 75 9A 16   67 4D 3F DC A1 7C 47 60  ....yu..gM?...G`
#     00C0: EE 89 43 6A CE EE A6 AF   0A 4A 3A 8B BC 73 60 D7  ..Cj.....J:..s`.
#     00D0: 43 08 29 66 C7 B5 09 DF   17 A8 83 66 08 48 F5 7E  C.)f.......f.H..
#     00E0: C5 30 B6 2A 9A 34 F0 3D   88 15 9F FC 04 D7 01 BC  .0.*.4.=........
#     00F0: 37 D6 0F 5E 46 37 6B 4F   33 E6 BF 22 8D 74 F9 FE  7..^F7kO3..".t..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.909 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 43 62 57 C1 C8 B5 7E 79   17 6A 34 D7 37 E2 A6 FC  CbW....y.j4.7...
#     0010: F1 16 BB 93 0C D9 B1 3D   B4 9F 5B CB 49 CC F3 19  .......=..[.I...
#     0020: 0B F6 76 55 B4 CC 3F C1   67 CD 0F B3 E6 41 39 2C  ..vU..?.g....A9,
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.910 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.985 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "90 64 56 06 9E 29 62 95 E9 1B 18 6E 03 4C 23 CB 4F 68 74 BB 76 9A ED 02 39 37 C4 CF DA 5D 4A 1A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 21:49:12.539 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 21:49:12.540 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 21:49:26.112; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:26.465 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 7B 19 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:43.000 UTC",
#       "not  after"         : "2024-01-14 21:48:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 50 6A DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:45.000 UTC",
#       "not  after"         : "2024-01-14 21:48:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:26.478 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:26.643 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.643 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:26.645 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:26.645 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.650 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.662 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.662 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.662 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.664 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F8 39 80 32 BC E8 35 B0 C6 B3 EF 2E BC 2C B4 D8 FE ED 28 89 AD CB 68 59 E6 F3 1F 2D C5 A7 35 C2",
#     "session id"          : "D2 79 7B EF 8B 10 54 BB A9 42 23 EF 08 2B BC 32 F3 C1 D8 41 10 04 9F DB D0 51 3A 45 F3 77 1E 34",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D8 46 8C ED 4D 5E C6 24   D2 BC F8 B0 3C 1E 59 4F  .F..M^.$....<.YO
#               0010: AD 7A 75 8A 58 F3 7E C1   AD 37 0E E4 E2 84 20 70  .zu.X....7.... p
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:26.681 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "21 49 B0 4C 61 FB C6 39 B7 26 20 D8 C1 B3 F3 04 47 43 89 C4 F8 5E D9 EE 05 25 F4 57 B6 C7 6F 25",
#     "session id"          : "D2 79 7B EF 8B 10 54 BB A9 42 23 EF 08 2B BC 32 F3 C1 D8 41 10 04 9F DB D0 51 3A 45 F3 77 1E 34",
#     "cipher suite"        : "TLS_AES_256

[...truncated too long message...]

C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 14403ms
ok 75 stop command for single port in 20715ms
not ok 76 status detects locally running solr in 1626ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 10082ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1798ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3893ms
ok 80 copying files around in 6656ms
ok 81 upconfig in 2673ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1252ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1253ms
not ok 84 Cleanup in 2704ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 31s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/6kzwlf6jiamua

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8199 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8199/

All tests passed

Build Log:
[...truncated 1260 lines...]
# ERROR: Error from server at http://localhost:45175/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16718ms
ok 57 Check help command in 4475ms
ok 58 basic post with a type specified in 5764ms
ok 59 basic post WITHOUT a type specified in 12062ms
ok 60 crawling a directory in 4570ms
ok 61 crawling a web site in 4832ms
ok 62 commit and optimize and delete in 3785ms
ok 63 args mode in 6416ms
ok 64 stdin mode in 3373ms
ok 65 post solr log into solr via script in 9977ms
ok 66 post solr log into solr via cli in 7298ms
ok 67 allowPaths - backup in 16658ms
ok 68 start solr with ssl in 18841ms
not ok 69 use different hostname when not checking peer-name in 20178ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 45175 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45175 (pid=1411336). Happy searching!
#
#     INFO  - 2023-10-16 17:36:13.035; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:13.040; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 17:36:13.496; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 17:36:13.587; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 17:36:13.588; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 17:36:23.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 17:36:23.475; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 17:36:23.864; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@6175619b[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:45175/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 17:36:25.337; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:25.341; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10686ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 45175 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45175 (pid=1412141). Happy searching!
#
#     INFO  - 2023-10-16 17:36:33.201; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:33.206; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-16 17:36:36.014; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:36.019; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 19218ms
not ok 72 start solr with mTLS needed in 52252ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-TMYkY6/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45175 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45175 (pid=1413893). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45176 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45176 (pid=1414019). Happy searching!
#
#     INFO  - 2023-10-16 17:37:22.036; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:37:22.042; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 17:37:22.599; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e16b8b5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:22.602; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:22.603; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(ca,h=[localhost],a=[],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:22.661 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 38 C3 7C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:07.000 UTC",
#     "not  after"         : "2024-01-14 17:37:07.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#         0010: F2 D9 39 F5                                        ..9.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:22.671 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 9A 1D 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:36:58.000 UTC",
#     "not  after"         : "2024-01-14 17:36:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:22.964 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:23.303 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.303 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:23.308 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:23.308 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.340 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.341 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.341 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.344 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A2 06 56 B0 96 9C 99 E6 EB 01 D1 5A 57 8E C3 2C 36 8D 9F 2B F6 76 A6 90 17 84 4E 0B 73 0B 9F 86",
#   "session id"          : "E0 07 2D 5F E9 7E 4E 0F 5C 43 E6 C6 E6 20 35 D8 41 C2 CA E2 E2 2D F6 FB 8B 66 2B 1E D3 BB 91 4A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D3 DB E9 7A CC 4A 39 D2   A0 9A D1 40 90 CE 70 94  ...z.J9....@..p.
#             0010: FE 22 01 C2 6D C5 72 12   B6 EB 62 D3 4C 44 75 24  ."..m.r...b.LDu$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.821 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FA CC 48 DC A9 14 72 BD 8F 29 97 EB 53 BA D6 30 25 83 B5 B9 4B C3 DF 5B 08 CE 25 F0 E0 41 4F FE",
#   "session id"          : "E0 07 2D 5F E9 7E 4E 0F 5C 43 E6 C6 E6 20 35 D8 41 C2 CA E2 E2 2D F6 FB 8B 66 2B 1E D3 BB 91 4A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 67 D0 11 FB 61 D8 6B 7E   DA 90 98 92 79 89 01 6A  g...a.k.....y..j
#           0010: 84 AF 33 66 2D 5B E6 70   18 35 6A EA 06 C5 C0 0E  ..3f-[.p.5j.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.821 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.822 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.826 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.832 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.837 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.839 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.871 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.873 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.874 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.879 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.879 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.879 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.880 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.880 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.881 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.881 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.898 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B BE 59 D1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:03.000 UTC",
#       "not  after"         : "2024-01-14 17:37:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B1 A4 1D C4 BB BF E3   5A 9A AB 84 30 7D E0 72  ........Z...0..r
#           0010: C3 4D 2B 44                                        .M+D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.898 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.416 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.419 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 F5 C5 90 52 31 D2 5A   5D 87 20 24 B2 F7 BE 78  ....R1.Z]. $...x
#     0010: 09 D7 EE E2 84 01 EC 5B   3D 60 64 66 A4 96 1F 1D  .......[=`df....
#     0020: BF E0 F1 F1 B8 C8 9F 0B   54 D9 14 2F 80 EF 6D 4F  ........T../..mO
#     0030: 52 93 7C 9C 29 52 A4 FB   B5 04 56 0C E9 66 EA 7D  R...)R....V..f..
#     0040: 58 4D C1 A6 B3 4F 79 D4   F4 E8 C4 DE A4 9C E1 47  XM...Oy........G
#     0050: 80 A1 5E 74 E5 A4 4C 86   60 B8 91 C5 DD 74 B9 F9  ..^t..L.`....t..
#     0060: F6 4A 06 59 D9 62 BA 33   B5 56 F1 12 57 5C 24 36  .J.Y.b.3.V..W\$6
#     0070: BB D0 E8 6E 43 3A 96 9E   DC 2B 49 D7 33 D7 11 36  ...nC:...+I.3..6
#     0080: BB FE 01 C5 D0 38 46 FA   72 49 9A 61 E8 DE B0 2E  .....8F.rI.a....
#     0090: 86 A1 BF 7C 1F 72 6E 34   97 6A F9 77 D9 EF D1 F6  .....rn4.j.w....
#     00A0: 6C E7 AA 1E 20 3A 1A D4   82 E3 00 18 F5 58 75 23  l... :.......Xu#
#     00B0: BE DC 07 65 DA 26 61 2E   38 77 14 0B 50 B1 EA 7B  ...e.&a.8w..P...
#     00C0: F5 B0 59 61 1F 91 1F 0D   1B AC 9E AA BB 93 2C 98  ..Ya..........,.
#     00D0: 0E B3 B2 5D 41 9A 7B 16   02 CA 61 F4 89 87 25 8D  ...]A.....a...%.
#     00E0: 79 D2 33 59 8E 93 37 1B   E7 1A 4E 2C C8 92 6E 64  y.3Y..7...N,..nd
#     00F0: 69 94 4D 33 36 F2 AF CF   9B 02 85 3C 2C F5 F8 18  i.M36......<,...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.421 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3A 1B 53 B4 1A 19 5D DA   9A FD 9B 13 09 B2 13 03  :.S...].........
#     0010: 19 FB 47 7A CB DC 3A 33   A5 8A 1C AC 48 BA F8 5C  ..Gz..:3....H..\
#     0020: 7C 91 1C 30 85 0B B3 A9   4D BF 64 97 E9 C1 6B E6  ...0....M.d...k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.422 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:24.423 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:24.423 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.426 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 38 C3 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:07.000 UTC",
#       "not  after"         : "2024-01-14 17:37:07.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#           0010: F2 D9 39 F5                                        ..9.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 65 FF C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:01.000 UTC",
#       "not  after"         : "2024-01-14 17:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.473 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 26 3C 8C A4 17 B6 F5   82 B1 2B 4E 3A F5 33 55  .&<.......+N:.3U
#     0010: 81 9F FF B9 CE D8 4E E2   FD DC 43 75 47 26 EA 14  ......N...CuG&..
#     0020: 15 A9 9D 0E EF 1F 1B 61   E5 D1 B8 36 21 97 DC F0  .......a...6!...
#     0030: 62 AF BE 6D 31 48 0E 2E   BD 82 73 3B 94 1F 9D 07  b..m1H....s;....
#     0040: F9 D2 62 8D B7 19 17 98   5C F4 AC 71 26 FB 12 12  ..b.....\..q&...
#     0050: 1F 5F CD 74 33 93 7C 49   74 12 13 B9 17 BF E5 D2  ._.t3..It.......
#     0060: 64 B8 EB 2F 7B A4 10 85   91 60 21 B0 BB D4 C1 4E  d../.....`!....N
#     0070: E5 F4 BA 54 D0 D9 AE 48   64 49 DF F1 8A 7F B2 8B  ...T...HdI......
#     0080: E9 4D 9B 99 EB 7E 5A 4B   AB 04 9A CF BF C1 43 03  .M....ZK......C.
#     0090: 7C 94 1D 43 63 20 DF 44   9C A4 F7 4E B1 6C 70 7D  ...Cc .D...N.lp.
#     00A0: E8 ED 8C 6E F3 4E 58 0A   EB 00 55 A0 A1 5A F1 47  ...n.NX...U..Z.G
#     00B0: FF 47 0E 18 50 31 7C EC   AE 3E 9A 03 50 03 79 C0  .G..P1...>..P.y.
#     00C0: D3 3B 14 2F 17 E0 72 7E   21 A7 0A 18 4F 02 0D 7C  .;./..r.!...O...
#     00D0: B3 78 12 20 A4 3E 9F BA   7D 5D 0D CE 90 0A BF EB  .x. .>...]......
#     00E0: F7 E3 9B E8 CD 0F D4 B2   1C 96 07 14 62 0D 02 E6  ............b...
#     00F0: BA 65 B9 5F C8 23 2B 28   D4 FF C6 44 39 D8 BA 24  .e._.#+(...D9..$
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.475 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 4C 0C CC 81 7A 29 4B   90 DC 3D BF 14 10 07 57  OL...z)K..=....W
#     0010: DE FF 83 E5 27 5E 04 3E   63 35 27 71 FF 1D F5 79  ....'^.>c5'q...y
#     0020: A9 A5 E9 13 52 61 0B 1C   9A D3 82 BF A0 9B DE 68  ....Ra.........h
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.475 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.560 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F5 BF C7 A7 A4 EF 1E 05 00 7B 0F AF CF 28 F0 51 31 38 26 FD 0E C6 5A 6B FB F1 51 55 E2 46 DE D5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.611 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.611 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.612 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.612 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-16 17:37:25.009 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 17:37:25.010 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 17:37:26.055; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:37:26.060; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 17:37:26.443; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:26.445; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:26.445; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:26.478 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 38 C3 7C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:07.000 UTC",
#     "not  after"         : "2024-01-14 17:37:07.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#         0010: F2 D9 39 F5                                        ..9.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:26.482 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 9A 1D 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:36:58.000 UTC",
#     "not  after"         : "2024-01-14 17:36:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:26.494 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.614 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.615 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.615 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.615 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:26.689 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.689 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:26.690 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:26.691 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.695 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.708 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.710 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A8 9F CF E6 B1 3E 13 08 6E E9 F9 87 62 31 32 BB 8C 8A E7 0E BF 8B BE 9C C6 EC 0D 74 2C 5C 00 14",
#   "session id"          : "6A 61 6E E6 54 91 66 F5 4F 53 2B 80 8B 72 FF 2D C3 F5 35 5B 90 0C 18 8C DB D1 76 B6 4F 53 E7 B1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA 14 C7 20 C5 89 92 01   D9 97 21 3E E2 BA C5 F8  ... ......!>....
#             0010: 5A 67 3B 65 A4 06 79 CF   0D 92 98 7D C1 55 8B 04  Zg;e..y......U..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.232 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DD 6B 57 D6 9A 3E 78 53 27 8A 0E 7C A8 8A 08 CB 01 86 1B 5A 8A BF F4 6F C1 C4 14 22 6D 75 0B F0",
#   "session id"          : "6A 61 6E E6 54 91 66 F5 4F 53 2B 80 8B 72 FF 2D C3 F5 35 5B 90 0C 18 8C DB D1 76 B6 4F 53 E7 B1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3C 78 10 19 B3 45 96 5B   BF B3 FC 11 DA B5 FD 0B  <x...E.[........
#           0010: CC F0 83 6B B0 D2 E8 25   08 D7 63 00 FF F7 5A 14  ...k...%..c...Z.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.232 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.232 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.237 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.237 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.237 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.239 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.240 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.240 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.254 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.255 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.263 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.268 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.268 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.268 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.269 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.269 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.270 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.270 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.278 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B BE 59 D1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:03.000 UTC",
#       "not  after"         : "2024-01-14 17:37:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B1 A4 1D C4 BB BF E3   5A 9A AB 84 30 7D E0 72  ........Z...0..r
#           0010: C3 4D 2B 44                                        .M+D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.278 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.333 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.335 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 BB 2B F3 2F B7 9F 41   99 0E 27 52 C3 4C 3B A8  ..+./..A..'R.L;.
#     0010: 5E 7F FD AB 47 C1 A5 64   FD D4 95 D6 D6 C3 3A E5  ^...G..d......:.
#     0020: D7 6A E2 C3 25 1E F2 0D   D9 F1 99 65 C6 73 ED 54  .j..%......e.s.T
#     0030: A9 27 E3 60 52 AC 57 3C   CB 05 4A BC BC C5 FA B0  .'.`R.W<..J.....
#     0040: B6 04 0A E7 9C 04 4F 27   E3 2B 7C 6C 28 4C 02 FE  ......O'.+.l(L..
#     0050: 93 F7 9F 12 07 7E D4 D3   95 68 8D B5 66 6A 35 42  .........h..fj5B
#     0060: 1B 8E D5 30 93 81 70 78   ED 52 0D 59 42 22 B4 1C  ...0..px.R.YB"..
#     0070: C9 A5 FA C6 3C C1 F3 EA   0A EB 33 E0 FD 9E A7 A3  ....<.....3.....
#     0080: 48 79 89 75 8F 74 0E F6   B1 89 A1 33 2F 0F 86 16  Hy.u.t.....3/...
#     0090: D8 87 32 D0 6E 2C 1D DA   EC 44 DB 92 6A 61 DF FD  ..2.n,...D..ja..
#     00A0: 4E 91 33 7D 51 32 5A 44   82 DC 37 A3 36 74 50 31  N.3.Q2ZD..7.6tP1
#     00B0: DE C8 04 A1 0C 17 69 EE   46 C7 6F 74 3F 39 2B F0  ......i.F.ot?9+.
#     00C0: 1C D6 AE A2 C0 83 B4 D8   C2 EF 31 97 CD 4A F4 8E  ..........1..J..
#     00D0: B0 53 40 53 EF 38 04 55   09 6A 33 CB 9E 11 1F 98  .S@S.8.U.j3.....
#     00E0: BF 14 FF F4 DC D7 63 49   B2 0F BA 54 A4 8A 46 3B  ......cI...T..F;
#     00F0: FA 23 62 51 D9 0E C4 20   5C A9 44 47 1F FE EF 5C  .#bQ... \.DG...\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.337 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 E4 64 AF 17 E4 FB AC   F6 BB 03 8D D5 68 63 3D  ..d..........hc=
#     0010: E6 E1 D0 B4 14 D9 93 CC   56 E9 15 AE 9E 9C 2B F8  ........V.....+.
#     0020: 53 6C BC E3 99 F0 C0 5F   C4 57 90 8F D0 F3 44 03  Sl....._.W....D.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.338 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:27.340 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.340 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.340 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.342 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 38 C3 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:07.000 UTC",
#       "not  after"         : "2024-01-14 17:37:07.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#           0010: F2 D9 39 F5                                        ..9.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 65 FF C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:01.000 UTC",
#       "not  after"         : "2024-01-14 17:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.365 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 58 96 0F 92 95 60 C8 EB   7D 35 C7 CD 25 23 D6 12  X....`...5..%#..
#     0010: FB DD 07 6E BD 67 CA 4C   A1 46 40 E2 02 16 3F 7C  ...n.g.L.F@...?.
#     0020: 38 93 BE 83 CA D2 25 3B   79 F7 B1 B3 BA C7 44 B3  8.....%;y.....D.
#     0030: 31 9A 41 AF C9 39 1C E1   5C 02 9D 06 92 93 0D 03  1.A..9..\.......
#     0040: F0 07 03 9F 15 2E E8 A2   B4 00 BC 54 95 06 20 DB  ...........T.. .
#     0050: 3A 56 8A F2 7D E8 45 0D   C9 D3 23 C7 9D 5B AD D8  :V....E...#..[..
#     0060: 43 DC BC A1 31 CF F4 6A   BD 7C 98 89 7B 17 BC 25  C...1..j.......%
#     0070: D3 0C 9F 80 B5 EE A8 C0   66 56 2F CC C7 23 4A 0B  ........fV/..#J.
#     0080: 79 F8 CC 88 94 6C AB D1   02 7E 3D F2 DC 86 67 B8  y....l....=...g.
#     0090: 52 23 DD 0A D7 7E 6D E3   F8 15 D7 0D 2B EE 29 5F  R#....m.....+.)_
#     00A0: AF AF 91 02 0D D2 DC 8C   58 9E F4 08 DC 35 69 5E  ........X....5i^
#     00B0: E6 B3 22 AF 7F 26 6C BD   75 8E 25 E4 94 B2 BE 52  .."..&l.u.%....R
#     00C0: CF 6E B7 C5 95 72 45 5A   60 D1 D1 8B 3A 7B E7 17  .n...rEZ`...:...
#     00D0: 01 97 92 C5 2D 27 75 E8   55 29 66 E5 79 43 13 B0  ....-'u.U)f.yC..
#     00E0: 48 4D 58 08 79 90 E6 D4   81 AF 2A 1E ED CA E7 51  HMX.y.....*....Q
#     00F0: 30 14 29 15 34 89 DE 4D   9E A2 AE B2 8B 01 98 51  0.).4..M.......Q
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.366 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 A4 35 92 C7 49 AC 42   11 AA E1 D1 CD 41 DA 0B  ..5..I.B.....A..
#     0010: 13 C0 00 56 F7 75 3E 28   3D 07 4A 63 16 16 E2 C0  ...V.u>(=.Jc....
#     0020: 07 6C 08 5B 54 2F 59 B8   E7 6F A9 F1 FF E8 B8 AE  .l.[T/Y..o......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.366 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.428 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C2 34 6B FC 82 E0 20 01 8A B0 A1 98 E5 00 4F 88 7C 2B 1D 1A 7E F8 6C A5 EF 93 0B A8 C2 92 3E 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 17:37:27.737 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 17:37:27.737 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 17:37:27.738 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-16 17:37:41.582; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:41.945 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C 9A 1D 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:36:58.000 UTC",
#       "not  after"         : "2024-01-14 17:36:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 65 FF C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:01.000 UTC",
#       "not  after"         : "2024-01-14 17:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:41.959 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:42.117 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:42.119 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:42.119 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.124 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.135 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.137 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2F 31 9D A7 2B 4D 43 15 A1 36 65 75 C9 D5 D9 C6 17 6E 4F 4E 16 C0 7C 38 3D A7 E3 B5 30 0B 5D 05",
#     "session id"          : "4D 28 07 AE 2F 56 D8 39 5B 39 40 62 C4 06 F5 4D 98 E6 A3 23 38 0A A1 BC 84 E5 3F DF 87 88 80 53",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7F 25 D1 3F FC 20 80 BD   E2 0C 95 01 E5 A4 D2 82  .%.?. ..........
#

[...truncated too long message...]

 C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 16141ms
ok 75 stop command for single port in 17456ms
not ok 76 status detects locally running solr in 1557ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 8039ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1509ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3131ms
ok 80 copying files around in 6734ms
ok 81 upconfig in 2685ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1241ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1255ms
not ok 84 Cleanup in 2581ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 47s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/usxsvmypmhv7o

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8198 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8198/

All tests passed

Build Log:
[...truncated 1437 lines...]
BUILD FAILED in 1h 2m 55s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/wfo7odqimhdjk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8197 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8197/

All tests passed

Build Log:
[...truncated 1261 lines...]
# ERROR: Error from server at http://localhost:41733/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16985ms
ok 57 Check help command in 4862ms
ok 58 basic post with a type specified in 5817ms
ok 59 basic post WITHOUT a type specified in 12488ms
ok 60 crawling a directory in 5132ms
ok 61 crawling a web site in 5123ms
ok 62 commit and optimize and delete in 3855ms
ok 63 args mode in 6613ms
ok 64 stdin mode in 3406ms
ok 65 post solr log into solr via script in 10137ms
ok 66 post solr log into solr via cli in 7194ms
ok 67 allowPaths - backup in 17267ms
ok 68 start solr with ssl in 19272ms
not ok 69 use different hostname when not checking peer-name in 21728ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41733 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41733 (pid=681577). Happy searching!
#
#     INFO  - 2023-10-16 12:03:44.839; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:03:44.844; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 12:03:45.263; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 12:03:45.375; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 12:03:45.375; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 12:03:56.177; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 12:03:56.182; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 12:03:56.560; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41733/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 12:03:58.092; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:03:58.096; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41733/solr] to [https://127.0.0.1:41733].
# WARN  - 2023-10-16 12:03:58.971; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 12:03:59.042; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17513ms
ok 71 start solr with client truststore and security manager in 20098ms
not ok 72 start solr with mTLS needed in 53021ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-isVlFD/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41733 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41733 (pid=684325). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41734 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41734 (pid=684437). Happy searching!
#
#     INFO  - 2023-10-16 12:05:02.858; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:05:02.864; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 12:05:03.776; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:03.780; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:03.784; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:03.862 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 8E 23 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:48.000 UTC",
#     "not  after"         : "2024-01-14 12:04:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#         0010: 25 37 52 52                                        %7RR
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:03.872 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 95 6D 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:39.000 UTC",
#     "not  after"         : "2024-01-14 12:04:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:03.891 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:04.240 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.241 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:04.242 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:04.243 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.247 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.258 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.259 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.259 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.260 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "70 74 C3 80 4E F6 F9 8A 70 CC 27 6A 1B 04 3C E4 E6 54 32 14 17 31 5A 5F FA AD E5 45 92 C0 B6 DE",
#   "session id"          : "87 7B FE 9E 49 D1 83 E2 9B AC 34 AD F9 C1 65 03 67 83 1F 05 D1 B0 77 6E 24 E8 DF 87 C3 C8 68 1A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1A 01 2B D8 4C DA 89 99   E3 03 D3 8F 22 6E 0C 27  ..+.L......."n.'
#             0010: 76 9E AB FB 43 EA 25 ED   24 97 36 AB 7E 76 6B 31  v...C.%.$.6..vk1
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.525 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F9 2E 0B 39 53 EE B3 F4 85 31 8A 8D 3A 22 B6 BA DF E5 E5 DC 40 04 49 00 9C E6 58 12 F0 DB D7 68",
#   "session id"          : "87 7B FE 9E 49 D1 83 E2 9B AC 34 AD F9 C1 65 03 67 83 1F 05 D1 B0 77 6E 24 E8 DF 87 C3 C8 68 1A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0E F3 CF C3 C7 66 59 85   17 7B B7 4F 65 77 22 80  .....fY....Oew".
#           0010: D0 B7 59 5A FF DF FD EC   56 57 A5 91 5B 95 EA 39  ..YZ....VW..[..9
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.526 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.526 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.529 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.529 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.949 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.949 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.978 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.981 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.982 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.992 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.996 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.999 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.015 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.016 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.023 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 8A BD 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:44.000 UTC",
#       "not  after"         : "2024-01-14 12:04:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F4 BA 7B ED 3C 3A C7   77 F4 9D B4 33 65 C5 59  .....<:.w...3e.Y
#           0010: 88 98 1D 8D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.023 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.140 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.154 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 4A 72 A6 34 21 59 64   60 0E 5F 08 D1 73 BB 3E  `Jr.4!Yd`._..s.>
#     0010: BA 21 0A 0F B4 F9 5E 5B   93 D6 02 D1 68 45 AB 02  .!....^[....hE..
#     0020: D0 02 84 72 A5 56 73 E5   69 D8 90 E8 17 94 E3 16  ...r.Vs.i.......
#     0030: D7 97 7F BC 73 EB D8 20   C9 07 93 6A 49 52 84 D6  ....s.. ...jIR..
#     0040: 73 C2 CF C7 24 84 17 C3   34 C5 24 5E EC 73 1B 05  s...$...4.$^.s..
#     0050: 6B A4 35 FF AC 5D A9 27   17 89 AA 9B 57 F9 32 ED  k.5..].'....W.2.
#     0060: 2D A0 52 C2 D1 6B B0 77   B0 08 8A 74 FF B5 45 91  -.R..k.w...t..E.
#     0070: 7E DE 81 2F 5C 7D EA CD   4C 13 31 CC D5 EC 34 8A  .../\...L.1...4.
#     0080: 03 4B B1 5D 57 11 C4 8E   B5 1C 1E 63 9D FD A1 7C  .K.]W......c....
#     0090: 34 A0 49 F6 6F 6F FE 23   E1 65 08 EA B0 F2 DA 52  4.I.oo.#.e.....R
#     00A0: 01 B5 AC 63 4E 05 D8 2C   0C 32 80 AF 17 F7 75 B9  ...cN..,.2....u.
#     00B0: 5B 55 1D 78 B1 47 78 00   4E 1B D5 85 53 CD 6D 6E  [U.x.Gx.N...S.mn
#     00C0: D9 A1 FE 77 AB 38 C0 18   64 05 1C E4 A1 4D 0B 9D  ...w.8..d....M..
#     00D0: EC B5 D8 A3 4A AB 5D 7D   E6 ED 1A BC D0 65 D6 A4  ....J.]......e..
#     00E0: 32 F6 C7 C8 D2 23 D2 81   46 50 BF 37 AD BF CA E5  2....#..FP.7....
#     00F0: B1 A1 2F 9C C1 ED 8E B9   06 64 49 3F 11 0E B5 5F  ../......dI?..._
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.156 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF 97 B3 27 98 BB EF 78   8A 8C 13 37 A6 AE ED 0F  ...'...x...7....
#     0010: AF 5E 58 E2 48 57 D4 8E   2A F0 CA 2E 50 30 74 9C  .^X.HW..*...P0t.
#     0020: 04 D3 5F EA 6A 82 C6 31   E6 F2 9E 8A 1F 0E 6A F1  .._.j..1......j.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.160 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:05.161 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.161 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:05.161 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.163 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:05.163 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.163 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.164 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.166 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 8E 23 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:48.000 UTC",
#       "not  after"         : "2024-01-14 12:04:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#           0010: 25 37 52 52                                        %7RR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 65 D0 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:41.000 UTC",
#       "not  after"         : "2024-01-14 12:04:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.209 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F 38 9B CA 37 0F 90 A4   CE 7A AB D4 A7 B3 1E 53  .8..7....z.....S
#     0010: 5D 62 C5 A0 49 83 DE 0F   26 6E FC CE 6C 1D 99 20  ]b..I...&n..l..
#     0020: 4C AF 07 2E 2D 00 C6 76   98 05 A3 35 31 24 33 48  L...-..v...51$3H
#     0030: D7 50 22 B6 18 1F C1 0A   2F 2C BE D3 54 63 C4 BB  .P"...../,..Tc..
#     0040: AB 8A 78 22 61 97 76 F3   40 70 2A 25 D8 19 87 A8  ..x"a.v.@p*%....
#     0050: A4 FD 8B 4F EB 2A DB 84   AB 78 66 CC 45 01 70 3C  ...O.*...xf.E.p<
#     0060: 4B 60 86 30 1F 0C 5D 0B   0F 0A 9E A7 1E E9 F0 D2  K`.0..].........
#     0070: CA 69 1F 64 42 4E 79 F6   44 DD 8C 14 EE B5 D8 37  .i.dBNy.D......7
#     0080: A2 3A 71 8F 6D B0 70 9A   32 0C CC 6B E6 DB AA B1  .:q.m.p.2..k....
#     0090: 13 84 27 7B 58 79 3E AA   54 F9 44 22 2D A0 D2 9B  ..'.Xy>.T.D"-...
#     00A0: 08 AC 41 48 BA 04 82 29   85 75 3D 80 B8 B6 C6 61  ..AH...).u=....a
#     00B0: 14 51 07 58 A8 DD 45 09   51 EE 78 02 1B 4B 1C 55  .Q.X..E.Q.x..K.U
#     00C0: 6B B6 DC 4D 52 C4 1B 1E   07 81 1D 9C A9 B9 21 3C  k..MR.........!<
#     00D0: FE 8B 6E C0 95 C1 D9 1C   6D 77 A6 C6 EA 3C 2F ED  ..n.....mw...</.
#     00E0: AE E9 F6 EE CD 9D B3 4C   02 4C 80 F4 5F 0C F8 EC  .......L.L.._...
#     00F0: AD B3 DF EF 03 5E 38 A7   82 0C 65 AB 9E E5 E0 5C  .....^8...e....\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.210 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7A B4 75 11 FC 72 3A FB   B3 A2 6D 7D FA FC B0 4F  z.u..r:...m....O
#     0010: 09 4D 79 3E C8 B9 3C FE   A0 12 54 EF 4A 29 E4 FD  .My>..<...T.J)..
#     0020: AC A1 DB 89 A6 25 99 41   EA F5 E3 74 AC E2 7E 65  .....%.A...t...e
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.211 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.541 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.542 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.560 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "48 79 42 9D CF 8F 9C C0 C6 49 DC 29 6B 2E 1A BF 18 89 E4 D2 5D 5E AC 6B E4 86 43 93 6D F9 6B F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 12:05:05.892 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 12:05:05.893 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 12:05:07.283; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:05:07.288; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 12:05:07.673; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:07.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:07.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:07.708 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 8E 23 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:48.000 UTC",
#     "not  after"         : "2024-01-14 12:04:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#         0010: 25 37 52 52                                        %7RR
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:07.712 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 95 6D 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:39.000 UTC",
#     "not  after"         : "2024-01-14 12:04:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:07.725 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:07.917 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.917 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:07.920 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:07.920 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.926 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.937 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.939 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0E 00 6C 54 FA C0 79 E0 E2 02 BD 6B 87 29 85 EC 81 9D 63 FC AA 29 0E BB B3 1F F4 E8 F7 05 53 4A",
#   "session id"          : "85 A8 F4 A8 FE 59 6F EE 58 E1 18 24 66 35 E0 43 35 57 C7 F1 17 4C A3 54 44 15 14 15 D0 FC 37 94",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6D 7C C8 26 DF 0F C8 0A   52 1F FF 4E 2C 13 7B 25  m..&....R..N,..%
#             0010: 05 4D F2 2A A3 7A AC 19   B4 A5 5E AA FB E5 FB 22  .M.*.z....^...."
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.058 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8E 9B 19 73 CC 01 96 4C 58 08 03 3F F8 05 84 DC 13 5E DB AF 48 59 32 C5 D8 AE C1 83 85 A6 45 A3",
#   "session id"          : "85 A8 F4 A8 FE 59 6F EE 58 E1 18 24 66 35 E0 43 35 57 C7 F1 17 4C A3 54 44 15 14 15 D0 FC 37 94",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FE 24 3C 4A 8C D3 9C 68   4C DE CC 94 89 18 0A 3A  .$<J...hL......:
#           0010: 66 39 FA 1F BD 91 C2 33   57 91 26 9B 89 AC 96 74  f9.....3W.&....t
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.059 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.059 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.097 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.098 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.100 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.116 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.116 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.116 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.117 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.117 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.117 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.121 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.121 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.122 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.124 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.125 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.125 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.126 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.137 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 8A BD 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:44.000 UTC",
#       "not  after"         : "2024-01-14 12:04:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F4 BA 7B ED 3C 3A C7   77 F4 9D B4 33 65 C5 59  .....<:.w...3e.Y
#           0010: 88 98 1D 8D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.137 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.212 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.301 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 31 07 DC 30 37 B6 68   0F C6 E3 DC 77 6E AB 2E  .1..07.h....wn..
#     0010: 55 E1 38 C3 EC 31 B8 B9   F4 B9 4C F5 D1 4C A7 DB  U.8..1....L..L..
#     0020: A7 8F 1F DF B8 94 BA 1B   85 F8 18 23 F4 70 68 14  ...........#.ph.
#     0030: C8 B1 76 9D 68 5B 1D 82   BF 16 CA AB 12 BA 39 DF  ..v.h[........9.
#     0040: 02 01 48 A8 B3 2C 31 86   6F C2 6C 5F 9D FF 00 67  ..H..,1.o.l_...g
#     0050: 69 56 5B 45 A7 64 B6 53   15 7B 9C 47 ED 5F 86 22  iV[E.d.S...G._."
#     0060: C5 4A 2C CC 09 7B 2E C1   6B 64 CD 0A 3E 9F A9 6E  .J,.....kd..>..n
#     0070: 8D EE 9A 4D 51 88 A1 CF   1D 3B BB 18 69 F2 7D 45  ...MQ....;..i..E
#     0080: 95 4F 0F 55 50 97 7F 6D   AC 74 3B 43 E8 9A 82 C9  .O.UP..m.t;C....
#     0090: ED F4 20 AD 77 88 4A 66   BB 76 F8 40 CF AC 51 5B  .. .w.Jf.v.@..Q[
#     00A0: 39 7D 61 24 B3 EF 0C 51   4F 10 51 AD 3C E7 FF F0  9.a$...QO.Q.<...
#     00B0: 8E BC B4 81 48 C8 5E F2   AD 93 D6 77 E6 F7 2B 5A  ....H.^....w..+Z
#     00C0: 06 1C 10 28 DD AA C8 0F   79 8A D1 D5 1D D6 36 26  ...(....y.....6&
#     00D0: 93 BC 0C 46 E1 52 E7 6A   25 20 04 06 C9 1E 8F F2  ...F.R.j% ......
#     00E0: 46 36 A2 43 98 93 3F F3   95 18 F3 B8 DF 74 5B B6  F6.C..?......t[.
#     00F0: 38 05 96 C5 0F 38 7D 1C   AE E3 8A 4B 8F 1D BA 39  8....8.....K...9
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.303 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 3A E8 D4 E0 60 90 F9   D7 7E 26 37 12 33 52 9B  D:...`....&7.3R.
#     0010: 42 28 06 E8 FE DE 79 CC   DA 5C 32 79 82 27 0C AB  B(....y..\2y.'..
#     0020: 0B 71 27 41 70 33 76 44   37 C3 EC 1E 3B DA E6 4A  .q'Ap3vD7...;..J
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.305 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:08.305 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.309 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 8E 23 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:48.000 UTC",
#       "not  after"         : "2024-01-14 12:04:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#           0010: 25 37 52 52                                        %7RR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 65 D0 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:41.000 UTC",
#       "not  after"         : "2024-01-14 12:04:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.335 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7A 5F 74 21 10 53 E2 5A   CF 90 70 B2 F2 0A B8 A2  z_t!.S.Z..p.....
#     0010: 07 66 9D E5 B2 5D 36 9C   16 E0 13 69 50 25 FC 66  .f...]6....iP%.f
#     0020: 9D 6A 6A A3 63 94 DF 93   8F E5 33 8C E9 6D 81 52  .jj.c.....3..m.R
#     0030: 92 6B F3 F9 46 8F BD 8B   CE 67 38 15 C6 51 AF 46  .k..F....g8..Q.F
#     0040: C5 F5 4E 9D 22 8F DD 03   CD 83 BC BB FD EC 12 4D  ..N."..........M
#     0050: 5B ED BC 36 0F 51 AF 47   C1 48 51 45 14 33 84 2A  [..6.Q.G.HQE.3.*
#     0060: A7 8C EF 0C E2 54 E8 AF   09 89 71 19 56 9B 2B 97  .....T....q.V.+.
#     0070: 63 D7 63 74 15 84 61 4F   77 1C 29 08 1C 6D A7 E1  c.ct..aOw.)..m..
#     0080: F5 FD 5B 22 C0 E2 EE B2   3E 56 85 1F BA 71 C6 90  ..["....>V...q..
#     0090: 9F B9 1A 48 B2 31 00 28   F4 2A 61 1A E0 BD 4A 4D  ...H.1.(.*a...JM
#     00A0: 6B 4C E6 E2 F1 18 12 C9   5D E2 6F 3E 5E 31 A8 62  kL......].o>^1.b
#     00B0: DE 46 39 4C EC 2C 84 D9   28 F0 DF 53 D7 23 0A 5A  .F9L.,..(..S.#.Z
#     00C0: DB A9 A2 AD 85 A1 C0 50   09 10 C1 2E 57 FA DA 80  .......P....W...
#     00D0: C2 6A D0 02 56 BA C0 B1   80 43 46 F9 15 97 A6 46  .j..V....CF....F
#     00E0: 71 C0 2F B9 64 26 02 C3   18 C5 E9 3B 18 15 97 3A  q./.d&.....;...:
#     00F0: AA C0 44 D4 6D F9 8F E6   CA 5A D7 B1 99 B4 CA 14  ..D.m....Z......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.336 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 00 4D AA 26 0C 0F 2C   17 9B BC 30 C0 83 CD B8  9.M.&..,...0....
#     0010: 04 05 B1 F8 BF 8A E7 BA   43 DA 4C D0 29 BB 2B 34  ........C.L.).+4
#     0020: 93 9F BB E9 D8 F4 2C 82   B7 CF 9E 0D B8 93 90 09  ......,.........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.337 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.399 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FA 54 50 BB 5F F2 D6 F3 25 FC 8C E3 87 E3 26 82 00 F4 23 B5 27 45 EF 79 A7 95 5B 08 4F 01 FB 12",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.432 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.432 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.432 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.433 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-16 12:05:08.759 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 12:05:08.759 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 12:05:08.776 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-16 12:05:22.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:22.551 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 65 D0 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:41.000 UTC",
#       "not  after"         : "2024-01-14 12:04:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 95 6D 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:39.000 UTC",
#       "not  after"         : "2024-01-14 12:04:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:22.565 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:22.874 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.874 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:22.876 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:22.876 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.880 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.892 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.892 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.892 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.894 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "85 A5 A4 F9 DF 0C C8 F3 0F 62 0F 7A 08 E3 B1 87 D0 15 32 08 CE C0 53 4C AC 81 1C C2 7F EA 01 20",
#     "session id"          : "59 D4 DF F5 9D E1 1A FD 1A 6E BC 5E 70 21 C3 31 69 EF 07 5B 7D 79 B4 B8 BB 00 17 FB 7E 0F 7F 12",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 42 67 7A AB C8 27 A0 46   63 4F 01 30 EF ED C2 88  Bgz..'.FcO.0....
#               0010: 89 91 23 65 25 6B 23 EC   BF EB 3A 39 0F EF 8A 55  ..#e%k#...:9...U
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.913 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D6 52 95 85 F7 59 F9 80 1B 89 2E 4C 12 B7 B6 09 29 5B 3E 58 1A 9D 5C D4 E0 44 AA AD C1 DC 0D 6C",
#     "session id"          : "59 D4 DF F5 9D E1 1A FD 1A 6E BC 5E 70 21 C3 31 69 EF 07 5B 7D 79 B4 B8 BB 00 17 FB 7E 0F 7F 12",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A8 08 E2 04 40 61 8A 81   C9 88 75 29 8D DC 1C 74  ....@a....u)...t
#             0010: 76 3F 79 30 58 A9 A4 90   82 74 0D B5 F4 1E 70 13  v?y0X....t....p.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.913 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.914 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.924 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.925 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.927 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.930 UTC|EncryptedExtensions.java:171|Consuming EncryptedExte

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14715ms
ok 75 stop command for single port in 18295ms
not ok 76 status detects locally running solr in 1512ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7489ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1485ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3037ms
ok 80 copying files around in 6633ms
ok 81 upconfig in 2622ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1261ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1256ms
not ok 84 Cleanup in 2522ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 35s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nvwssesyqhwt6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8196 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8196/

All tests passed

Build Log:
[...truncated 1259 lines...]
# ERROR: Error from server at http://localhost:34487/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16102ms
ok 57 Check help command in 4617ms
ok 58 basic post with a type specified in 5772ms
ok 59 basic post WITHOUT a type specified in 11999ms
ok 60 crawling a directory in 4482ms
ok 61 crawling a web site in 4756ms
ok 62 commit and optimize and delete in 4021ms
ok 63 args mode in 6506ms
ok 64 stdin mode in 3553ms
ok 65 post solr log into solr via script in 10495ms
ok 66 post solr log into solr via cli in 7273ms
ok 67 allowPaths - backup in 16273ms
ok 68 start solr with ssl in 19650ms
not ok 69 use different hostname when not checking peer-name in 20992ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 34487 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34487 (pid=390055). Happy searching!
#
#     INFO  - 2023-10-16 09:44:51.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:44:51.339; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 09:44:51.769; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 09:44:51.868; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 09:44:51.868; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 09:45:02.146; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 09:45:02.152; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 09:45:02.542; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:34487/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 09:45:03.996; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:45:04.002; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:34487/solr] to [https://127.0.0.1:34487].
# WARN  - 2023-10-16 09:45:04.838; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 09:45:04.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17158ms
ok 71 start solr with client truststore and security manager in 19342ms
not ok 72 start solr with mTLS needed in 52667ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-KZkkCp/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34487 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34487 (pid=392773). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34488 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34488 (pid=392898). Happy searching!
#
#     INFO  - 2023-10-16 09:46:07.351; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:46:07.355; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 09:46:07.915; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:07.928; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:07.930; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:07.988 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 5E 40 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:53.000 UTC",
#     "not  after"         : "2024-01-14 09:45:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#         0010: 1F D1 7F A0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:07.992 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "39 3C 4D AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:44.000 UTC",
#     "not  after"         : "2024-01-14 09:45:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:08.015 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:08.733 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.733 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:08.737 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:08.737 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.745 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.758 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.758 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.758 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.760 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "58 1C 8A 86 96 4F 31 51 49 A7 23 AB E2 74 6B AB 54 06 93 F7 4E 92 25 C9 43 11 DD 41 F0 01 F9 76",
#   "session id"          : "63 AA 6E 91 53 32 61 63 E7 21 C7 7C FB 37 AF A0 E1 58 28 A4 CF C1 5F 09 D5 85 64 80 9A 54 59 A9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 60 4D 3A D2 BE 40 6F A6   0E 1A 77 AA 50 E2 6D 2A  `M:..@o...w.P.m*
#             0010: 9B D0 B4 83 20 00 DB 89   1A A8 31 2D A6 84 D9 3C  .... .....1-...<
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.919 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "42 59 42 DF 63 61 92 C6 34 B9 06 8C E3 B2 B7 3A 35 0A 40 F9 ED 65 5E 0E 0F 13 16 22 1E 0F 7A BF",
#   "session id"          : "63 AA 6E 91 53 32 61 63 E7 21 C7 7C FB 37 AF A0 E1 58 28 A4 CF C1 5F 09 D5 85 64 80 9A 54 59 A9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 42 23 63 1A D0 71 D7 0D   78 89 C2 70 F9 B9 1C 1E  B#c..q..x..p....
#           0010: 87 4B 70 55 3B A0 41 62   28 BE 57 00 DA 03 99 52  .KpU;.Ab(.W....R
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.919 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.920 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.935 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.967 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.969 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.975 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.989 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.990 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.990 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.994 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.995 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.998 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.998 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.999 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.002 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.003 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.006 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.006 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.008 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 BC 41 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:48.000 UTC",
#       "not  after"         : "2024-01-14 09:45:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 6B 78 00 DB 70 07 AC   C5 24 7F BB 0E 71 D3 55  .kx..p...$...q.U
#           0010: 43 DE 2D 9E                                        C.-.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.009 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.153 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.365 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 8B DC 7A 93 4D FB 5F   2B 37 A1 BA 34 D9 58 1C  ...z.M._+7..4.X.
#     0010: F2 43 1C 99 C9 73 FA FD   8D 4F E6 BE 8D 79 7B E9  .C...s...O...y..
#     0020: F7 F2 5B 0E 1A 46 15 BF   5E 48 8A 82 46 C9 3C 67  ..[..F..^H..F.<g
#     0030: FA 3A A4 24 A7 00 50 24   C5 FA 24 C6 08 A5 78 6E  .:.$..P$..$...xn
#     0040: 78 07 8C E4 EC 00 7F 8B   55 05 2A 4E 83 56 D4 9E  x.......U.*N.V..
#     0050: 9A 60 FD A7 BC D1 76 6B   8C 27 E7 8E 1F 0F 18 25  .`....vk.'.....%
#     0060: 60 0B 29 2D EA AC BE 42   5B E4 EE D0 68 DA B8 5B  `.)-...B[...h..[
#     0070: 98 BD 5E 02 5E B7 5E 58   11 0D 80 BD 65 13 E5 94  ..^.^.^X....e...
#     0080: A5 84 DA 36 EB E6 47 BE   6E 79 85 85 C6 BE 3A 09  ...6..G.ny....:.
#     0090: 66 30 CA 92 4D DA F4 BD   F1 A0 A7 EB C5 9D 51 19  f0..M.........Q.
#     00A0: 19 88 90 19 2B 0C B9 37   4B F6 6E 73 A9 64 CC D5  ....+..7K.ns.d..
#     00B0: B0 43 B1 12 04 AE 8D A6   7B 5C C0 0F B7 9C 2F 07  .C.......\..../.
#     00C0: C8 47 A7 F4 CD BA F6 20   E2 8D F2 18 2D F1 0C D7  .G..... ....-...
#     00D0: F9 61 B6 89 B6 2F 45 DE   C5 E4 50 07 38 3A E2 E8  .a.../E...P.8:..
#     00E0: 67 67 5B 44 56 CB BE AE   DA 1F 17 22 CA 62 CA BF  gg[DV......".b..
#     00F0: 4F 7E 19 61 36 1F 1D 8D   AF AC 7A D6 34 0F 73 D2  O..a6.....z.4.s.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.367 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E7 55 68 6D 80 60 FB A9   D6 12 47 F3 AE A2 00 DA  .Uhm.`....G.....
#     0010: 2E 29 6F E9 BA AE 65 97   39 A5 CB 4F 1A 4C DE BE  .)o...e.9..O.L..
#     0020: BF F2 AF 5B 80 E5 1B 9D   D6 36 77 63 86 BE BA 74  ...[.....6wc...t
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.394 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.396 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.396 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.410 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 5E 40 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:53.000 UTC",
#       "not  after"         : "2024-01-14 09:45:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#           0010: 1F D1 7F A0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 E0 D7 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:46.000 UTC",
#       "not  after"         : "2024-01-14 09:45:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.443 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 24 7B 34 CB 85 54 08 EA   98 32 23 61 AA B7 15 70  $.4..T...2#a...p
#     0010: 23 E1 0B 2C 6C 60 6F 27   36 88 95 88 D3 12 40 28  #..,l`o'6.....@(
#     0020: 40 5D 32 A0 C7 C5 1B 12   92 EB 42 30 7C 94 F0 B8  @]2.......B0....
#     0030: 5D 4B A9 30 18 42 77 A8   3C 71 82 4F E1 EB CA BC  ]K.0.Bw.<q.O....
#     0040: A3 8F B2 02 76 C7 09 3F   8F 4E 95 45 A6 6F 81 95  ....v..?.N.E.o..
#     0050: 3D 17 AC A0 B9 A7 26 C3   66 00 B9 C8 E7 C2 E6 25  =.....&.f......%
#     0060: D0 2B 4D 04 F0 51 67 C4   3C 54 83 F7 27 7E F1 FB  .+M..Qg.<T..'...
#     0070: 7A B8 52 60 64 BA CA 58   42 55 76 E7 0A 8E 5B 1B  z.R`d..XBUv...[.
#     0080: 03 10 C1 42 BD 7E B8 FF   F6 3A F4 72 9C DC 7A B5  ...B.....:.r..z.
#     0090: AA E8 B1 E9 8C 42 A5 D7   6E 93 B1 49 44 2A 97 16  .....B..n..ID*..
#     00A0: 51 65 7E 70 12 B1 C6 3A   CF 90 E3 D4 DD DC 38 76  Qe.p...:......8v
#     00B0: E8 A0 A6 1C AD 61 09 BD   31 E8 20 40 FA DA 26 BF  .....a..1. @..&.
#     00C0: 9E 23 60 9A 7F C0 47 0A   03 DB 1B 0D B8 33 39 A6  .#`...G......39.
#     00D0: C7 01 D3 54 C8 6B 16 92   66 71 F2 15 28 FF F5 C9  ...T.k..fq..(...
#     00E0: 92 97 8F 16 DF 4E 8D 43   46 BA 24 77 C1 0C BB 10  .....N.CF.$w....
#     00F0: C6 46 81 BF 47 8F DD 83   B4 36 5F 74 2C 17 BA CA  .F..G....6_t,...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.447 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B B9 E8 97 C5 E5 B6 70   62 E6 9F 27 FA A9 69 6D  .......pb..'..im
#     0010: BE EC 81 E6 01 A2 A4 F0   E7 3A EE 9D 50 A9 7A 0C  .........:..P.z.
#     0020: 1C 6C 3C EA DD C6 CD 7D   A0 47 D0 61 80 D6 9F D8  .l<......G.a....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.450 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 09:46:09.515 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BB 7A 99 EE FD 03 8C 01 A4 55 C5 72 B9 A5 9B 32 08 43 E8 79 8E E6 E5 9B 7E B0 0F E8 9F FE 66 F7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 09:46:10.170 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 09:46:10.170 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 09:46:10.171 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 09:46:11.671; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:46:11.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 09:46:12.090; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:12.092; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:12.092; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:12.125 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 5E 40 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:53.000 UTC",
#     "not  after"         : "2024-01-14 09:45:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#         0010: 1F D1 7F A0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:12.128 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "39 3C 4D AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:44.000 UTC",
#     "not  after"         : "2024-01-14 09:45:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:12.141 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:12.303 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.304 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:12.305 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:12.306 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.311 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.323 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.324 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.327 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 1D DA 3D 50 05 B6 4C FF BB 03 7A C0 13 C5 B0 F3 E8 EF 62 B7 4F BB 06 FE 7B 02 0B 1C 78 38 DC",
#   "session id"          : "D2 41 8E A0 80 8F AC F8 73 3F CE FF 68 30 CC 3B 4A FA D8 5C 07 F4 68 FF A1 1D 58 66 2E D3 AC A4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FC 61 07 C8 90 1E 03 52   11 2E E3 8C A1 0B 76 2D  .a.....R......v-
#             0010: 85 5A 02 1C D1 57 BA 3B   DB 42 52 7D 48 E0 49 17  .Z...W.;.BR.H.I.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.444 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2D B7 F0 9F D8 C4 70 51 0D EF 1F EF 9B 8A 32 1E 18 60 72 9F 98 B9 9E A2 3D 21 85 24 BB 3A FC 36",
#   "session id"          : "D2 41 8E A0 80 8F AC F8 73 3F CE FF 68 30 CC 3B 4A FA D8 5C 07 F4 68 FF A1 1D 58 66 2E D3 AC A4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 19 56 16 1F 25 21 0A BA   AA 7D 57 CB AE 9F 4B 7C  .V..%!....W...K.
#           0010: 78 65 C2 7D 1F A0 F5 0D   5B 57 34 84 92 43 A0 51  xe......[W4..C.Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.444 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.445 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.456 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.458 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.470 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.475 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.476 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.479 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.481 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.481 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.481 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.484 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.484 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.485 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.485 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.486 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.486 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.486 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.489 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 BC 41 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:48.000 UTC",
#       "not  after"         : "2024-01-14 09:45:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 6B 78 00 DB 70 07 AC   C5 24 7F BB 0E 71 D3 55  .kx..p...$...q.U
#           0010: 43 DE 2D 9E                                        C.-.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.490 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.951 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.954 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E E2 D5 E3 15 ED 3C 40   A7 8A 68 E2 29 13 BB 7D  n.....<@..h.)...
#     0010: 43 C5 C1 96 4F F2 DE CD   D2 E7 39 C7 8A 81 83 4A  C...O.....9....J
#     0020: 0A 41 E5 65 84 77 76 42   4D 53 94 F2 D9 B4 80 01  .A.e.wvBMS......
#     0030: 57 63 EC D4 AF DA 25 B2   39 FD A3 95 90 AF F5 BE  Wc....%.9.......
#     0040: 9E E3 27 CD 27 48 63 01   FD AB 3F 4D BF 09 B0 C3  ..'.'Hc...?M....
#     0050: 13 73 F7 14 26 19 06 49   24 DA C4 35 ED 67 06 05  .s..&..I$..5.g..
#     0060: B2 3F 9C 88 0C 71 F3 4B   23 B7 A2 CE D5 7F A2 5E  .?...q.K#......^
#     0070: 8C 2C 76 F3 FB 44 04 45   4B 9E 48 DB AA 30 7E 52  .,v..D.EK.H..0.R
#     0080: 56 6F F1 12 76 CD DC 9C   87 AF 40 7D 73 84 67 12  Vo..v.....@.s.g.
#     0090: FF 85 30 12 2E 22 2E D3   0D 93 2A A4 68 0C 6B 54  ..0.."....*.h.kT
#     00A0: CE 57 18 70 40 AF E6 A6   0E 9C 70 D5 4A F7 6C 11  .W.p@.....p.J.l.
#     00B0: F8 A3 07 A2 4B 7D 5A 0B   91 70 B9 AC 5B 53 41 4E  ....K.Z..p..[SAN
#     00C0: 8B D4 B4 2B 8E 57 54 51   34 7F C9 45 91 98 5E 52  ...+.WTQ4..E..^R
#     00D0: 4A FE 46 7E E4 10 1F F8   3D 1A DA 46 34 7B EE 0E  J.F.....=..F4...
#     00E0: 98 D2 0D D6 A1 4D 33 2F   35 61 CD 2E 40 89 D0 AE  .....M3/5a..@...
#     00F0: 0B 0A BE 3A F8 6E 91 E7   89 24 CC DC FD 9F BB FC  ...:.n...$......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.956 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 00 B8 14 07 88 50 88 52   07 0D AD 72 15 E1 B6 1D  .....P.R...r....
#     0010: 93 4E 90 8A F5 1C 38 C2   79 8A 1F 09 C6 5C 4E C6  .N....8.y....\N.
#     0020: 0C 5E F4 EF 33 CA C4 93   32 FA A8 9A 85 AF C4 FA  .^..3...2.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.958 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:12.959 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.959 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:12.959 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.962 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 5E 40 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:53.000 UTC",
#       "not  after"         : "2024-01-14 09:45:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#           0010: 1F D1 7F A0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 E0 D7 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:46.000 UTC",
#       "not  after"         : "2024-01-14 09:45:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.986 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 24 F4 DE 3C 7E 58 A1   CC E2 96 76 C1 CF 24 C6  .$..<.X....v..$.
#     0010: B4 E4 FA B5 80 9C 0F 2C   01 1B B9 7D 4B 19 0D 9B  .......,....K...
#     0020: 22 E1 59 4F A2 1C F0 A4   7C 7C CC 3C 8B DB EC AC  ".YO.......<....
#     0030: 6B 26 16 F1 6E 6E 15 70   17 FA 43 3D FC DE CA E8  k&..nn.p..C=....
#     0040: D8 EE 6F 1C 95 21 4C D1   E2 9C F9 A3 A3 C4 41 C0  ..o..!L.......A.
#     0050: 39 93 F3 F8 99 D6 22 17   5F 14 3E B9 93 04 DF D9  9....."._.>.....
#     0060: 70 01 64 CD 54 A8 80 3E   6F F4 92 C4 7B 0D A9 65  p.d.T..>o......e
#     0070: EA 09 33 5C F5 72 7D 32   CB C1 00 FA A4 7F 43 1E  ..3\.r.2......C.
#     0080: 15 C1 82 95 60 F2 1A 73   22 50 07 03 87 64 18 20  ....`..s"P...d.
#     0090: 40 36 3F 93 F7 2B 5E 5B   D3 6F 37 BF 3A 54 3D 26  @6?..+^[.o7.:T=&
#     00A0: 5A 88 30 EB A3 FC 11 F8   F1 A1 69 D8 30 DD FF F8  Z.0.......i.0...
#     00B0: 89 49 E2 6E 75 48 4F 12   8A B4 63 1B 25 85 1F FA  .I.nuHO...c.%...
#     00C0: B0 13 E0 7E 49 63 F5 41   8B 1E 8D A9 1F ED AD F9  ....Ic.A........
#     00D0: 70 32 66 55 A2 ED A3 61   C0 F6 1D C7 3E 88 4A 47  p2fU...a....>.JG
#     00E0: 93 71 33 C2 80 B0 A0 A0   08 AB 64 B5 E6 50 F6 2E  .q3.......d..P..
#     00F0: 26 2D 36 DE 06 0B 52 E8   78 B2 6D 91 50 A4 AB 6E  &-6...R.x.m.P..n
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.987 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 25 BB 89 BA 8D A6 37   D9 10 F3 F0 01 65 F1 83  .%.....7.....e..
#     0010: 87 D5 52 FE 93 5D 3E ED   EF 80 B4 32 9B 74 EB 67  ..R..]>....2.t.g
#     0020: 18 C0 46 4D 1D 4F 1D E4   2E 9A 8E EC 5A CC 4F BA  ..FM.O......Z.O.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.988 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:13.038 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5D 77 66 A0 AC 74 1B 98 F6 16 93 72 83 CC 92 8D 93 74 1F 62 1F 99 0C DE 24 4C 3B 22 B8 E8 2F 6E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-16 09:46:13.324 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 09:46:13.325 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-16 09:46:26.547; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:26.901 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 3C 4D AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:44.000 UTC",
#       "not  after"         : "2024-01-14 09:45:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 E0 D7 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:46.000 UTC",
#       "not  after"         : "2024-01-14 09:45:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:26.914 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:27.171 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.171 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:27.173 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:27.173 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.178 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.189 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.189 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.190 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.192 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5F 00 27 38 C5 B3 0F 81 07 8A FA 69 0E 24 5F 28 83 F3 FB A7 2A F0 45 CE 10 3A 88 50 BB 3A 45 D1",
#     "session id"          : "DC 78 7A 9B D7 C2 62 C1 F4 21 E5 A1 28 AA 69 D6 CD 8F 01 D9 33 3D 37 53 A0 7F F2 B8 8D 8A DF F6",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C8 91 CB CD FD 0A F4 C0   A2 2D D9 8D C8 17 E9 D0  .........-......
#               0010: 3E FD 0F CB 5E C8 BD 0D   23 5F 3F B0 82 06 0C 33  >...^...#_?....3
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.213 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B9 BC CE 83 C9 44 C5 69 3C 13 1C 66 CA 62 43 4F E5 5C 03 7F 7D 4D C3 5F B6 42 6A 5E D2 25 03 C1",
#     "session id"          : "DC 78 7A 9B D7 C2 62 C1 F4 21 E5 A1 28 AA 69 D6 CD 8F 01 D9 33 3D 37 53 A0 7F F2 B8 8D 8A DF F6",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E9 9F EA 82 5E CC E1 7B   C0 01 B3 F2 B8 4F 20 5E  ....^........O ^
#             0010: 31 42 D1 C6 05 FA C8 95   B7 3C F2 F9 53 FD FA 65  1B.......<..S..e
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.224 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.225 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.226 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.230 UTC|EncryptedExtensions.java:171|Consuming EncryptedExt

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14636ms
ok 75 stop command for single port in 17550ms
not ok 76 status detects locally running solr in 1511ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7566ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1536ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3002ms
ok 80 copying files around in 6623ms
ok 81 upconfig in 2661ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1246ms
not ok 84 Cleanup in 2549ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/flcgwlt2u5zds

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8195 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8195/

All tests passed

Build Log:
[...truncated 1402 lines...]
BUILD FAILED in 1h 4m 47s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ykpprkiiticvc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8194 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8194/

2 tests failed.
FAILED:  org.apache.solr.search.TestFiltering.testRandomFiltering

Error Message:
java.lang.AssertionError: FAILURE: indexSize=31 iiter=9 qiter=399 request=[q, {! cache=false cost=171 tag=t}val_i:[00029 TO 00036] OR val_i:{00028 TO 00037}, fq, {!}id:RAND-1622624827 OR val_i:{00023 TO 00036], facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}*:* AND val_s:{00007 TO 00028]]

Stack Trace:
java.lang.AssertionError: FAILURE: indexSize=31 iiter=9 qiter=399 request=[q, {! cache=false cost=171 tag=t}val_i:[00029 TO 00036] OR val_i:{00028 TO 00037}, fq, {!}id:RAND-1622624827 OR val_i:{00023 TO 00036], facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}*:* AND val_s:{00007 TO 00028]]
	at __randomizedtesting.SeedInfo.seed([D7849F65C4DCE3AC:C8E73CA021FBA3A5]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.search.TestFiltering.testRandomFiltering(TestFiltering.java:576)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.search.TestThinCache.testSimple

Error Message:
java.lang.AssertionError: expected:<0> but was:<1>

Stack Trace:
java.lang.AssertionError: expected:<0> but was:<1>
	at __randomizedtesting.SeedInfo.seed([D7849F65C4DCE3AC:EF37BB9BE32F377D]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.search.TestThinCache.testSimple(TestThinCache.java:139)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:54)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 7389 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestThinCache.testSimple (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestThinCache.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestThinCache.testSimple" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D7849F65C4DCE3AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.search.TestFiltering.testRandomFiltering (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestFiltering.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestFiltering.testRandomFiltering" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D7849F65C4DCE3AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vm5ptxsjjicpe

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8193 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8193/

All tests passed

Build Log:
[...truncated 1440 lines...]
BUILD FAILED in 1h 2m 48s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/a5t3kvfm4n5re

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8192 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8192/

All tests passed

Build Log:
[...truncated 1441 lines...]
BUILD FAILED in 1h 3m 20s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/45fhywnx6fxms

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8191 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8191/

All tests passed

Build Log:
[...truncated 1439 lines...]
BUILD FAILED in 1h 3m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/pwubd6mqnauym

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8190 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8190/

All tests passed

Build Log:
[...truncated 1256 lines...]
# ERROR: Error from server at http://localhost:39985/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16096ms
ok 57 Check help command in 4362ms
ok 58 basic post with a type specified in 5535ms
ok 59 basic post WITHOUT a type specified in 11415ms
ok 60 crawling a directory in 4354ms
ok 61 crawling a web site in 4553ms
ok 62 commit and optimize and delete in 3619ms
ok 63 args mode in 6413ms
ok 64 stdin mode in 3229ms
ok 65 post solr log into solr via script in 9706ms
ok 66 post solr log into solr via cli in 6973ms
ok 67 allowPaths - backup in 16324ms
ok 68 start solr with ssl in 18820ms
not ok 69 use different hostname when not checking peer-name in 19749ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 39985 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39985 (pid=2345672). Happy searching!
#
#     INFO  - 2023-10-15 14:26:31.014; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:31.055; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:26:31.573; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 14:26:31.686; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 14:26:31.687; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-15 14:26:41.329; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 14:26:41.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-15 14:26:41.707; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:39985/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-15 14:26:43.061; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:43.065; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10828ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 39985 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39985 (pid=2346470). Happy searching!
#
#     INFO  - 2023-10-15 14:26:51.003; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:51.008; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-15 14:26:54.151; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:54.166; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 18395ms
not ok 72 start solr with mTLS needed in 50129ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wuG4KD/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 39985 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39985 (pid=2348270). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 39986 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39986 (pid=2348381). Happy searching!
#
#     INFO  - 2023-10-15 14:27:38.343; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:27:38.356; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:27:39.193; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:39.195; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:39.197; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:39.253 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 15 EE 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:24.000 UTC",
#     "not  after"         : "2024-01-13 14:27:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#         0010: 86 EE 29 B6                                        ..).
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:39.265 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 95 58 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:15.000 UTC",
#     "not  after"         : "2024-01-13 14:27:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:39.289 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:39.983 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:39.983 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:39.989 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:39.989 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:39.999 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.022 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.023 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.027 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.033 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F2 37 42 3E 6A AA E1 D6 97 34 93 6B E4 81 0C 8C A3 03 CB DD D8 6A 9B 2C 9A 68 95 CF EA 6A BD FC",
#   "session id"          : "EB A8 1A CB 57 67 54 07 ED 3E 68 76 F4 7C 7D 47 CF 99 5D 40 9C 2E E7 A9 74 97 CB 4D 7C 2B 8F 09",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 CC F8 19 B0 9C F8 25   B7 CC 3A D5 15 6E 9F 72  .......%..:..n.r
#             0010: 47 A6 46 76 E5 BA DE E5   2B 6C 10 7F E5 87 7A 28  G.Fv....+l....z(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.194 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BC BD 8C 83 D9 A2 24 11 44 B8 51 EF 7D 0C 39 D8 8B BE 5E 6A E2 7E 68 08 80 D9 79 B7 0B 57 BE C5",
#   "session id"          : "EB A8 1A CB 57 67 54 07 ED 3E 68 76 F4 7C 7D 47 CF 99 5D 40 9C 2E E7 A9 74 97 CB 4D 7C 2B 8F 09",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 66 16 82 4E 70 FE DF   B4 F3 FC 9F 83 DB EC D0  .f..Np..........
#           0010: 3C EB 11 E0 73 0C 98 B3   F0 21 76 98 1D 8C 49 66  <...s....!v...If
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.194 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.195 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.196 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.197 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.197 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.306 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.308 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.315 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.323 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.337 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.338 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.338 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.338 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.339 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.340 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.342 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 25 23 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:20.000 UTC",
#       "not  after"         : "2024-01-13 14:27:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B0 6B 78 37 50 F2 62 63   94 33 4F AF 6E 1C 1D B4  .kx7P.bc.3O.n...
#           0010: CF 24 8A 45                                        .$.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.345 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.576 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.577 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.577 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.577 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.606 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.609 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7B F1 0C 26 31 C9 09 D3   A5 58 39 67 43 68 33 77  ...&1....X9gCh3w
#     0010: 7E 0E 4E C8 B5 17 52 20   83 10 37 32 37 A4 D1 89  ..N...R ..727...
#     0020: 88 D6 9D 25 F3 BA E7 F1   4F F8 B1 DA 88 1F 0E F7  ...%....O.......
#     0030: 66 67 82 87 EF 45 C6 9D   61 D8 36 A2 36 CD 1E DB  fg...E..a.6.6...
#     0040: D0 CA 67 59 3A CA C5 61   9F B3 17 8A 8A F6 EF 3D  ..gY:..a.......=
#     0050: 87 3F 2D E3 39 6C BA D8   34 65 CF C0 57 54 43 36  .?-.9l..4e..WTC6
#     0060: B9 4C 0E 21 8D E9 11 28   6A 71 95 0A F0 12 79 88  .L.!...(jq....y.
#     0070: B8 8F BA F0 30 77 52 91   07 71 E6 DC 82 3C 35 5C  ....0wR..q...<5\
#     0080: B8 4D 29 BD 61 F1 4B 77   06 C0 06 16 39 75 F5 05  .M).a.Kw....9u..
#     0090: DA 83 F0 EA 88 3C B4 1C   83 27 C0 3B C0 E5 3A 7E  .....<...'.;..:.
#     00A0: 7F 0F 76 1C EF D0 31 5B   57 A7 39 A7 54 0E 4D 18  ..v...1[W.9.T.M.
#     00B0: 2A B4 4F 76 67 64 AC 95   B1 80 27 8F A6 D7 A0 85  *.Ovgd....'.....
#     00C0: 9A F2 A5 A9 78 E4 46 F0   F9 E0 59 09 23 85 DC 2A  ....x.F...Y.#..*
#     00D0: EB D0 DE A8 2C 97 62 C9   E6 DD 84 3F 20 61 D2 54  ....,.b....? a.T
#     00E0: 6A 94 96 26 4D 87 F0 49   BA A9 F1 8D 40 9E BB DB  j..&M..I....@...
#     00F0: 74 B4 90 3E E9 E2 83 AE   6B F3 92 14 E9 86 C0 F7  t..>....k.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.611 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BE 42 B4 DF 14 5B A1 77   D6 8B C2 28 73 ED 01 68  .B...[.w...(s..h
#     0010: 24 36 4A 1F FD F3 BA D1   60 05 BB 40 E2 46 6E AD  $6J.....`..@.Fn.
#     0020: 13 36 D2 48 C3 83 CD BA   00 C4 D2 92 82 8A 1C 77  .6.H...........w
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:40.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.614 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.619 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 15 EE 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:24.000 UTC",
#       "not  after"         : "2024-01-13 14:27:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#           0010: 86 EE 29 B6                                        ..).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 DA D0 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:17.000 UTC",
#       "not  after"         : "2024-01-13 14:27:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.658 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8F D2 23 0C 37 88 49 77   CE 69 14 D4 F0 99 92 1E  ..#.7.Iw.i......
#     0010: E4 BB 75 5E 6F 20 B7 10   34 D1 9F 96 0E 71 9A 72  ..u^o ..4....q.r
#     0020: 54 17 29 D9 5B A0 30 D6   CC 9A C4 33 42 5E 14 A0  T.).[.0....3B^..
#     0030: 59 48 6A 68 DA 6F DE 72   99 89 6E D9 64 09 AC 95  YHjh.o.r..n.d...
#     0040: 7F EF C9 A7 56 9B 5F 42   CC D6 6A 17 3E 08 AB 68  ....V._B..j.>..h
#     0050: 41 72 8D 3A 57 E3 76 AF   96 EB B8 4C 68 7D 32 50  Ar.:W.v....Lh.2P
#     0060: 27 22 4F ED 56 47 C8 1F   97 80 5F 35 17 2F A3 BC  '"O.VG...._5./..
#     0070: 2C 8A 95 10 9F 85 22 D6   F7 15 9D C4 63 83 7D 5B  ,.....".....c..[
#     0080: 55 36 3B B7 D0 CD 30 00   04 13 4E 5E 7F CF A1 D9  U6;...0...N^....
#     0090: D6 44 35 E6 48 BA 16 6D   04 7E 69 01 30 2F F7 38  .D5.H..m..i.0/.8
#     00A0: 85 A7 B8 9C 3C 68 49 04   72 CB 7F 8C FC 74 47 6E  ....<hI.r....tGn
#     00B0: 6A B1 F2 3B FF 8A 4E 0F   46 B1 8D AF 98 AB F5 92  j..;..N.F.......
#     00C0: 49 8B C5 67 E5 4A 8F 3C   82 60 3A 4F 90 63 5C 4E  I..g.J.<.`:O.c\N
#     00D0: 40 3B CB 33 DF 39 4C 2A   F4 68 0D 0F D6 3D F3 01  @;.3.9L*.h...=..
#     00E0: AA F5 96 D2 3C 46 75 12   22 21 89 94 90 2B 8E B8  ....<Fu."!...+..
#     00F0: DF 83 36 FB DB C0 4C F9   0B FA D1 DE 87 38 42 0F  ..6...L......8B.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.660 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BD 41 3C 03 87 30 28 18   2D 74 45 5E B2 AB 8F 52  .A<..0(.-tE^...R
#     0010: 82 3A EA E5 DD ED 8D 64   B2 7C 00 79 A3 7F 7B 15  .:.....d...y....
#     0020: AE 72 B7 F6 75 E1 8C A5   D1 2B 31 8C 2F 3B F1 BD  .r..u....+1./;..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.664 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.744 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 74 AD 53 82 9B D6 A9 3F 00 B4 F5 6E 84 10 1A CA CE 2D AE 9D B8 AC 80 BC A9 1D 8A B3 00 05 AD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 14:27:41.124 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 14:27:41.125 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 14:27:42.145; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:27:42.149; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:27:42.486; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:42.488; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:42.489; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:42.536 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 15 EE 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:24.000 UTC",
#     "not  after"         : "2024-01-13 14:27:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#         0010: 86 EE 29 B6                                        ..).
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:42.539 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 95 58 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:15.000 UTC",
#     "not  after"         : "2024-01-13 14:27:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:42.660 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:42.804 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.804 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:42.806 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:42.806 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.823 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.825 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "34 5A AD 21 8B 14 F3 85 C1 08 98 2A BC 60 D2 DA FD C9 15 A2 10 08 F0 8F BE CE 86 73 F9 AC 15 B9",
#   "session id"          : "3C 66 48 D6 AB 9E F3 79 0E 78 C7 A7 B8 57 8F 6D AC 95 05 63 5E B9 77 BB 0F 1D 94 38 AD 52 B0 AA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CB F4 8A 7F E6 A2 1C B6   26 00 F5 CE 97 DF 1C 82  ........&.......
#             0010: 22 6F CD F4 AC D0 5F 28   7C 45 58 3E 17 6E 25 46  "o...._(.EX>.n%F
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.921 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "72 BF 14 26 96 6C EE 95 49 DE 13 F5 FF 42 A9 5B 92 8E 58 8C B4 28 DD 78 9C 5D 4B E0 4A 2B 6B 43",
#   "session id"          : "3C 66 48 D6 AB 9E F3 79 0E 78 C7 A7 B8 57 8F 6D AC 95 05 63 5E B9 77 BB 0F 1D 94 38 AD 52 B0 AA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 68 3D 89 2A 28 B4 5D F2   A6 71 20 CF 59 4C 36 AE  h=.*(.]..q .YL6.
#           0010: EF 33 07 C1 B2 2F CB AE   52 22 97 2B C6 67 48 59  .3.../..R".+.gHY
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.922 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.922 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.948 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.949 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.951 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.956 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.956 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.956 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.957 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.957 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.958 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.958 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.960 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 25 23 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:20.000 UTC",
#       "not  after"         : "2024-01-13 14:27:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B0 6B 78 37 50 F2 62 63   94 33 4F AF 6E 1C 1D B4  .kx7P.bc.3O.n...
#           0010: CF 24 8A 45                                        .$.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.960 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.020 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.023 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B 9C 02 F0 86 10 6D B0   C5 E0 09 B5 73 09 31 48  ;.....m.....s.1H
#     0010: 00 14 0E B3 66 62 8B CE   82 6E 82 69 51 6E 1A E1  ....fb...n.iQn..
#     0020: 45 F5 D1 C1 AD 34 FF E4   12 E5 15 D2 2E CE 2D 0F  E....4........-.
#     0030: 1B E3 DF 84 AA 16 9D 99   65 D8 DE B3 6E 06 3F A1  ........e...n.?.
#     0040: 2A FE 19 73 26 55 CA 54   DF D5 25 7E 25 20 96 A5  *..s&U.T..%.% ..
#     0050: AD AF 37 33 6C E9 93 06   4D 5A 98 86 8A EE 7F 99  ..73l...MZ......
#     0060: E1 B2 77 8C 2E 4F 8C 82   16 C8 4D 32 77 EF D1 DF  ..w..O....M2w...
#     0070: A6 40 60 A4 1D 4F 12 D9   1E F3 44 EF D8 1A F0 D7  .@`..O....D.....
#     0080: AE FB 06 19 ED 7C 5C 2B   57 B2 27 8C FE 85 B1 00  ......\+W.'.....
#     0090: 15 04 0F 0D E3 A4 D8 2B   87 FA 1D 7F 3A 67 D4 80  .......+....:g..
#     00A0: 95 EC 26 48 62 2A 27 4B   DD 87 0D 22 E7 3C 3C B7  ..&Hb*'K...".<<.
#     00B0: 54 E1 77 49 6E 98 E4 7F   33 C2 8B 93 79 07 B4 BB  T.wIn...3...y...
#     00C0: 8E 3D 88 68 FE 33 1B 6E   68 B3 59 7D 4C A1 EE B7  .=.h.3.nh.Y.L...
#     00D0: AE E7 EE F1 9A A3 DE 24   E7 51 EA 68 BC F6 9E BE  .......$.Q.h....
#     00E0: EB F8 B5 B4 1C 40 11 3C   F7 99 05 62 97 C9 4D C8  .....@.<...b..M.
#     00F0: 41 C6 5A 0F D6 6E 84 BE   66 8E 79 C4 D0 C6 F3 EB  A.Z..n..f.y.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.025 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF 09 F7 04 99 7C 25 2D   B0 41 2A DF E3 B0 42 0D  ......%-.A*...B.
#     0010: E5 AE F1 80 61 87 72 85   78 41 53 57 9B 28 83 13  ....a.r.xASW.(..
#     0020: 31 6B 8E AF DB B5 D8 0E   79 4B EF D2 0E F6 EF 32  1k......yK.....2
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.027 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:43.027 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:43.027 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.029 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.030 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 15 EE 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:24.000 UTC",
#       "not  after"         : "2024-01-13 14:27:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#           0010: 86 EE 29 B6                                        ..).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 DA D0 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:17.000 UTC",
#       "not  after"         : "2024-01-13 14:27:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.134 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BF A4 0A 34 AE 4D DA E9   A8 AC 66 26 AF F1 9B 25  ...4.M....f&...%
#     0010: 60 F8 9A 50 41 F9 75 70   3C E6 2D D8 2B 5E 78 7C  `..PA.up<.-.+^x.
#     0020: 09 8F D0 E4 1E 6A B8 71   E8 F8 C7 0A C5 32 E8 05  .....j.q.....2..
#     0030: E1 D1 0E B2 A8 FD C6 D2   F2 75 0E 62 CF 35 BA 68  .........u.b.5.h
#     0040: BD 02 61 70 87 DD 5C 9D   EF 69 61 1F D0 07 7A 19  ..ap..\..ia...z.
#     0050: FF 7B 67 AA 0F 3D 49 66   A2 1A 90 4C 04 01 15 9E  ..g..=If...L....
#     0060: 7F B2 B0 AD F6 CD 64 1C   2A 2F D8 16 F9 B7 42 BD  ......d.*/....B.
#     0070: 5C F5 0F 8D A9 68 2D 0D   FA 17 EA 3E 6A AD 27 88  \....h-....>j.'.
#     0080: 03 64 08 37 B7 F3 4A 43   76 7B CC 1B FE FA F7 24  .d.7..JCv......$
#     0090: 6F 90 BD 68 7D 16 68 F7   36 F1 28 45 5D B9 10 D7  o..h..h.6.(E]...
#     00A0: 6F C7 1D 85 62 72 1D 1D   16 D7 DB 7D DA 9D 6F 5A  o...br........oZ
#     00B0: B6 57 38 E6 EC A8 58 90   61 00 73 59 DB 5A 44 64  .W8...X.a.sY.ZDd
#     00C0: 60 00 53 7E 8B 48 06 6C   BA 89 06 74 78 35 AD 9A  `.S..H.l...tx5..
#     00D0: A3 56 E9 7A 55 3B 93 5E   98 97 9A CB DC 97 52 FE  .V.zU;.^......R.
#     00E0: 29 82 13 00 EE 75 1F 60   EE 24 56 16 74 6D F9 67  )....u.`.$V.tm.g
#     00F0: 3E 93 18 64 E5 6B 4E A5   97 A2 C7 14 CF 9D F2 0E  >..d.kN.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.135 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 64 A9 20 F0 C8 E0 46 1E   97 13 85 D9 BE F3 A6 AC  d. ...F.........
#     0010: 79 D1 25 16 61 85 FD 9C   6B 87 70 8B 53 87 5F 25  y.%.a...k.p.S._%
#     0020: D1 D4 F2 4A EB 22 15 98   C0 F4 D6 78 41 C0 61 C5  ...J.".....xA.a.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.136 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.183 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "21 2F 12 7B A0 05 EF A0 8C 04 57 B0 B8 EC E7 F6 EE 03 0D 48 97 B1 50 05 BA 30 43 5A 3F E1 EA 5C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 14:27:43.440 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 14:27:43.441 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.468 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.469 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.469 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.469 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-15 14:27:56.842; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:57.407 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 DA D0 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:17.000 UTC",
#       "not  after"         : "2024-01-13 14:27:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 95 58 66",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:15.000 UTC",
#       "not  after"         : "2024-01-13 14:27:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:57.420 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:57.565 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.565 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:57.566 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:57.567 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.571 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.581 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.582 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.582 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.583 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C6 F2 22 91 5C 45 1B 39 85 7D C8 93 2F 9C 5D D5 94 0B B5 42 71 D1 C2 47 CF 20 BC 2D 83 42 81 A3",
#     "session id"          : "A5 55 A0 F7 56 BD 7F B5 5F 5A C4 42 2B E4 CC E1 BA 40 94 91 1F DF 71 9F 04 A3 0F AD F2 48 28 ED",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 68 24 35 42 C8 54 F3 C3   10 21 33 C8 97 09 5B 41  h$5B.T...!3...[A
#               0010: 1A DF AD B0 67 95 5E BC   B9 48 10 96 B4 2E 28 46  ....g.^..H....(F
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2s

[...truncated too long message...]

t Inc, C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 14197ms
ok 75 stop command for single port in 17969ms
not ok 76 status detects locally running solr in 1491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7405ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1445ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3073ms
ok 80 copying files around in 7137ms
ok 81 upconfig in 2523ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1219ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
not ok 84 Cleanup in 2447ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jchvtmn3wakos

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8189 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8189/

All tests passed

Build Log:
[...truncated 1440 lines...]
BUILD FAILED in 1h 2m 38s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/o4vgply5l6g3k

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8188 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8188/

All tests passed

Build Log:
[...truncated 1439 lines...]
BUILD FAILED in 1h 4m 16s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/bvx73na4ntrn4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8187 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8187/

All tests passed

Build Log:
[...truncated 1399 lines...]
BUILD FAILED in 1h 4m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nw7bv57nesmm4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8186 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8186/

All tests passed

Build Log:
[...truncated 1478 lines...]
BUILD FAILED in 1h 4m 12s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/rq7ofympkmrgg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8185 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8185/

All tests passed

Build Log:
[...truncated 1259 lines...]
# ERROR: Error from server at http://localhost:42205/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 15905ms
ok 57 Check help command in 4168ms
ok 58 basic post with a type specified in 5762ms
ok 59 basic post WITHOUT a type specified in 11544ms
ok 60 crawling a directory in 4228ms
ok 61 crawling a web site in 4545ms
ok 62 commit and optimize and delete in 3655ms
ok 63 args mode in 6189ms
ok 64 stdin mode in 3383ms
ok 65 post solr log into solr via script in 10121ms
ok 66 post solr log into solr via cli in 8005ms
ok 67 allowPaths - backup in 16023ms
ok 68 start solr with ssl in 17785ms
not ok 69 use different hostname when not checking peer-name in 20265ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 42205 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42205 (pid=1089656). Happy searching!
#
#     INFO  - 2023-10-15 00:33:45.878; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:33:45.883; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 00:33:46.325; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 00:33:46.413; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 00:33:46.413; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-15 00:33:56.121; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 00:33:56.125; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-15 00:33:56.518; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:42205/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-15 00:33:57.875; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:33:57.880; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10473ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 42205 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42205 (pid=1090444). Happy searching!
#
#     INFO  - 2023-10-15 00:34:06.467; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:34:06.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-15 00:34:08.963; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:34:08.967; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 18574ms
not ok 72 start solr with mTLS needed in 50577ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-zdYxbO/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 42205 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42205 (pid=1092211). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42206 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 42206 (pid=1092320). Happy searching!
#
#     INFO  - 2023-10-15 00:34:52.873; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:34:52.876; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 00:34:53.626; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 00:34:53.628; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 00:34:53.628; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(ca,h=[localhost],a=[],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:34:53.685 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 41 8C C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:39.000 UTC",
#     "not  after"         : "2024-01-13 24:34:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 67 84 9F BB 44 B8 09   AF 82 4E 8C 80 87 A8 C9  .g...D....N.....
#         0010: A2 3A 7D A5                                        .:..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C EF F6 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:32.000 UTC",
#     "not  after"         : "2024-01-13 24:34:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:34:53.699 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C EF F6 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:32.000 UTC",
#     "not  after"         : "2024-01-13 24:34:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 29 B6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:31.000 UTC",
#     "not  after"         : "2024-01-13 24:34:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:34:53.740 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:34:54.482 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:54.483 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:34:54.484 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:34:54.484 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:54.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:54.524 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:54.525 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:54.525 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:54.527 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D6 90 2E 53 AC 86 71 F7 B3 56 9B 27 B9 68 42 87 A6 35 3D C3 5A 16 99 BD B9 F7 24 88 E0 1E EC 90",
#   "session id"          : "AC 57 6C C2 3D AB E6 26 36 61 4E D5 6D 27 6B CA 06 1F 08 94 30 AD 3E F2 EC 2B 17 DE 44 27 C0 80",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B9 24 3C 79 12 9D 77 84   75 EA 6A EB 54 B7 E4 F4  .$<y..w.u.j.T...
#             0010: 7E 2E 5B 4F E0 E1 DC 8A   51 0A 3D D6 6A 2F 54 23  ..[O....Q.=.j/T#
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.720 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "02 F5 86 46 83 90 E5 A4 30 C7 30 82 EC B6 C1 60 E6 21 16 34 51 23 CA CA 4A 34 29 50 57 25 D4 34",
#   "session id"          : "AC 57 6C C2 3D AB E6 26 36 61 4E D5 6D 27 6B CA 06 1F 08 94 30 AD 3E F2 EC 2B 17 DE 44 27 C0 80",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 21 A2 99 ED 19 0D 02 A8   D0 9F 0C 6E 2C 4E E2 F3  !..........n,N..
#           0010: 4D DA 16 1C B2 65 1B 9F   44 EA 5B 1A 83 8E 77 10  M....e..D.[...w.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.721 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.721 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.727 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.727 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.727 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.727 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.727 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.728 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.731 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.733 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.738 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.739 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:54.741 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:54.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.745 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:54.776 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.177 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.178 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.181 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.181 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.182 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.182 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.182 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:55.182 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:55.182 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.183 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.183 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.184 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.184 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.184 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.189 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:55.189 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.192 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 97 65 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:35.000 UTC",
#       "not  after"         : "2024-01-13 24:34:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#           0010: 43 1C 23 6B                                        C.#k
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B BD CC E3 F9 20 EC C6   57 F8 F2 2A 80 90 2A 86  +.... ..W..*..*.
#           0010: FA 2B EC FC                                        .+..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.192 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.294 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C EF F6 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:32.000 UTC",
#     "not  after"         : "2024-01-13 24:34:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.313 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 07 03 EB D1 2A 7A F2 B4   DC 25 CA 8C C1 B5 B8 B7  ....*z...%......
#     0010: 65 21 3D 1E 5A 92 EB EB   38 94 64 93 B7 94 93 09  e!=.Z...8.d.....
#     0020: DF 0E CD 05 C0 C0 18 17   30 36 20 73 7D 92 C9 A6  ........06 s....
#     0030: 3E A3 16 E7 59 08 B0 9D   B5 6C AB FF 3B B7 8E 99  >...Y....l..;...
#     0040: 4F 50 DA 6E 98 F6 52 9C   4A 46 AD 56 82 18 B3 C7  OP.n..R.JF.V....
#     0050: 36 CE EA 17 C6 A3 B2 B1   4C 46 E0 06 42 BC 18 59  6.......LF..B..Y
#     0060: CA 0B A0 5F EE 4B 21 55   20 7E 35 0E 3B BF 97 94  ..._.K!U .5.;...
#     0070: 5B 8A B7 F9 D9 FC 39 B3   4A 21 6D 4D CF E6 37 61  [.....9.J!mM..7a
#     0080: 12 12 25 AE 62 B7 92 59   DE 64 EB 7F 62 C9 71 A2  ..%.b..Y.d..b.q.
#     0090: 82 05 9F 4B 31 D6 3F D1   41 BC 26 37 8B 81 77 66  ...K1.?.A.&7..wf
#     00A0: 64 3E 13 5A DA DD 33 11   6A AD 99 37 18 8C 07 62  d>.Z..3.j..7...b
#     00B0: 3F D0 51 08 15 4E 79 8E   3C E7 41 6C 2C 99 68 AD  ?.Q..Ny.<.Al,.h.
#     00C0: 94 42 36 CD 9A E8 AE 61   8F 9C 7F BE 4C BA 01 1F  .B6....a....L...
#     00D0: 6A CC 1D B1 7C 8A C5 19   A0 9C C0 7C FC B0 4A 4C  j.............JL
#     00E0: F1 49 FB B0 5B 3B 00 0E   DF 21 E5 39 FB 9A 20 30  .I..[;...!.9.. 0
#     00F0: E8 25 EF 98 9C 95 03 A4   60 B6 A4 7A D8 C0 B8 A7  .%......`..z....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.315 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2B 87 5C BC FF B0 E2 45   F2 3B 82 37 F8 F9 62 C5  +.\....E.;.7..b.
#     0010: D1 58 32 0F 3E 7F 0E 32   DF CD 39 EE 9C 43 A6 F5  .X2.>..2..9..C..
#     0020: DA 7F 34 B3 5F DB 98 B9   49 E9 9E 3C 89 5D F0 3C  ..4._...I..<.].<
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.318 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 24:34:55.319 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:55.320 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 24:34:55.320 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:55.320 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 24:34:55.320 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:55.320 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.320 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.330 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 41 8C C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:39.000 UTC",
#       "not  after"         : "2024-01-13 24:34:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#           0010: 43 1C 23 6B                                        C.#k
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 67 84 9F BB 44 B8 09   AF 82 4E 8C 80 87 A8 C9  .g...D....N.....
#           0010: A2 3A 7D A5                                        .:..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C EF F6 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:32.000 UTC",
#       "not  after"         : "2024-01-13 24:34:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#           0010: 18 51 9E 46                                        .Q.F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#           0010: 43 1C 23 6B                                        C.#k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.392 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0A 7F 4D D3 81 5F 9F DE   11 87 78 55 D8 87 27 04  ..M.._....xU..'.
#     0010: DC B4 17 E0 46 79 E5 00   54 71 58 DD 09 D2 03 3F  ....Fy..TqX....?
#     0020: 7C 80 F1 A1 C5 E4 3B E2   11 CC 87 85 49 78 5F 97  ......;.....Ix_.
#     0030: DE 5B 82 8A AB 72 0D 97   68 6A 80 80 1F E7 AA 75  .[...r..hj.....u
#     0040: 1D 57 04 2B 09 1D DD 46   56 17 F2 1D 63 97 A2 59  .W.+...FV...c..Y
#     0050: 16 D1 AB CD 51 6E 98 3B   BE 07 87 3B 3B 75 0A B1  ....Qn.;...;;u..
#     0060: EA 06 5A 1A F0 93 C9 C2   08 D3 66 FC 0F 8D 18 38  ..Z.......f....8
#     0070: 57 31 CA C9 81 E2 D4 BF   CE DA F3 1E E6 3F FD 1B  W1...........?..
#     0080: 55 A7 97 89 FC 5C 12 5B   E3 D1 D8 B6 CB 51 10 D7  U....\.[.....Q..
#     0090: 54 7D 07 B2 84 42 CC 4D   C6 81 75 D0 42 87 87 B2  T....B.M..u.B...
#     00A0: 9D B7 9A 40 6C 8A 69 D2   B7 F5 E9 AB 61 25 A4 FF  ...@l.i.....a%..
#     00B0: 98 D7 01 9D E5 EF D5 81   90 8A F4 42 2D 66 E1 B0  ...........B-f..
#     00C0: 0E C7 18 8D A8 AC 3F A8   0E 66 93 A5 D8 BE 3C D7  ......?..f....<.
#     00D0: 5D 7E 83 A0 2A 81 40 2E   AF B7 E9 6F E1 5F ED 8A  ]...*.@....o._..
#     00E0: 96 76 A9 59 D9 9F 86 46   81 B5 EC 2F 45 E4 D7 0B  .v.Y...F.../E...
#     00F0: 3C 68 A5 2E 12 C0 7C 99   D9 CF E8 D4 CF 93 23 D1  <h............#.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.404 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3D 7B FB 2B CC C9 37 B2   85 8B C2 31 9B B8 1E 6A  =..+..7....1...j
#     0010: 83 7C 78 6D FD D7 4D 2F   28 0C AD CA 9C 90 58 30  ..xm..M/(.....X0
#     0020: F2 84 EC 71 8E B5 A6 11   9C 98 3F DB E7 6E 18 16  ...q......?..n..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.409 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:55.502 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "27 9B A9 EE 11 D6 8A 2D 7A 69 69 EE 4B B5 A0 FB 60 74 FB DF 43 B4 D2 EB 57 0F 09 84 41 64 07 0B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 24:34:56.298 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 24:34:56.298 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 24:34:56.298 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 24:34:56.298 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-15 24:34:56.355 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 24:34:56.356 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 00:34:57.311; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 00:34:57.316; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 00:34:57.657; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 00:34:57.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 00:34:57.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zdYxbO/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:34:57.693 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A 41 8C C0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:39.000 UTC",
#     "not  after"         : "2024-01-13 24:34:39.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B6 67 84 9F BB 44 B8 09   AF 82 4E 8C 80 87 A8 C9  .g...D....N.....
#         0010: A2 3A 7D A5                                        .:..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C EF F6 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:32.000 UTC",
#     "not  after"         : "2024-01-13 24:34:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:34:57.697 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C EF F6 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:32.000 UTC",
#     "not  after"         : "2024-01-13 24:34:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 29 B6 E2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:31.000 UTC",
#     "not  after"         : "2024-01-13 24:34:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 24:34:57.708 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:34:57.856 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:57.856 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:34:57.857 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:34:57.857 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:57.862 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:57.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:57.872 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:57.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:34:57.874 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "01 78 CA 3C 3E DA A8 4E 8D FF 41 5B C3 77 40 93 DD F3 12 7E 5A AB 84 DE 39 74 90 EE 4C 7F 74 2D",
#   "session id"          : "43 7B E3 25 EF 5F 48 13 30 9C 03 2A 15 BA DF F9 2A 63 C9 E5 BE 2A 60 31 9C DA C5 4F 10 9B BD C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9E 4B C1 95 3D AE 78 A2   06 91 B3 B0 A5 01 45 67  .K..=.x.......Eg
#             0010: C9 7C AE 9A E4 BC EC 89   BF 48 55 4F 57 59 86 20  .........HUOWY.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.985 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "41 E7 30 C8 77 E7 9D B9 6E 55 33 A8 8A AF 80 5C 08 0A AB 60 E2 0C B8 94 D9 73 DB 4E EA 2B A1 45",
#   "session id"          : "43 7B E3 25 EF 5F 48 13 30 9C 03 2A 15 BA DF F9 2A 63 C9 E5 BE 2A 60 31 9C DA C5 4F 10 9B BD C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 6D 74 2F C2 F1 8E 81 B0   06 75 58 F9 36 82 16 97  mt/......uX.6...
#           0010: 27 85 C0 FC 99 5E 10 BE   67 24 8A E4 10 58 A7 78  '....^..g$...X.x
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.985 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.985 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.987 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:57.995 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.001 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.001 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.001 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.002 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.005 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.016 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.019 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.020 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.023 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.023 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.023 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.023 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.024 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.024 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.024 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.024 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.025 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.025 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.025 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.026 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.026 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.027 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.027 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.029 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 97 65 8E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:35.000 UTC",
#       "not  after"         : "2024-01-13 24:34:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#           0010: 43 1C 23 6B                                        C.#k
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B BD CC E3 F9 20 EC C6   57 F8 F2 2A 80 90 2A 86  +.... ..W..*..*.
#           0010: FA 2B EC FC                                        .+..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.032 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.084 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6C EF F6 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 24:34:32.000 UTC",
#     "not  after"         : "2024-01-13 24:34:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#         0010: 18 51 9E 46                                        .Q.F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#         0010: 43 1C 23 6B                                        C.#k
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.086 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 38 5A 36 17 BD C6 0C   4B E5 87 C9 66 61 2E DA  .8Z6....K...fa..
#     0010: 65 9B 91 7D FD 94 F4 EA   53 94 82 5C D9 F4 CE 64  e.......S..\...d
#     0020: 3F ED 1C 3C 98 67 0E C9   92 7D 24 3F B3 47 DD E6  ?..<.g....$?.G..
#     0030: 00 46 3A CB 97 B4 77 B5   A3 9C 2B 8F C1 47 EE 1C  .F:...w...+..G..
#     0040: D1 3B 6F 8B 70 3F 5A D3   21 B5 42 44 8E 57 24 05  .;o.p?Z.!.BD.W$.
#     0050: 67 D4 BE 9F 8E 31 3C 42   96 EF 98 00 36 CD 4C 2C  g....1<B....6.L,
#     0060: 81 32 33 76 86 39 5D 79   A2 B5 97 BB 6C 36 4B FC  .23v.9]y....l6K.
#     0070: A2 B3 4B 31 25 BC 7C EC   62 E3 E2 34 FA 67 F9 E7  ..K1%...b..4.g..
#     0080: 7E 77 5B 33 C2 88 A9 96   68 8A 6E B5 B3 70 97 96  .w[3....h.n..p..
#     0090: B2 74 45 83 C4 26 A4 94   C1 FD 5F 20 4F 96 D5 A0  .tE..&...._ O...
#     00A0: 78 27 A6 D0 83 40 50 39   DF E9 B9 47 32 D6 15 50  x'...@P9...G2..P
#     00B0: 64 8A BE CA BB 10 0E F7   10 F7 B0 9C 6D B3 82 6A  d...........m..j
#     00C0: 43 79 03 81 53 14 4C 2B   76 DD 1A 3F 2D B6 66 BF  Cy..S.L+v..?-.f.
#     00D0: BD 40 D0 4C 2D 7D 65 28   AC A4 86 79 4B 85 44 90  .@.L-.e(...yK.D.
#     00E0: 81 24 EB 04 D4 42 A6 18   37 3D BA 32 A9 05 61 3A  .$...B..7=.2..a:
#     00F0: 0C C4 4F 1D 6C AB 5A 13   E2 55 62 3C BE E5 4D 12  ..O.l.Z..Ub<..M.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.088 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B6 84 76 DC 8B B6 BA EB   8D 35 FC B0 49 70 88 51  ..v......5..Ip.Q
#     0010: 2D 30 30 41 0F 6F 2C DE   2F 40 66 3A FE 34 2F 32  -00A.o,./@f:.4/2
#     0020: DA 3D A1 99 75 C7 3A 5A   8B 3D D8 1C C1 3B 1F B1  .=..u.:Z.=...;..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.089 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 24:34:58.090 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.090 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 24:34:58.090 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 24:34:58.091 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 24:34:58.091 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.091 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.093 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A 41 8C C0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:39.000 UTC",
#       "not  after"         : "2024-01-13 24:34:39.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#           0010: 43 1C 23 6B                                        C.#k
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B6 67 84 9F BB 44 B8 09   AF 82 4E 8C 80 87 A8 C9  .g...D....N.....
#           0010: A2 3A 7D A5                                        .:..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C EF F6 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:32.000 UTC",
#       "not  after"         : "2024-01-13 24:34:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#           0010: 18 51 9E 46                                        .Q.F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#           0010: 43 1C 23 6B                                        C.#k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.386 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 6F 30 1C 89 2A 03 86   53 C3 16 E8 8A 72 06 11  3o0..*..S....r..
#     0010: DE 23 85 54 3B FC 0D 91   AB D8 8F 17 A1 6F 9A AA  .#.T;........o..
#     0020: E7 9C 0A D1 AC 46 C4 68   E3 2F 77 AD 78 56 1F C9  .....F.h./w.xV..
#     0030: 5C 1D C7 BC E0 65 4E 5E   38 9D F2 C9 33 0C 14 C1  \....eN^8...3...
#     0040: 8E 03 25 84 2B 7E 53 B7   72 AF 72 13 5D B6 53 57  ..%.+.S.r.r.].SW
#     0050: 25 56 30 C6 EE 76 91 BD   F0 F3 D4 CB 45 EA 80 EE  %V0..v......E...
#     0060: 7B 3F D2 90 A0 F1 E5 6C   0B AF 7C 58 BF 32 23 65  .?.....l...X.2#e
#     0070: 86 64 53 1D 3D 6A 8B 02   A6 82 5F 98 D2 16 88 53  .dS.=j...._....S
#     0080: 77 63 AA 59 03 6D 40 A9   AF 0E 61 C9 A6 7E 47 F0  wc.Y.m@...a...G.
#     0090: 41 06 6D 4D 70 C2 B5 CA   9E A2 1A 65 43 94 0D EC  A.mMp......eC...
#     00A0: EB 3D D7 1F 17 C9 C4 78   B9 B7 C4 0F DE C6 B7 2B  .=.....x.......+
#     00B0: 4A 89 79 B7 99 26 FC ED   65 0B FC 36 78 67 17 C5  J.y..&..e..6xg..
#     00C0: CB 0A BC CC D3 32 E4 7E   55 1D 80 70 C4 94 C1 19  .....2..U..p....
#     00D0: 58 D1 38 A1 9A 47 D9 02   41 7C 81 7D 15 FF BA A4  X.8..G..A.......
#     00E0: A7 63 3E 09 4F E7 16 BA   39 DE D2 7F 11 80 0F 93  .c>.O...9.......
#     00F0: 4B 8B CA DF 1E 5C 40 44   22 8C 57 7A CB F9 42 1A  K....\@D".Wz..B.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.388 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 01 A4 96 11 A6 D9 00 7F   1B 04 6F 02 E6 89 30 D3  ..........o...0.
#     0010: 4C D9 30 64 5C 2F 8F 6E   29 5C 35 AF DE B9 2C 5E  L.0d\/.n)\5...,^
#     0020: 34 AD 79 34 3B 4F 95 52   8D 46 68 87 1F F2 96 DE  4.y4;O.R.Fh.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.388 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:34:58.441 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FC A4 2C F2 B6 DC 29 F0 46 F4 71 28 FE 71 1B 28 99 95 44 02 1D 67 8F EB C4 82 C4 4F 18 F3 16 F8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 24:34:58.726 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 24:34:58.727 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-15 00:35:12.020; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 24:35:12.340 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C EF F6 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:32.000 UTC",
#       "not  after"         : "2024-01-13 24:34:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#           0010: 18 51 9E 46                                        .Q.F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E AA 65 8E B8 DC 7A CF   EC 5C CA 17 91 71 11 71  >.e...z..\...q.q
#           0010: 43 1C 23 6B                                        C.#k
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 29 B6 E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 24:34:31.000 UTC",
#       "not  after"         : "2024-01-13 24:34:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7A A7 EC A5 B6 C3 1D EA   07 9A 13 9E 5D D3 CC 27  z...........]..'
#           0010: 18 51 9E 46                                        .Q.F
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 24:35:12.353 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:35:12.502 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:35:12.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:35:12.503 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 24:35:12.503 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:35:12.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:35:12.517 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:35:12.517 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:35:12.517 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 24:35:12.519 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "A1 03 0A 58 F2 51 4E 97 A3 57 01 4B 26 37 E7 CF 88 C9 25 74 73 DD BE 14 B4 01 82 5A 23 E0 4A 57",
#     "session id"          : "32 42 AF 1F A9 70 C0 36 AB 94 B7 85 34 A9 09 92 7E CE 57 35 77 1A 7D 16 FE 46 69 19 0E D4 9D 1C",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 79 51 D4 9D 90 E0 F0 4D   B2 35 D8 C1 DF FD 23 45  yQ.....M.5....#E
#               0010: E9 51 1A DA A5 96 3D B8   F9 94 ED 37 4A 78 9D 49  .Q....=....7Jx.I
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 24:35:12.538 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "40 DA 13 1F 89 94 2D 9E 97 B7 2E B8 3B 4C 4F D5 CB 95 71 B0 97 80 3F 87 C1 AF 5B 3B BA A1 E7 50",
#     "session id"          : "32 42 AF 1F A9 70 C0 36 AB 94 B7 85 34 A9 09 92 7E CE 57 35 77 1A 7D 16 FE 46 69 19 0E D4 9D 1C",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(

[...truncated too long message...]

rt Inc, C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 15071ms
ok 75 stop command for single port in 16377ms
not ok 76 status detects locally running solr in 1482ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7142ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1440ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2726ms
ok 80 copying files around in 6359ms
ok 81 upconfig in 2740ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1231ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
not ok 84 Cleanup in 2409ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 4s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jgmfq4tthwbaq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8184 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8184/

All tests passed

Build Log:
[...truncated 1260 lines...]
# ERROR: Error from server at http://localhost:34149/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16323ms
ok 57 Check help command in 4750ms
ok 58 basic post with a type specified in 6041ms
ok 59 basic post WITHOUT a type specified in 12190ms
ok 60 crawling a directory in 4533ms
ok 61 crawling a web site in 5251ms
ok 62 commit and optimize and delete in 4554ms
ok 63 args mode in 7196ms
ok 64 stdin mode in 3540ms
ok 65 post solr log into solr via script in 10018ms
ok 66 post solr log into solr via cli in 7386ms
ok 67 allowPaths - backup in 17300ms
ok 68 start solr with ssl in 19076ms
not ok 69 use different hostname when not checking peer-name in 20751ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 34149 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34149 (pid=790761). Happy searching!
#
#     INFO  - 2023-10-14 22:11:28.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:11:28.378; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:11:28.786; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 22:11:28.864; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-14 22:11:28.866; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-14 22:11:38.899; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-14 22:11:38.904; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-14 22:11:39.339; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:34149/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-14 22:11:40.742; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:11:40.748; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:34149/solr] to [https://127.0.0.1:34149].
# WARN  - 2023-10-14 22:11:41.636; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 22:11:41.674; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17347ms
ok 71 start solr with client truststore and security manager in 19799ms
not ok 72 start solr with mTLS needed in 55998ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-V92m0e/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34149 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34149 (pid=793541). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34150 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 34150 (pid=793652). Happy searching!
#
#     INFO  - 2023-10-14 22:12:44.860; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:12:44.870; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:12:46.195; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1536602f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:12:46.197; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:12:46.198; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(ca,h=[localhost],a=[],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:12:46.249 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 2B 14 86",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:30.000 UTC",
#     "not  after"         : "2024-01-12 22:12:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F C5 2A 00 38 CC 0D EE   6A 2B 46 5F FB 9E 59 28  _.*.8...j+F_..Y(
#         0010: 5A 41 84 62                                        ZA.b
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A E7 FD CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:24.000 UTC",
#     "not  after"         : "2024-01-12 22:12:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:12:46.264 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A E7 FD CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:24.000 UTC",
#     "not  after"         : "2024-01-12 22:12:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D D1 18 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:21.000 UTC",
#     "not  after"         : "2024-01-12 22:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:12:46.285 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:12:46.547 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:46.547 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:12:46.551 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:12:46.551 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:46.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:46.580 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:46.580 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:46.580 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:46.586 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C7 D3 7A A2 1B 1B 18 C1 7A 8B 9F CA D6 36 39 FB D4 AF 5F 96 2A 6C C6 43 A0 76 7B 83 D3 E1 42 18",
#   "session id"          : "3B 40 BF A1 65 09 56 DF A7 FB 92 C7 07 26 35 D5 FB F8 7D 97 49 36 DA 79 01 2F 63 20 49 F9 40 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 10 50 EA 21 DA 65 CD 3E   0E F2 D9 A3 6F 17 70 45  .P.!.e.>....o.pE
#             0010: EC 05 A7 8D 22 CC 09 C7   14 A5 22 01 E5 1E FE 2E  ....".....".....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.795 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "33 31 E9 03 95 AD 4F 78 3E 39 44 4C 2F 21 AD 34 E0 6F B6 8A E0 EE BA 76 D1 77 1F F4 0B 3D 9C A7",
#   "session id"          : "3B 40 BF A1 65 09 56 DF A7 FB 92 C7 07 26 35 D5 FB F8 7D 97 49 36 DA 79 01 2F 63 20 49 F9 40 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 85 0F 6B 9E 02 6A 97 22   D6 F1 CB 7B 10 92 FF 70  ..k..j.".......p
#           0010: D3 58 F5 AF A7 8A 0E 53   72 6C BF C7 36 AA 6B 11  .X.....Srl..6.k.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.796 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.796 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.797 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.797 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.799 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.799 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.799 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.799 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:46.800 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:46.800 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.800 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.828 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.829 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.830 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.843 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.843 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.844 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.844 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.844 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:46.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:46.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.853 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.854 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.854 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.854 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.855 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.855 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:46.855 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.879 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 9B 5F 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:26.000 UTC",
#       "not  after"         : "2024-01-12 22:12:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#           0010: 6F A2 D1 74                                        o..t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 73 D2 F2 9D 3C F7 37   74 CA 37 82 0B 51 A7 CF  .s...<.7t.7..Q..
#           0010: 20 F0 55 A9                                         .U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:46.885 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.411 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A E7 FD CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:24.000 UTC",
#     "not  after"         : "2024-01-12 22:12:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.418 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 91 05 B1 66 13 4C A8 1E   39 17 14 7A 26 B2 F2 9F  ...f.L..9..z&...
#     0010: E7 16 FD 48 5A 93 77 1A   E2 A0 CC 94 47 AD 9E 7E  ...HZ.w.....G...
#     0020: C9 35 E6 23 6F 28 01 DA   7B 3D 82 42 98 0F B5 9F  .5.#o(...=.B....
#     0030: F3 DF C3 66 F6 B5 9F D3   6D DB 36 B3 73 3A 5C 04  ...f....m.6.s:\.
#     0040: 6A 80 F8 E7 A3 33 60 E1   BE AA 16 79 56 95 25 7E  j....3`....yV.%.
#     0050: 1E 69 E8 8E 51 42 19 64   37 5A 3C 05 70 B3 89 BB  .i..QB.d7Z<.p...
#     0060: CE C2 59 EA 0C 32 53 EF   BB 6D 92 09 0B 39 BE B0  ..Y..2S..m...9..
#     0070: 19 DF F5 FC 95 BA 24 1F   A1 37 AF A7 57 60 DA D1  ......$..7..W`..
#     0080: 95 0A 2F 02 EE 43 92 4E   97 68 CA BF B6 D0 83 B3  ../..C.N.h......
#     0090: C8 73 9E DF 82 04 86 0B   A8 2B D8 7F 1A 1B 24 31  .s.......+....$1
#     00A0: 70 02 92 BC 83 77 AE 0C   75 5A C1 90 D9 A7 5D EB  p....w..uZ....].
#     00B0: 60 F4 96 AC E9 2B 10 9B   7A 61 60 83 3F 4D 48 D0  `....+..za`.?MH.
#     00C0: 83 46 24 C7 9A 7F 80 8F   A6 B7 17 86 4D 64 CD 8E  .F$.........Md..
#     00D0: DD 5D 84 55 E4 6D AD 1A   99 EB 73 5D 18 95 8D 3E  .].U.m....s]...>
#     00E0: 01 A2 5F DD FA C3 BF 7A   2A C0 8C 3B 32 CB C1 EF  .._....z*..;2...
#     00F0: 57 71 97 AC D8 3D 56 26   FB C4 A1 53 5A EE 8D F9  Wq...=V&...SZ...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.420 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AB 42 AD 07 84 F8 F4 A5   3A 9B 33 2E 60 BD 74 C8  .B......:.3.`.t.
#     0010: 10 3D CE FF AF 93 EA C0   40 93 1E 99 14 DB 48 81  .=......@.....H.
#     0020: 95 AC E3 62 79 F2 6D B4   D7 A3 76 A9 14 F7 CE 38  ...by.m...v....8
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.424 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 22:12:47.428 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:47.428 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 22:12:47.428 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:47.429 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 22:12:47.429 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:47.429 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.429 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.434 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 2B 14 86",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:30.000 UTC",
#       "not  after"         : "2024-01-12 22:12:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#           0010: 6F A2 D1 74                                        o..t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F C5 2A 00 38 CC 0D EE   6A 2B 46 5F FB 9E 59 28  _.*.8...j+F_..Y(
#           0010: 5A 41 84 62                                        ZA.b
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A E7 FD CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:24.000 UTC",
#       "not  after"         : "2024-01-12 22:12:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#           0010: 4C 04 4B 38                                        L.K8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#           0010: 6F A2 D1 74                                        o..t
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.482 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E 9D E4 76 1D 7B F0 82   74 60 AF E4 97 88 A9 64  >..v....t`.....d
#     0010: F4 D3 88 32 26 42 BF FE   DC BD 61 2E 21 F5 74 25  ...2&B....a.!.t%
#     0020: 4A D2 CC 9F 06 AF 95 3B   A2 FE E2 1C 3A 9E F4 9C  J......;....:...
#     0030: AA 34 6A 56 F9 E3 A6 70   8C 48 AC 09 8A F6 C3 54  .4jV...p.H.....T
#     0040: FC 1F 8F A8 EC 91 74 87   6E 6A B6 83 9B 15 B5 0E  ......t.nj......
#     0050: 9D 13 B9 23 FF 73 51 38   4F 45 A5 BB A8 E9 63 99  ...#.sQ8OE....c.
#     0060: 59 AD 7F 2E C3 94 7C E3   F6 4E E4 64 8E ED F6 DF  Y........N.d....
#     0070: 69 01 54 6D C2 93 8A 3B   85 CC DA AC FE 7C 27 2E  i.Tm...;......'.
#     0080: E1 DA BC CA AD 56 93 DD   87 86 78 8E CC 11 EF 32  .....V....x....2
#     0090: 29 E9 94 18 D6 6A C7 A6   C6 12 53 34 31 51 F7 7B  )....j....S41Q..
#     00A0: 16 C8 3F 1C 1A 78 9F 03   09 31 86 FD AB C0 20 81  ..?..x...1.... .
#     00B0: 05 68 5A 8C 2B 8C EF 6B   4F 93 39 42 B9 91 01 AE  .hZ.+..kO.9B....
#     00C0: 9D 36 9B C6 E9 5A A0 93   24 71 81 85 9A 83 90 00  .6...Z..$q......
#     00D0: 19 B5 C6 82 F2 4B EA AB   19 7B 0C 65 43 BA EB CF  .....K.....eC...
#     00E0: 91 87 57 A1 8B 5C 02 04   97 A1 73 97 3C 59 5D 5F  ..W..\....s.<Y]_
#     00F0: 52 BF F9 14 B4 2E 42 C4   06 EC 11 22 74 C8 35 22  R.....B...."t.5"
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.484 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C6 43 90 2F FE C9 E0 D1   6C 20 0F A0 6D 7F 16 EF  .C./....l ..m...
#     0010: 05 98 E0 88 C4 3C 90 8E   BA A6 5C A5 05 B1 D2 43  .....<....\....C
#     0020: A9 F8 80 88 F3 7E 6C 91   AD 27 62 5E C3 77 72 AA  ......l..'b^.wr.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.484 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:47.593 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C4 3B BB 54 1B 4A 10 DA 1E FF AF FE CE 5C 7D 02 7A 10 F0 A8 74 F5 2A 65 8C 50 82 91 4E 0B E5 F9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 22:12:48.152 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 22:12:48.154 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 22:12:49.123; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 22:12:49.127; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 22:12:49.497; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:12:49.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 22:12:49.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-V92m0e/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:12:49.760 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 2B 14 86",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:30.000 UTC",
#     "not  after"         : "2024-01-12 22:12:30.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5F C5 2A 00 38 CC 0D EE   6A 2B 46 5F FB 9E 59 28  _.*.8...j+F_..Y(
#         0010: 5A 41 84 62                                        ZA.b
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A E7 FD CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:24.000 UTC",
#     "not  after"         : "2024-01-12 22:12:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:12:49.764 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A E7 FD CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:24.000 UTC",
#     "not  after"         : "2024-01-12 22:12:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5D D1 18 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:21.000 UTC",
#     "not  after"         : "2024-01-12 22:12:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 22:12:49.776 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:12:49.950 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:49.950 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:12:49.953 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:12:49.953 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:49.958 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:49.969 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:49.969 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:49.969 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:12:49.972 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5F 8A B8 A5 47 3A EA 40 18 2D 38 81 94 15 5C BB 34 85 AE 10 A7 86 01 76 6B 1D DE 51 80 48 8C AD",
#   "session id"          : "F4 38 D7 7B BE D4 C9 0E 85 09 E8 86 F9 B5 BE E5 DF 81 BC FD 45 04 B7 0A 2F 8F D5 ED 2B 37 EB 9B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8A 17 8B 00 F4 77 34 F0   4B 4E E7 A6 63 E8 EE 7C  .....w4.KN..c...
#             0010: E4 9B 14 3D 97 00 BB 02   C4 59 F0 F5 32 DB 92 7A  ...=.....Y..2..z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.065 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "56 62 5E 64 6D 17 7E 1B 3A 6B E6 00 A9 32 BE 6F E7 D0 36 5E 09 28 A1 49 8F 08 E9 41 11 94 0E CF",
#   "session id"          : "F4 38 D7 7B BE D4 C9 0E 85 09 E8 86 F9 B5 BE E5 DF 81 BC FD 45 04 B7 0A 2F 8F D5 ED 2B 37 EB 9B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E8 76 80 7F D2 25 D4 DC   58 EC C0 06 C3 8C 92 E6  .v...%..X.......
#           0010: B0 18 84 9A 6B 54 B8 AC   DB 58 B5 A9 3E D6 E3 76  ....kT...X..>..v
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.066 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.066 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.077 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.078 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.078 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.078 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.078 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.079 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.079 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.079 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.081 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.081 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.081 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.082 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.098 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.100 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.101 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.110 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.111 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.111 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.111 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.111 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.111 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.112 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.112 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.112 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.113 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.113 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.115 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.117 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.118 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.119 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.119 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.123 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "55 9B 5F 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:26.000 UTC",
#       "not  after"         : "2024-01-12 22:12:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#           0010: 6F A2 D1 74                                        o..t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 73 D2 F2 9D 3C F7 37   74 CA 37 82 0B 51 A7 CF  .s...<.7t.7..Q..
#           0010: 20 F0 55 A9                                         .U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.123 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.180 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7A E7 FD CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 22:12:24.000 UTC",
#     "not  after"         : "2024-01-12 22:12:24.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#         0010: 4C 04 4B 38                                        L.K8
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#         0010: 6F A2 D1 74                                        o..t
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.183 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 90 25 2D EA 47 C4 7D DC   AF DF 42 9F DD E9 C9 B2  .%-.G.....B.....
#     0010: 4E 35 1E 85 8E AF 49 81   2C 05 16 98 33 F7 06 09  N5....I.,...3...
#     0020: 63 11 94 75 33 A1 56 5C   87 20 CA 6A E3 63 07 84  c..u3.V\. .j.c..
#     0030: 29 15 CA 9F 06 27 40 44   04 85 D3 5B E6 00 95 91  )....'@D...[....
#     0040: AA DA FF E1 CB 26 44 1D   0A 6B E7 07 B5 5F 44 C1  .....&D..k..._D.
#     0050: B8 21 7A 66 5A 92 6A 88   42 3D 79 6A 86 5A 9E D0  .!zfZ.j.B=yj.Z..
#     0060: BE 3D F4 8E 47 92 C7 16   AA 7D 0C FE D6 A2 F0 40  .=..G..........@
#     0070: 35 A8 5E CE 2C 13 51 01   5E 83 D8 EC 8A 59 01 BC  5.^.,.Q.^....Y..
#     0080: 06 22 51 37 68 B4 3A A8   5A D6 FD 7B 99 3D 44 44  ."Q7h.:.Z....=DD
#     0090: BB 4E 4B 6F 6C 10 E0 5B   12 CB 63 0F 23 F4 05 5E  .NKol..[..c.#..^
#     00A0: 92 EC 84 C5 28 70 0D 9C   B4 DB CA 87 9B 9C DA 82  ....(p..........
#     00B0: F4 6F D0 02 52 FA 8E 72   0A C3 2B B3 E0 0C ED D8  .o..R..r..+.....
#     00C0: 8B DE B0 56 B9 C8 D6 A8   20 7E 7A 1A 45 94 F3 02  ...V.... .z.E...
#     00D0: D0 E4 AC 2A 6A 4A E1 74   FA F4 CA AE 6F 15 95 4E  ...*jJ.t....o..N
#     00E0: C8 5C AF B4 CF A8 86 38   D6 35 45 C9 D8 72 88 B1  .\.....8.5E..r..
#     00F0: FC 92 C4 AF DA D8 27 9A   F3 16 A4 19 CF 89 91 CF  ......'.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.185 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 41 2B 01 84 FB E0 1A AC   B9 CB 9F 6C 1F EC B4 15  A+.........l....
#     0010: 8B CE 75 C4 AB 73 12 B8   07 D9 6B 72 C2 9C 4F CA  ..u..s....kr..O.
#     0020: 8E 1B 4B 6E FC EE EB F3   D6 B6 E3 45 73 C0 C5 8D  ..Kn.......Es...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.186 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 22:12:50.187 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.187 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 22:12:50.188 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.188 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 22:12:50.188 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 22:12:50.188 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.188 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.190 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 2B 14 86",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:30.000 UTC",
#       "not  after"         : "2024-01-12 22:12:30.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#           0010: 6F A2 D1 74                                        o..t
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5F C5 2A 00 38 CC 0D EE   6A 2B 46 5F FB 9E 59 28  _.*.8...j+F_..Y(
#           0010: 5A 41 84 62                                        ZA.b
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A E7 FD CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:24.000 UTC",
#       "not  after"         : "2024-01-12 22:12:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#           0010: 4C 04 4B 38                                        L.K8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#           0010: 6F A2 D1 74                                        o..t
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.214 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 02 6E 02 DA 6E 13 FE 3D   6E 81 08 31 C4 5E 70 F1  .n..n..=n..1.^p.
#     0010: 60 BF 0F E2 7B 30 7F 55   54 FD F3 8A 41 75 57 A1  `....0.UT...AuW.
#     0020: 99 06 2E 8D 77 F3 7F 3D   BD 0B A1 9A 8F C7 86 4B  ....w..=.......K
#     0030: 46 6E B2 CC D6 70 3D 47   6F B5 0C 64 26 AA E1 5F  Fn...p=Go..d&.._
#     0040: A2 8B 5D F6 C0 DE 9A 4C   77 E5 9E C7 02 17 7D A9  ..]....Lw.......
#     0050: F7 98 08 34 C5 76 59 CF   3A 47 C4 EF 2C 8F 66 A0  ...4.vY.:G..,.f.
#     0060: 56 0E D4 FB 27 4E 1F 65   61 38 5E 92 E3 98 07 D8  V...'N.ea8^.....
#     0070: 98 A4 66 D3 7E 01 E4 1A   22 12 CF C3 FB AD 3E B1  ..f.....".....>.
#     0080: 3A 24 58 6F 9C 01 70 9C   AB B4 E6 FA 3F 9F F6 12  :$Xo..p.....?...
#     0090: 82 72 3F B6 26 55 C6 DC   0C C4 15 78 FD 87 92 94  .r?.&U.....x....
#     00A0: 07 B4 06 75 A0 ED 68 C3   AE 5A 37 47 2C 1F EF 6C  ...u..h..Z7G,..l
#     00B0: 77 45 28 30 82 B0 BE DC   FE B7 F0 92 0B 10 68 05  wE(0..........h.
#     00C0: 80 B2 E5 3D 57 7B FE F5   DA 91 DF D5 85 74 13 76  ...=W........t.v
#     00D0: C6 D4 60 3D 0A 81 A7 37   71 33 E5 22 27 28 4A 5E  ..`=...7q3."'(J^
#     00E0: 9B 5A 71 C6 3D 0F 54 42   57 20 37 54 D7 85 05 A0  .Zq.=.TBW 7T....
#     00F0: EA 82 EA 26 22 F2 12 2A   F0 DF 26 BE 57 01 BD 6A  ...&"..*..&.W..j
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.215 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 90 BC 5B 12 50 EF 11 06   10 84 DB 98 4F 05 6D 01  ..[.P.......O.m.
#     0010: E8 BF 3B 71 8F B3 4E 80   D7 61 34 63 65 84 C9 5F  ..;q..N..a4ce.._
#     0020: A2 3D 44 D0 80 2E 67 38   5F EF 5F 78 20 16 87 84  .=D...g8_._x ...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.216 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:12:50.269 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C3 32 0C 4E 58 0D 92 E6 38 70 D2 C0 11 25 AC C3 05 C5 C9 B9 AC F8 E2 B7 95 6D 0A B9 17 EC AD 54",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:12:50.536 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:12:50.536 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:12:50.536 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 22:12:50.536 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-14 22:12:50.590 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|0E|h2sc-1-thread-2|2023-10-14 22:12:50.591 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-14 22:12:50.594 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-14 22:12:50.595 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-14 22:13:03.872; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 22:13:04.205 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A E7 FD CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:24.000 UTC",
#       "not  after"         : "2024-01-12 22:12:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#           0010: 4C 04 4B 38                                        L.K8
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E8 57 02 52 73 04 3D B7   A7 4B A7 AC 6B 39 3F 67  .W.Rs.=..K..k9?g
#           0010: 6F A2 D1 74                                        o..t
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5D D1 18 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 22:12:21.000 UTC",
#       "not  after"         : "2024-01-12 22:12:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 33 B1 81 95 65 59 E2 45   75 1C A6 57 D7 F6 79 D0  3...eY.Eu..W..y.
#           0010: 4C 04 4B 38                                        L.K8
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 22:13:04.218 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:13:04.496 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:13:04.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:13:04.498 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 22:13:04.498 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:13:04.502 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:13:04.513 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:13:04.513 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:13:04.513 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 22:13:04.515 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "34 12 8A 43 F4 26 08 D0 CA B7 F1 1C 34 33 F0 48 24 06 7C 11 36 5E 4C 60 EB D3 28 FA E7 50 C3 1B",
#     "session id"          : "3A F4 17 4D A5 06 4D A2 2E 53 70 D5 CB 53 DE F8 31 76 C3 E0 9E 30 2D 6C 3A CE 71 CC B3 A7 11 5A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5C 33 ED 0B D1 54 2E 47   7B 8E 6C EA 7B 0F DF C9  \3...T.G..l.....
#               0010: FE 3D AD 44 D1 F6 AE 9B   F5 03 FD BF FF 1C CC 65  .=.D...........e
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.532 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "34 6D 6A 7B 42 F1 F2 8A 91 8B 0C C3 71 75 45 BB 4E 62 CC A8 5E 6D 0D 6A B9 C8 13 8D EC 21 C9 72",
#     "session id"          : "3A F4 17 4D A5 06 4D A2 2E 53 70 D5 CB 53 DE F8 31 76 C3 E0 9E 30 2D 6C 3A CE 71 CC B3 A7 11 5A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D8 32 F8 E6 4B B3 29 21   E2 7F 00 9A CA 31 82 30  .2..K.)!.....1.0
#             0010: DA 58 7B 48 A6 AF 19 02   A4 F1 62 B7 03 11 41 02  .X.H......b...A.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.533 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.533 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.533 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.534 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.534 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.534 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.534 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.534 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 22:13:04.534 UTC|SSLExte

[...truncated too long message...]

ineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14543ms
ok 75 stop command for single port in 17825ms
not ok 76 status detects locally running solr in 1537ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7731ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1516ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2981ms
ok 80 copying files around in 6594ms
ok 81 upconfig in 2636ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1244ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1257ms
not ok 84 Cleanup in 2540ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 39s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/x7fv3765cdnza

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8183 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8183/

All tests passed

Build Log:
[...truncated 1481 lines...]
BUILD FAILED in 1h 3m 49s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/audddf3ugz3l4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8182 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8182/

All tests passed

Build Log:
[...truncated 1156 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45877/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-14 14:31:05.215; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:31:05.223; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:45877/solr] to [https://127.0.0.1:45877].
# WARN  - 2023-10-14 14:31:06.133; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 14:31:06.171; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17107ms
ok 71 start solr with client truststore and security manager in 20063ms
not ok 72 start solr with mTLS needed in 52738ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-HsU7sC/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45877 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45877 (pid=3673169). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45878 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45878 (pid=3673278). Happy searching!
#
#     INFO  - 2023-10-14 14:32:09.535; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:32:09.540; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 14:32:10.319; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 14:32:10.321; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 14:32:10.322; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:10.483 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 D3 8E 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:55.000 UTC",
#     "not  after"         : "2024-01-12 14:31:55.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 98 5A 25 0E D0 FE 42   A9 73 CB 9D 32 3A AB 5A  ..Z%...B.s..2:.Z
#         0010: FD 19 09 E8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B2 7F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:48.000 UTC",
#     "not  after"         : "2024-01-12 14:31:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:10.497 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 20 48 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:46.000 UTC",
#     "not  after"         : "2024-01-12 14:31:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B2 7F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:48.000 UTC",
#     "not  after"         : "2024-01-12 14:31:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:10.518 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:11.147 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:11.147 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:11.147 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:11.147 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:11.257 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:11.258 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:11.268 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:11.282 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:11.282 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:11.283 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:11.284 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C5 E3 D1 B2 7D ED F2 3A 18 3A 9D 2B 5F 61 AD 81 89 D4 B6 51 F5 84 0B E4 95 69 EA 4B 22 DF 0D E1",
#   "session id"          : "AC 2B FD 30 1D 3F BD D3 DD 63 E6 51 7C F6 8C 59 77 FD 3E 21 FA 03 1C 04 D1 2B 87 75 90 C8 14 F9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1F DA E9 D4 26 03 17 94   B6 77 27 A3 85 7D AE 9D  ....&....w'.....
#             0010: 34 5E B2 4E 7D DE 83 23   3F 63 F3 01 DF 54 01 66  4^.N...#?c...T.f
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.430 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "60 8F 6A 4D FC AD 6D 72 B4 59 CD 2C E9 33 43 96 E9 BC 4D 82 AB D6 94 93 19 F5 2A 51 2F A7 69 EA",
#   "session id"          : "AC 2B FD 30 1D 3F BD D3 DD 63 E6 51 7C F6 8C 59 77 FD 3E 21 FA 03 1C 04 D1 2B 87 75 90 C8 14 F9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BA F7 8C CF 2F F6 A8 89   08 0C 5B A7 5E 93 7F C3  ..../.....[.^...
#           0010: F8 E8 4B DB AC E0 23 EE   CD 6C 50 C0 A9 EC 3E 0C  ..K...#..lP...>.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.430 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.430 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.432 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.433 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.433 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.438 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.438 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.439 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.439 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.440 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.444 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.444 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.444 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.444 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.463 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.464 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.467 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.467 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.468 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.468 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.470 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.470 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.470 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.478 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.479 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.479 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.479 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.480 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.480 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.480 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.486 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 EF 22 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:51.000 UTC",
#       "not  after"         : "2024-01-12 14:31:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#           0010: 50 A7 53 55                                        P.SU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 DE E6 6B EE 76 6D EA   07 4A D1 15 8D 02 57 2F  ...k.vm..J....W/
#           0010: AD C2 2C DA                                        ..,.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.487 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.564 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B2 7F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:48.000 UTC",
#     "not  after"         : "2024-01-12 14:31:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.567 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: AD B8 7B 2F FA E0 07 6F   79 ED 04 FF 6C 55 ED C2  .../...oy...lU..
#     0010: 35 AD AE 47 62 F0 C8 99   EF 7F 5E 80 84 C3 79 95  5..Gb.....^...y.
#     0020: 63 5F 1C DB 82 A4 F0 14   63 48 06 A1 18 0B 51 1D  c_......cH....Q.
#     0030: FE 97 7A 1F B0 69 97 A3   5B 5A EB BB BC 25 6A 79  ..z..i..[Z...%jy
#     0040: C4 22 13 70 62 4A 07 9A   E1 7B 4B B7 7F 14 DE 32  .".pbJ....K....2
#     0050: C4 6C 30 87 CC FC 4D CE   76 EC 61 34 42 25 63 1A  .l0...M.v.a4B%c.
#     0060: F0 74 70 8B 1D 34 52 45   07 9B 88 F4 7D 7D F4 DE  .tp..4RE........
#     0070: 97 A7 26 99 71 EC F6 94   32 5D 3D 35 7E 29 13 32  ..&.q...2]=5.).2
#     0080: BC 9D FD FF FC DA E6 63   25 E6 21 67 6F C1 CF FD  .......c%.!go...
#     0090: F2 6C DA FE B2 80 34 76   1D B9 B9 74 2B 6E E2 58  .l....4v...t+n.X
#     00A0: E4 8A C9 0E 7F AA A5 87   C0 01 74 E8 22 48 08 1D  ..........t."H..
#     00B0: 68 E0 C6 03 99 26 D7 89   A0 F8 66 2D 8C 75 ED A9  h....&....f-.u..
#     00C0: 7E 70 D0 96 DD 71 C1 B3   4F B9 2D E4 91 7B 93 36  .p...q..O.-....6
#     00D0: AC F5 31 32 EA 94 B3 52   66 EF 02 58 CD 59 01 F2  ..12...Rf..X.Y..
#     00E0: 46 17 12 56 33 00 F8 E3   A6 80 B5 91 64 D7 1F 49  F..V3.......d..I
#     00F0: 80 5F 53 0A BA 31 B6 51   79 DD B3 E0 94 B5 CB 99  ._S..1.Qy.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.568 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 89 5E 2C 89 21 51 33 8F   33 66 FE D1 90 81 3A C0  .^,.!Q3.3f....:.
#     0010: E4 C5 95 1D 52 2F C1 48   EB 69 5A 27 AF 8E 5F 87  ....R/.H.iZ'.._.
#     0020: 34 C1 85 94 AB B2 81 3E   6D 18 13 02 67 7E C5 14  4......>m...g...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.571 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 14:32:11.572 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.572 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 14:32:11.572 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.572 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 14:32:11.573 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:11.573 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.573 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.578 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 D3 8E 9E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:55.000 UTC",
#       "not  after"         : "2024-01-12 14:31:55.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#           0010: 50 A7 53 55                                        P.SU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B0 98 5A 25 0E D0 FE 42   A9 73 CB 9D 32 3A AB 5A  ..Z%...B.s..2:.Z
#           0010: FD 19 09 E8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A B2 7F 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:48.000 UTC",
#       "not  after"         : "2024-01-12 14:31:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#           0010: D3 21 D0 14                                        .!..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#           0010: 50 A7 53 55                                        P.SU
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.638 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 FF 8A 3A 58 28 04 B1   20 C9 97 46 BD 46 78 9C  ...:X(.. ..F.Fx.
#     0010: 8F 69 0E 92 D2 E2 DD 63   36 0A B6 E9 45 87 BE 8B  .i.....c6...E...
#     0020: 30 F5 8B 26 21 0D CD B4   DF A9 08 30 9B FC 97 58  0..&!......0...X
#     0030: 08 DD C9 81 17 ED 23 F1   B3 72 28 37 90 49 AB 42  ......#..r(7.I.B
#     0040: DF 3C CF 2B 62 1F C4 A1   D8 E0 0F 09 9C 48 48 60  .<.+b........HH`
#     0050: FC 6D 72 3C 8C 0A 0A 5A   F1 9B CF 4B FA 23 BA 85  .mr<...Z...K.#..
#     0060: 77 D3 65 14 58 58 85 E6   98 03 F4 D4 57 89 BA 92  w.e.XX......W...
#     0070: D1 94 FD B2 A0 3F 70 2A   E5 88 01 40 78 0B 40 A9  .....?p*...@x.@.
#     0080: F8 D1 0A 42 18 A3 5F 67   5B 1C 7D CE E1 BA A9 2D  ...B.._g[......-
#     0090: C3 A5 E7 EA 6D 4C 80 AC   1F 1B DD 7E 92 4F 5A DB  ....mL.......OZ.
#     00A0: 20 EC 4C 8E D0 8F A6 96   5F 3C 4F 2E A7 D8 8B 5A   .L....._<O....Z
#     00B0: 8D 34 76 92 55 F6 AA EE   F9 53 E8 32 13 0F 85 AB  .4v.U....S.2....
#     00C0: D2 F8 EF 21 30 7E E5 87   F9 8D 96 4E 8F 8A 20 25  ...!0......N.. %
#     00D0: AF 34 4E 44 44 2D 84 BD   74 1E 4B 2E 96 DB 68 BB  .4NDD-..t.K...h.
#     00E0: 42 78 BA CF FB 0F 3A 80   20 10 88 E1 C6 18 73 45  Bx....:. .....sE
#     00F0: 86 79 DE 55 D2 02 50 A8   9F D3 52 9A 24 6D BB A3  .y.U..P...R.$m..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.639 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BB 1E D1 00 C8 5C 01 38   4F 45 C5 22 5E 4D C9 E4  .....\.8OE."^M..
#     0010: B2 2B 3D BB 28 D2 14 DF   BE D1 31 83 1F 73 AE 5A  .+=.(.....1..s.Z
#     0020: 9E FC 17 E0 B3 7E BB A8   67 79 AE B5 64 77 1F 4E  ........gy..dw.N
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.644 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:11.894 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A1 C6 BE B7 F3 0E CE 56 69 E8 C0 B6 B5 3F 84 3F 78 28 0B A3 71 06 B5 E2 09 13 C5 BA 8E 58 6F FA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 14:32:12.500 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 14:32:12.501 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 14:32:14.079; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 14:32:14.083; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 14:32:14.436; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 14:32:14.439; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 14:32:14.439; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HsU7sC/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:14.472 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "29 D3 8E 9E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:55.000 UTC",
#     "not  after"         : "2024-01-12 14:31:55.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B0 98 5A 25 0E D0 FE 42   A9 73 CB 9D 32 3A AB 5A  ..Z%...B.s..2:.Z
#         0010: FD 19 09 E8                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B2 7F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:48.000 UTC",
#     "not  after"         : "2024-01-12 14:31:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:14.475 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 20 48 0D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:46.000 UTC",
#     "not  after"         : "2024-01-12 14:31:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B2 7F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:48.000 UTC",
#     "not  after"         : "2024-01-12 14:31:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:14.488 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:14.661 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:14.661 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:14.663 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:14.663 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:14.667 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:14.679 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:14.679 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:14.679 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:14.681 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5A 9E 1D 9A F3 4E EA F5 F0 D7 71 44 97 0D 6E E1 E9 84 DC 44 5C A1 DD 79 F1 06 39 99 A0 98 6F D7",
#   "session id"          : "60 52 BA 4B CB 77 06 48 8D 46 86 25 26 40 67 91 F0 DE 50 E7 04 69 7E 42 EC F9 DE 1A AC 2A 02 76",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 66 C1 C1 52 D6 4F 83   72 37 55 56 CF 54 9D DA  .f..R.O.r7UV.T..
#             0010: C6 D5 DA 6E 83 B4 8B B4   ED FE 6D F0 BA D5 4E 07  ...n......m...N.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.813 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8C 6F 1B 10 8C 0A A3 D0 17 4A 43 D4 ED 7F 2F 9B BE 9F 14 C6 D6 A7 57 8F 0E 13 3B 3C CA 17 CD 76",
#   "session id"          : "60 52 BA 4B CB 77 06 48 8D 46 86 25 26 40 67 91 F0 DE 50 E7 04 69 7E 42 EC F9 DE 1A AC 2A 02 76",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B8 57 63 51 CF E0 B7 F7   8F D2 B2 EE 48 D9 75 62  .WcQ........H.ub
#           0010: 18 07 BD 84 17 AF B5 E9   C1 45 05 83 47 BE 6D 61  .........E..G.ma
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.813 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.813 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.816 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.817 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.817 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.817 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.817 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.817 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.817 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.817 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.819 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.819 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.819 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.819 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.820 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.837 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.839 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.840 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.843 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.843 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.843 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.843 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.843 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:14.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:14.844 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.845 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.854 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.854 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.855 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.856 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.856 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:14.856 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.860 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "56 EF 22 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:51.000 UTC",
#       "not  after"         : "2024-01-12 14:31:51.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#           0010: 50 A7 53 55                                        P.SU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E9 DE E6 6B EE 76 6D EA   07 4A D1 15 8D 02 57 2F  ...k.vm..J....W/
#           0010: AD C2 2C DA                                        ..,.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.860 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:14.915 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1A B2 7F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 14:31:48.000 UTC",
#     "not  after"         : "2024-01-12 14:31:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#         0010: D3 21 D0 14                                        .!..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#         0010: 50 A7 53 55                                        P.SU
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.278 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 D5 9F 9E CC AC A5 EF   68 2A 99 9D 5D 0E B0 1E  r.......h*..]...
#     0010: D6 77 AE EA 58 9B 84 3C   77 30 17 98 3A FA 9B 0D  .w..X..<w0..:...
#     0020: 27 26 30 C0 BC EF 84 F9   41 E6 94 51 41 0C BC E8  '&0.....A..QA...
#     0030: B6 27 59 20 96 59 23 BC   E2 FB BF C4 A6 4E 18 54  .'Y .Y#......N.T
#     0040: EE 4A 09 0A DB 19 B2 37   B4 7F D4 62 4D 6B 71 CB  .J.....7...bMkq.
#     0050: 9C 6A 96 26 EE 71 67 73   1A E2 3D 40 F2 EB 5A FD  .j.&.qgs..=@..Z.
#     0060: 50 10 2F B4 4B 7A 13 6E   7B E3 2E 5B C8 F5 F5 F8  P./.Kz.n...[....
#     0070: 53 9F 7A 86 F7 24 A7 BE   C8 03 C4 FB F9 AC 35 42  S.z..$........5B
#     0080: ED EA 46 91 C3 07 0A DB   B3 18 9B 5A 94 64 9F 54  ..F........Z.d.T
#     0090: B0 59 AF 2D 4D F5 CB 67   7D 22 AD 51 6A 8A 00 00  .Y.-M..g.".Qj...
#     00A0: 8C AE 90 E0 9F 81 C7 60   60 6A 73 DE 50 3C 68 AB  .......``js.P<h.
#     00B0: 51 9D F4 3A 07 D8 0F 7F   B2 4E 57 66 08 B6 31 A4  Q..:.....NWf..1.
#     00C0: 50 4C 1E 93 94 76 9B FD   BC DC 5A 6E 98 6A 0A E6  PL...v....Zn.j..
#     00D0: E6 0D E4 1B 5B B8 75 48   D2 26 C0 A5 43 E2 65 51  ....[.uH.&..C.eQ
#     00E0: 63 3F AD F1 38 94 B0 C6   37 3E E8 99 EF 0E 42 95  c?..8...7>....B.
#     00F0: F8 44 E3 6C A7 8B 2C 46   0A 2F 59 67 03 C0 0C 62  .D.l..,F./Yg...b
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.280 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1E 93 A7 9B 91 22 C2 5D   C5 AD DF 8E 92 E5 31 64  .....".]......1d
#     0010: 40 7D 55 29 B4 89 E9 C7   D6 23 F9 75 2F 30 C4 54  @.U).....#.u/0.T
#     0020: A7 31 67 7C D7 F1 01 AA   89 87 E6 1D 65 BA 30 E2  .1g.........e.0.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.283 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 14:32:15.284 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:15.284 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 14:32:15.284 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:15.284 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 14:32:15.284 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:15.285 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.285 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.287 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "29 D3 8E 9E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:55.000 UTC",
#       "not  after"         : "2024-01-12 14:31:55.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#           0010: 50 A7 53 55                                        P.SU
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B0 98 5A 25 0E D0 FE 42   A9 73 CB 9D 32 3A AB 5A  ..Z%...B.s..2:.Z
#           0010: FD 19 09 E8                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A B2 7F 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:48.000 UTC",
#       "not  after"         : "2024-01-12 14:31:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#           0010: D3 21 D0 14                                        .!..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#           0010: 50 A7 53 55                                        P.SU
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.311 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 4D EC 58 AD C4 F3 15   11 D6 69 40 37 D4 41 C7  _M.X......i@7.A.
#     0010: 3E 0A 87 9C 61 64 A3 69   2F 7A 87 BD 7D 05 C7 55  >...ad.i/z.....U
#     0020: 43 DC DC FD DD 58 91 33   57 AD F7 44 C5 47 B0 2A  C....X.3W..D.G.*
#     0030: 82 31 74 0A 02 BD 7C E7   43 E5 30 EE ED C2 78 B2  .1t.....C.0...x.
#     0040: B1 23 56 1A B0 C4 DE 82   D8 1C 7B 5C F9 A4 DA EA  .#V........\....
#     0050: D6 55 3C AE 09 97 B3 FC   ED 47 2E 79 50 70 F7 28  .U<......G.yPp.(
#     0060: 64 96 34 C4 D6 F0 C3 84   FE 1C 38 7B F9 28 14 B1  d.4.......8..(..
#     0070: C2 6F 9B 55 F9 C2 44 22   16 E7 45 97 1A 52 22 9D  .o.U..D"..E..R".
#     0080: 33 89 7F F2 C0 BF BE 51   14 15 27 3C 03 76 E3 2D  3......Q..'<.v.-
#     0090: 10 63 B7 04 56 2D 53 2E   32 FF F8 0B 34 8F AA 91  .c..V-S.2...4...
#     00A0: 43 52 27 03 63 CA 29 EE   5B 86 D2 1C B2 F5 5F 96  CR'.c.).[....._.
#     00B0: E9 16 C9 C3 E7 89 F7 86   28 1A B7 53 78 E0 AB FD  ........(..Sx...
#     00C0: F4 C2 9B 14 3D 79 66 42   B9 9B B9 10 42 8D 7B 4E  ....=yfB....B..N
#     00D0: 8A 18 67 71 C9 28 64 87   BB D3 DA 35 88 EC F0 35  ..gq.(d....5...5
#     00E0: 64 94 D9 6C E6 FD 0F 3D   68 73 BE E1 AC 28 9A F0  d..l...=hs...(..
#     00F0: 07 6A 66 7A 4B 54 55 91   DB 6F 57 D5 A5 5F 26 8E  .jfzKTU..oW.._&.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.313 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8E B8 06 EF B9 D0 58 B0   C4 28 1D 18 EF 62 CF 1A  ......X..(...b..
#     0010: 47 9D EA 6F 93 22 B7 64   9B D6 A5 A5 D3 90 A2 54  G..o.".d.......T
#     0020: 1E 2D CF 3F 56 02 C8 A4   BC 3A 09 BB 91 C9 1B 9E  .-.?V....:......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.313 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:15.382 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:15.382 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:15.382 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:32:15.382 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:15.389 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "11 DD C2 9A BF 51 52 68 34 6A 7E A1 C8 09 1C 4E 50 34 E0 E1 00 A1 1C D0 44 80 AB 66 42 69 C6 32",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 14:32:15.704 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 14:32:15.705 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-14 14:32:28.737; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:29.061 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 20 48 0D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:46.000 UTC",
#       "not  after"         : "2024-01-12 14:31:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#           0010: D3 21 D0 14                                        .!..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A B2 7F 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 14:31:48.000 UTC",
#       "not  after"         : "2024-01-12 14:31:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D E2 BB 25 9B 8B 1D DB   94 FD 0D 4C 59 5D 7B D8  ...%.......LY]..
#           0010: D3 21 D0 14                                        .!..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 86 1A 97 EF 2A 1A 8D 00   F0 F8 DD 49 3C F0 B1 E2  ....*......I<...
#           0010: 50 A7 53 55                                        P.SU
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 14:32:29.074 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:29.557 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:29.557 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:29.559 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 14:32:29.559 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:29.563 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:29.574 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:29.575 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:29.575 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 14:32:29.577 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "26 55 B2 59 27 46 10 F7 70 CA 1B 9A 5A 28 54 7D B7 8A 0F 92 B1 62 4F B0 22 82 A0 37 A5 0E A7 6B",
#     "session id"          : "EE 0E 91 18 9A AF DF 83 E2 8A 39 FE B3 75 D1 87 C0 55 80 23 39 81 D0 B4 04 C6 0C 47 E1 4C CE 38",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2F 75 CE 5A BA CB D4 E1   03 81 46 D9 4C E2 EE 2E  /u.Z......F.L...
#               0010: 23 64 FC C2 1C 0E D3 49   EC 9C 6A 9E F2 A6 57 4E  #d.....I..j...WN
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.593 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "26 E0 8F F0 A3 C9 16 66 4A D4 4F 55 61 67 1C 2C E3 C9 E7 08 A4 78 61 24 1B C2 4F CD 57 59 CE 51",
#     "session id"          : "EE 0E 91 18 9A AF DF 83 E2 8A 39 FE B3 75 D1 87 C0 55 80 23 39 81 D0 B4 04 C6 0C 47 E1 4C CE 38",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0B 44 4F 57 AD 38 4E 46   45 D6 C0 A7 FF 7F 40 84  .DOW.8NFE.....@.
#             0010: 65 0A 60 F6 5C DF 2E A0   7F 91 B3 13 62 BF 32 4D  e.`.\.......b.2M
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.593 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.593 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.595 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.596 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:29.597 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.606 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.607 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.609 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.612 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.612 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.613 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.613 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.613 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.613 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:29.613 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:29.613 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.614 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.615 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.615 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.615 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.616 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 14:32:29.616 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:32:29.616 UTC|SSLExtensions.java:215|Ignore impact of unsupported extensio

[...truncated too long message...]

.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 14:33:43.519 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:33:43.559 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:33:43.559 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:33:43.559 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 14:33:43.559 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:45878/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14750ms
ok 75 stop command for single port in 17917ms
ok 76 status detects locally running solr in 9534ms
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7603ms
ok 78 status help flag outputs message highlighting not to use solrUrl. in 1107ms
ok 79 listing out files in 3062ms
ok 80 copying files around in 6546ms
ok 81 upconfig in 2647ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1259ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1244ms
ok 84 Cleanup in 2143ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 39s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5ki3otzxgxomq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8181 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8181/

All tests passed

Build Log:
[...truncated 1155 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44803/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-14 12:16:45.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:16:45.278; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:44803/solr] to [https://127.0.0.1:44803].
# WARN  - 2023-10-14 12:16:46.114; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 12:16:46.184; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17099ms
ok 71 start solr with client truststore and security manager in 19647ms
not ok 72 start solr with mTLS needed in 51749ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-MaUaX8/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 44803 [|]   [/]   [-]   [\]
# Started Solr server on port 44803 (pid=3377752). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 44804 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44804 (pid=3377878). Happy searching!
#
#     INFO  - 2023-10-14 12:17:48.906; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:17:48.912; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 12:17:50.085; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 12:17:50.088; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 12:17:50.091; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(ca,h=[localhost],a=[],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:17:50.160 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 E6 79 F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:35.000 UTC",
#     "not  after"         : "2024-01-12 12:17:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 40 D0 7E 19 51 96 C3   2E AA DA 6B 78 0C 94 CA  .@...Q.....kx...
#         0010: C8 A5 DE 4A                                        ...J
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F 28 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:28.000 UTC",
#     "not  after"         : "2024-01-12 12:17:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:17:50.164 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F 28 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:28.000 UTC",
#     "not  after"         : "2024-01-12 12:17:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F CF 1F F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:26.000 UTC",
#     "not  after"         : "2024-01-12 12:17:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:17:50.195 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:17:50.470 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:50.471 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:17:50.480 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:17:50.480 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:50.491 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:50.517 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:50.517 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:50.517 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:50.521 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 84 0C AA 86 0E 27 D5 07 B6 05 56 DF E4 CF C8 FD B2 03 80 14 A6 D1 CD D5 93 FA 3B 1D 14 82 A9",
#   "session id"          : "31 D4 19 0C 52 59 52 63 94 E7 66 4B C1 1E 39 E4 0A ED 3E 90 A2 E0 40 22 5E 78 66 C6 B2 6C 09 A4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F 31 CA 58 7F 69 14 05   B2 1E ED F4 98 2F D5 5A  .1.X.i......./.Z
#             0010: 03 29 D2 04 CB A9 9B F9   7D B9 CC 1A 22 E2 48 79  .)..........".Hy
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.922 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "EB 96 5E 7A C3 A7 1B 06 C3 87 2E B9 C6 2B C3 58 33 0A CA 76 E8 DD 2D FA 8E C9 33 29 73 E9 A7 2D",
#   "session id"          : "31 D4 19 0C 52 59 52 63 94 E7 66 4B C1 1E 39 E4 0A ED 3E 90 A2 E0 40 22 5E 78 66 C6 B2 6C 09 A4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A6 9C 21 B5 27 0A 6D 41   44 1D 22 75 34 B9 01 0B  ..!.'.mAD."u4...
#           0010: 01 F2 E7 6A 70 34 57 3A   1C F8 43 17 53 A4 48 41  ...jp4W:..C.S.HA
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.923 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.923 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.926 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.927 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.931 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.931 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.932 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.949 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.951 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.966 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.972 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:50.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.975 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.975 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.975 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.985 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.986 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:50.987 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:50.988 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.002 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A B4 C3 FB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:31.000 UTC",
#       "not  after"         : "2024-01-12 12:17:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#           0010: 07 72 6E 9D                                        .rn.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 3E BE 68 12 69 17 9D   E0 EA 04 42 36 DE 47 92  .>.h.i.....B6.G.
#           0010: 62 AB 7B 85                                        b...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.002 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.551 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F 28 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:28.000 UTC",
#     "not  after"         : "2024-01-12 12:17:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.562 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 D2 6E 4F 52 8F 87 39   60 FB F9 C9 91 18 18 CB  ..nOR..9`.......
#     0010: 43 28 A9 BB E2 1A 55 1A   C5 60 8F 17 97 5E 8D 82  C(....U..`...^..
#     0020: FA 86 5D 03 0A 2C A3 EC   C8 98 1D 26 8B DB 12 AB  ..]..,.....&....
#     0030: B8 1E 1F D7 0B 77 84 D5   5D 2E 48 A7 57 12 88 B8  .....w..].H.W...
#     0040: 80 4D 17 E9 01 3B B0 16   CB 50 F3 E3 15 7E 3E 00  .M...;...P....>.
#     0050: 33 E2 EB B8 C9 90 46 EF   41 04 17 07 86 DE 5C 50  3.....F.A.....\P
#     0060: 95 B6 58 D7 5C 94 B5 F9   CC FD ED B6 C5 89 09 C0  ..X.\...........
#     0070: 49 39 B8 6B 6A ED 04 63   F9 5F B3 2B 56 4A 78 92  I9.kj..c._.+VJx.
#     0080: 62 A6 7A 61 89 91 DC 9A   92 1A E9 1B 43 94 3D E8  b.za........C.=.
#     0090: D4 23 F5 46 7C 79 A9 90   64 30 83 32 29 51 5B 49  .#.F.y..d0.2)Q[I
#     00A0: 6E 5D D2 46 EC 38 7E 80   8D DD D5 D2 44 8E 4C B2  n].F.8......D.L.
#     00B0: FC 9B 44 2F 4C 9C 35 DC   8A CC 07 ED 5F E6 E5 87  ..D/L.5....._...
#     00C0: 6F 4B 5F 95 06 AB 61 12   BB 62 56 EA 7A 35 8D 51  oK_...a..bV.z5.Q
#     00D0: BC 25 0A 58 DC 40 F7 56   28 62 80 F1 41 D1 77 53  .%.X.@.V(b..A.wS
#     00E0: 25 88 D6 4F 38 2A 6C F7   BD 8A 5D 14 5F A0 B1 D1  %..O8*l...]._...
#     00F0: B4 05 E3 D6 CB 4A 43 80   72 1F 63 87 14 DD 70 A5  .....JC.r.c...p.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.566 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CC BB DE 8E 5E 36 BE B3   1A D7 88 89 94 74 34 EF  ....^6.......t4.
#     0010: C2 0B C3 51 77 BA 97 19   E7 F5 D6 42 A4 FB B0 C7  ...Qw......B....
#     0020: 08 A1 A4 BB 56 BC D8 6B   AA FC FF 70 0F 71 06 F2  ....V..k...p.q..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.569 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 12:17:51.573 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:51.573 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 12:17:51.574 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:51.575 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 12:17:51.575 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:51.575 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.579 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.581 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 E6 79 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:35.000 UTC",
#       "not  after"         : "2024-01-12 12:17:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#           0010: 07 72 6E 9D                                        .rn.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 40 D0 7E 19 51 96 C3   2E AA DA 6B 78 0C 94 CA  .@...Q.....kx...
#           0010: C8 A5 DE 4A                                        ...J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 5F 28 D0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:28.000 UTC",
#       "not  after"         : "2024-01-12 12:17:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#           0010: 7C 3B 46 C2                                        .;F.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#           0010: 07 72 6E 9D                                        .rn.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.637 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 08 F0 83 06 5B 16 13 99   08 DC 5E 27 17 DD 51 65  ....[.....^'..Qe
#     0010: 93 B8 BD F3 93 C6 6F 8A   8E 48 BC F6 E8 84 64 AE  ......o..H....d.
#     0020: 37 E1 9C C4 D1 EF 2A 1A   45 5D 44 AC A4 0D 06 98  7.....*.E]D.....
#     0030: 9F 27 C6 62 AF 2F 5E C2   80 B4 BB CA D1 E7 51 57  .'.b./^.......QW
#     0040: 4A CD DF EF 76 CF B1 58   63 8E 11 43 C6 E0 5E FB  J...v..Xc..C..^.
#     0050: B3 0D B8 D4 78 7A 6D 46   26 95 A7 2B 4E B2 41 40  ....xzmF&..+N.A@
#     0060: AF 4C B2 39 B6 82 3D 7D   FB 4B CA 6C F4 F5 6C 0E  .L.9..=..K.l..l.
#     0070: 4B B5 51 3A 0C 97 4E F6   36 AC 62 B3 C8 0C 22 00  K.Q:..N.6.b...".
#     0080: 1F 6E BE 2A 82 69 B1 3C   67 4B 65 AA 0D 37 6A 77  .n.*.i.<gKe..7jw
#     0090: A1 93 7B 36 D3 94 C3 80   4E 7F A5 66 B6 D2 7D 12  ...6....N..f....
#     00A0: 78 EF 61 D4 16 88 AA 4A   85 25 3B D9 9D 69 CB 39  x.a....J.%;..i.9
#     00B0: 6D 6E EC BF 74 C8 32 FA   71 E0 B5 A5 55 4A 26 DC  mn..t.2.q...UJ&.
#     00C0: 5B 66 C8 49 7E C9 B8 40   68 E4 70 04 F1 57 B2 72  [f.I...@h.p..W.r
#     00D0: 81 F3 1D 6D C1 36 D5 1A   2F 70 3B 8E C9 D5 54 8E  ...m.6../p;...T.
#     00E0: 51 AD AA 54 34 F0 C1 F2   CD BC DC 76 5E FB AA 2F  Q..T4......v^../
#     00F0: 7C 97 18 F7 A7 C1 60 BA   8D 3A 31 1F E5 10 F5 59  ......`..:1....Y
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.639 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 53 06 DD C0 D3 53 19 93   51 4D 90 68 44 F1 AE B7  S....S..QM.hD...
#     0010: C0 AF 45 98 8A 5B AE CC   C2 3F 9C 23 5C 34 72 6F  ..E..[...?.#\4ro
#     0020: 7C EE 91 53 63 1A DE 1C   DE 38 D3 25 2D E9 C2 AD  ...Sc....8.%-...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.643 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:51.721 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "03 F3 78 D0 C0 56 C2 AF 62 AF 9B D3 3C A5 C9 22 45 3F 16 9F 34 5F FE 42 AF A3 4E 61 B9 70 17 21",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 12:17:52.000 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 12:17:52.001 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 12:17:53.148; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 12:17:53.152; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 12:17:53.530; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 12:17:53.533; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 12:17:53.533; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-MaUaX8/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:17:53.570 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 E6 79 F6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:35.000 UTC",
#     "not  after"         : "2024-01-12 12:17:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 40 D0 7E 19 51 96 C3   2E AA DA 6B 78 0C 94 CA  .@...Q.....kx...
#         0010: C8 A5 DE 4A                                        ...J
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F 28 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:28.000 UTC",
#     "not  after"         : "2024-01-12 12:17:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:17:53.573 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F 28 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:28.000 UTC",
#     "not  after"         : "2024-01-12 12:17:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F CF 1F F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:26.000 UTC",
#     "not  after"         : "2024-01-12 12:17:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 12:17:53.585 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:17:53.759 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:53.759 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:17:53.761 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:17:53.761 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:53.766 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:53.777 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:53.778 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:53.778 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:17:53.780 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 69 F3 51 D1 9E 8A 9B 32 C8 E8 5A 9F 9A 53 0A 2E 50 1D CF 43 40 20 70 C5 FA D4 71 9A 47 5A 21",
#   "session id"          : "D3 97 B7 F6 0B B2 CC F4 6F 33 7C BB 54 4A F5 0B E9 BF F4 C2 42 85 80 4E E4 76 7B 51 26 A8 AA 8D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0B 74 4B 74 AE FB 7A 1E   DC 46 04 FD E4 56 7A F3  .tKt..z..F...Vz.
#             0010: DA 38 77 22 D3 F4 F5 35   45 16 23 78 6C 3F C2 32  .8w"...5E.#xl?.2
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.912 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DA D1 05 43 34 DB 91 36 E1 7A 35 4A 63 63 C5 92 1C 03 74 22 83 08 56 F0 85 9B 2E AC 49 E4 8C C2",
#   "session id"          : "D3 97 B7 F6 0B B2 CC F4 6F 33 7C BB 54 4A F5 0B E9 BF F4 C2 42 85 80 4E E4 76 7B 51 26 A8 AA 8D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DB 51 54 23 E4 92 FE DC   62 F6 9B 1B AF 0A CE 75  .QT#....b......u
#           0010: 06 09 09 B3 5D A3 AB 04   98 0A BB 9E 32 F9 9A 2F  ....].......2../
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.913 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.913 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.916 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.916 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.916 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.916 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.920 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.920 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.927 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.933 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.933 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:53.934 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:53.934 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.934 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.964 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.971 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.972 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.984 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.985 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.985 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.988 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.988 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.988 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.989 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:53.989 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:53.989 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.991 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.991 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.992 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.994 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.995 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.995 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:53.995 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.998 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7A B4 C3 FB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:31.000 UTC",
#       "not  after"         : "2024-01-12 12:17:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#           0010: 07 72 6E 9D                                        .rn.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 3E BE 68 12 69 17 9D   E0 EA 04 42 36 DE 47 92  .>.h.i.....B6.G.
#           0010: 62 AB 7B 85                                        b...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:53.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.148 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 5F 28 D0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 12:17:28.000 UTC",
#     "not  after"         : "2024-01-12 12:17:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#         0010: 7C 3B 46 C2                                        .;F.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#         0010: 07 72 6E 9D                                        .rn.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.152 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 24 99 18 33 87 C0 C7   E5 5E 54 57 A7 5B 16 49  D$..3....^TW.[.I
#     0010: DF A7 9F 96 0C 08 DC 86   E9 19 C7 10 2F B2 AF BE  ............/...
#     0020: 44 B4 F4 AA 3A 34 18 14   A8 12 CE 1D 3F 46 72 98  D...:4......?Fr.
#     0030: E8 A2 40 83 22 F7 00 4C   57 25 54 01 6B 7E 06 D6  ..@."..LW%T.k...
#     0040: 97 25 C4 67 65 6E 2E 8B   F1 37 A4 87 08 FB 79 71  .%.gen...7....yq
#     0050: 50 D9 4B F5 47 0F 86 71   4F 74 D2 DF 90 BD A1 60  P.K.G..qOt.....`
#     0060: C6 62 3A C1 4E EC 25 0A   55 C9 67 BB 02 B8 71 F6  .b:.N.%.U.g...q.
#     0070: 05 A7 C6 EB 24 3F EE 71   96 67 3F 02 E0 83 A1 D1  ....$?.q.g?.....
#     0080: F4 6C B8 8B 80 B6 40 B9   41 79 7F 5C F0 F5 9B D7  .l....@.Ay.\....
#     0090: 1A 6A 9D 69 54 99 AD 07   9F B3 2E 2A D4 B7 78 A4  .j.iT......*..x.
#     00A0: DC 3E 50 5C CE 46 47 12   D9 BD E0 2C 82 62 68 9A  .>P\.FG....,.bh.
#     00B0: C7 C3 12 E1 93 36 F1 35   AD 72 D0 EE D6 6A 15 44  .....6.5.r...j.D
#     00C0: 10 27 A5 A4 94 7A 82 8E   C9 7F 0B AF C8 E3 04 B0  .'...z..........
#     00D0: AD 9F 8A 0E 68 F9 04 A6   7D 92 86 B2 4A 6D 65 3A  ....h.......Jme:
#     00E0: 9A F7 C6 98 96 DB 2D 40   99 9D 2B C2 DA E8 1A 5D  ......-@..+....]
#     00F0: 2A 45 CA 9F B1 04 D1 0D   42 C1 6B FD FD 61 5D AC  *E......B.k..a].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.153 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C 32 E4 34 2B 18 31 E9   E0 85 07 2B B5 CD A4 13  l2.4+.1....+....
#     0010: 84 06 52 17 F2 00 A4 D2   94 D3 A9 6A F3 80 76 3A  ..R........j..v:
#     0020: B7 03 76 86 71 24 17 38   97 43 04 7E F3 64 2A 31  ..v.q$.8.C...d*1
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.155 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 12:17:54.156 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:54.156 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 12:17:54.156 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:54.156 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 12:17:54.156 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:17:54.156 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.157 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.159 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 E6 79 F6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:35.000 UTC",
#       "not  after"         : "2024-01-12 12:17:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#           0010: 07 72 6E 9D                                        .rn.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 40 D0 7E 19 51 96 C3   2E AA DA 6B 78 0C 94 CA  .@...Q.....kx...
#           0010: C8 A5 DE 4A                                        ...J
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 5F 28 D0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:28.000 UTC",
#       "not  after"         : "2024-01-12 12:17:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#           0010: 7C 3B 46 C2                                        .;F.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#           0010: 07 72 6E 9D                                        .rn.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.187 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F 7C 97 EE BB FF 55 FF   F2 99 5D 60 68 2B 33 9E  ......U...]`h+3.
#     0010: CB FA BE DD 58 58 01 1D   4B 09 82 A6 19 B7 BF 1C  ....XX..K.......
#     0020: 83 41 65 02 22 4E ED 81   49 F2 F4 14 E5 C1 4E AA  .Ae."N..I.....N.
#     0030: 98 35 5C 3D B0 8E 71 62   3A 8B 5A 52 AB 8E EF 2A  .5\=..qb:.ZR...*
#     0040: C5 08 43 F1 E6 0D C4 52   49 CA 7C 5B AA 8D 7B B4  ..C....RI..[....
#     0050: 3F 13 47 69 7C A7 E2 F9   10 24 48 20 DC E8 5A B2  ?.Gi.....$H ..Z.
#     0060: 0E 08 8F A3 51 99 81 F9   1A B3 C3 88 12 D9 3F 0C  ....Q.........?.
#     0070: BC AD F2 88 10 B8 B9 1B   20 4E 16 DB B2 AF 7E 05  ........ N......
#     0080: 96 09 A9 84 D6 10 0A 29   BD A7 8A FD 80 4A 8F CB  .......).....J..
#     0090: 38 F9 0D F0 75 56 A6 52   23 12 03 C3 63 8B C1 D2  8...uV.R#...c...
#     00A0: 22 3B A5 75 3B D2 9A B9   5E AA 8B 29 0E 7E 85 F5  ";.u;...^..)....
#     00B0: 79 3F 8C 54 00 4A A4 CA   4D F7 27 E1 F9 8C C2 67  y?.T.J..M.'....g
#     00C0: B9 9A 05 57 FC 26 38 2D   EC 6C 7B 0D 96 96 5E 7E  ...W.&8-.l....^.
#     00D0: 35 57 03 54 60 BC 4A 79   E5 FE 4F 83 4E 50 75 18  5W.T`.Jy..O.NPu.
#     00E0: 90 CD 1A 13 56 42 B0 D2   DB 5A 81 6E 22 77 16 1B  ....VB...Z.n"w..
#     00F0: B1 F2 BE B8 DE 34 9D B8   2B F4 7A 91 AE 7E C9 50  .....4..+.z....P
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.188 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8B D0 23 8B 37 34 59 B2   E0 7E 54 AC AA 3F 73 85  ..#.74Y...T..?s.
#     0010: 2B 0F A1 10 CE 7D 54 41   88 BF 59 6A 21 CA 04 30  +.....TA..Yj!..0
#     0020: 61 43 5C 5D DE EB 7F 20   0E 02 08 22 3C 3E AC 49  aC\]... ..."<>.I
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.189 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:17:54.241 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "02 16 1D DE 74 00 82 CD 79 B9 33 5E C3 AD 7B 11 9C 9D CD B4 11 81 3F 07 B3 CD 0F 04 33 24 F4 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 12:17:54.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 12:17:54.288 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 12:17:54.288 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 12:17:54.288 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-14 12:17:54.533 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 12:17:54.534 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-14 12:18:08.434; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 12:18:08.801 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 5F 28 D0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:28.000 UTC",
#       "not  after"         : "2024-01-12 12:17:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#           0010: 7C 3B 46 C2                                        .;F.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 56 F1 8E 9A 7A 1A D5   CD F9 CD 4E EE 4E 2B F6  EV...z.....N.N+.
#           0010: 07 72 6E 9D                                        .rn.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F CF 1F F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 12:17:26.000 UTC",
#       "not  after"         : "2024-01-12 12:17:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 6E 9D E1 4E 45 01 9E   33 3D ED 80 15 B8 12 BC  Mn..NE..3=......
#           0010: 7C 3B 46 C2                                        .;F.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 12:18:08.815 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:18:08.977 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:18:08.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:18:08.979 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 12:18:08.979 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:18:08.984 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:18:08.995 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:18:08.996 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:18:08.996 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 12:18:08.998 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "BC D3 C9 CE D7 C0 76 68 A7 94 40 EC 64 F2 7F D9 E0 69 50 61 3C A1 3C 8F 44 A9 40 0E 24 E3 DE 1C",
#     "session id"          : "EB FC 2E CB 54 02 80 BB 88 95 40 FB 12 E5 0F DB 42 5D B2 79 28 74 EE 40 04 12 FC 7C 3C C9 DA F8",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 44 34 87 0C 3A 74 F2 C1   00 C5 18 F7 A7 84 09 99  D4..:t..........
#               0010: 06 01 CC 66 C0 87 EA E1   88 F6 D2 6D E5 F5 F0 14  ...f.......m....
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.014 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E1 C2 D2 B7 C6 8B EA 7D 34 A2 B1 97 3E BC C3 A2 98 B2 A7 10 1E F1 3C F3 8C E0 2F 4E AB F0 CD 03",
#     "session id"          : "EB FC 2E CB 54 02 80 BB 88 95 40 FB 12 E5 0F DB 42 5D B2 79 28 74 EE 40 04 12 FC 7C 3C C9 DA F8",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 76 37 81 5F C0 4A 1F 6B   33 79 9A 83 68 DE 1F 28  v7._.J.k3y..h..(
#             0010: 11 FF 31 06 BE CD 87 EE   5C D2 BD C3 D5 33 56 00  ..1.....\....3V.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.014 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.014 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.015 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.017 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.017 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.017 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.018 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.025 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.026 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.027 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.031 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.031 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.031 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.031 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.031 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.031 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.031 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:18:09.032 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:18:09.032 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.033 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.033 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.033 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.033 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.034 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.035 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:18:09.035 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 12:18:09.038 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "7A B4 C3 FB",
#         "signature algorithm": "SHA256withRSA",
#         "issuer"             : "CN=localho

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 12:19:22.069 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:44804/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14533ms
ok 75 stop command for single port in 17687ms
ok 76 status detects locally running solr in 9583ms
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7661ms
ok 78 status help flag outputs message highlighting not to use solrUrl. in 1094ms
ok 79 listing out files in 3051ms
ok 80 copying files around in 6716ms
ok 81 upconfig in 2625ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1249ms
ok 84 Cleanup in 2136ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 6m 32s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ntkrupxgabtue

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8180 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8180/

All tests passed

Build Log:
[...truncated 1159 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:36921/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-14 09:52:20.485; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 09:52:20.490; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:36921/solr] to [https://127.0.0.1:36921].
# WARN  - 2023-10-14 09:52:21.334; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 09:52:21.388; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 21373ms
ok 71 start solr with client truststore and security manager in 21412ms
not ok 72 start solr with mTLS needed in 51393ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2EiJ3m/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 36921 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 36921 (pid=3080957). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 36922 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 36922 (pid=3081066). Happy searching!
#
#     INFO  - 2023-10-14 09:53:28.897; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 09:53:28.903; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 09:53:29.615; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 09:53:29.618; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 09:53:29.618; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:30.062 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 52 F6 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:16.000 UTC",
#     "not  after"         : "2024-01-12 09:53:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 1E 23 AC 96 07 7D 58   40 0B F2 19 1B CB 3D BD  ..#....X@.....=.
#         0010: 1E 03 E7 2B                                        ...+
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 86 5D BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:09.000 UTC",
#     "not  after"         : "2024-01-12 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:30.068 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 86 5D BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:09.000 UTC",
#     "not  after"         : "2024-01-12 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 E5 5C 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:07.000 UTC",
#     "not  after"         : "2024-01-12 09:53:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:30.087 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:30.327 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:30.328 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:30.329 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:30.330 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:30.335 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:30.353 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:30.354 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:30.354 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:30.356 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "16 9E 9B 69 41 90 A1 4A B2 2F C1 FD A0 0E E1 3D 78 6D 28 FC 5F D1 C4 F7 B4 CE A4 6D 7F 76 69 0F",
#   "session id"          : "3C BE E3 7C 8C 25 5F 00 A1 E3 53 90 D8 66 DB 3A 67 FE 6E 66 A2 21 0E C9 32 E4 25 85 EB 95 9D 46",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C6 C7 7F 2C D1 0F 3F 0B   1B A3 F4 5D A9 E1 EB 31  ...,..?....]...1
#             0010: 57 44 C8 F1 3F C0 1F DE   C5 C8 BA 61 1C C8 F1 37  WD..?......a...7
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.502 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2E 0C BF D3 F7 CB 11 19 A3 C8 0F D4 66 47 48 19 0C 04 5A 36 1E 69 C9 13 93 A6 02 FB 0E 19 E8 62",
#   "session id"          : "3C BE E3 7C 8C 25 5F 00 A1 E3 53 90 D8 66 DB 3A 67 FE 6E 66 A2 21 0E C9 32 E4 25 85 EB 95 9D 46",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CD 2E 84 24 54 D8 1D 18   2D 83 4C 99 13 74 E3 1D  ...$T...-.L..t..
#           0010: B8 B7 FB 99 72 9B 47 0C   04 F8 80 EA 26 0C AE 57  ....r.G.....&..W
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.502 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.502 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.518 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.530 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.536 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.536 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.537 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.537 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.537 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.558 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.559 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.560 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.565 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.568 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.568 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.568 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.569 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.569 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.569 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.576 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.576 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.577 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.579 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.580 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.580 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.588 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 74 80 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:12.000 UTC",
#       "not  after"         : "2024-01-12 09:53:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#           0010: 71 4C 45 E2                                        qLE.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 56 46 8A 0F 4A 77 89   47 C0 D3 CD 03 99 4A 57  .VF..Jw.G.....JW
#           0010: 7C 14 1D 3C                                        ...<
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.588 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.678 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 86 5D BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:09.000 UTC",
#     "not  after"         : "2024-01-12 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.686 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 B7 69 88 ED 06 0F B8   16 DB C6 77 C2 FA 7A 7F  ..i........w..z.
#     0010: FE 24 28 02 78 A7 14 B0   5B 34 38 BA 55 9F 35 44  .$(.x...[48.U.5D
#     0020: 36 1B CD 90 7E 0D 2C 87   B8 A4 91 19 81 9A 03 83  6.....,.........
#     0030: 57 FA C0 97 22 5D 8A 40   BD F9 2C D2 50 BE 02 FD  W..."].@..,.P...
#     0040: 24 FA C1 86 4E E0 E7 25   74 59 BC 91 2D D8 84 24  $...N..%tY..-..$
#     0050: F5 EB 4E AE DB F7 DC DC   01 B9 47 E4 5D 1E B1 2B  ..N.......G.]..+
#     0060: 4A B3 0E 2B D1 D8 BD 4A   E4 19 F5 00 4A 37 73 71  J..+...J....J7sq
#     0070: 00 BF 00 67 3E 80 E2 E6   BD 60 BC C3 41 A1 72 02  ...g>....`..A.r.
#     0080: 94 09 1D 41 AA BE 9D 6F   6D 7C 03 90 AD C9 DF 65  ...A...om......e
#     0090: 86 40 89 32 0B A9 C0 38   C0 88 8B 9F 73 77 B0 93  .@.2...8....sw..
#     00A0: AC 95 94 B3 BD 57 DA 1E   07 5E 27 A7 BC 69 00 A5  .....W...^'..i..
#     00B0: EE 8E BE 7D E3 C1 DF 4A   C9 76 B3 49 E4 54 D8 88  .......J.v.I.T..
#     00C0: 70 52 2F 25 EA 09 A8 FD   AC CF 19 26 5D 37 6E B1  pR/%.......&]7n.
#     00D0: D8 5B 12 5A 00 BC 20 F1   43 C1 91 D9 2B F5 D6 13  .[.Z.. .C...+...
#     00E0: 75 9A EE CF 5B 3B 31 89   3F 86 74 66 49 F5 11 85  u...[;1.?.tfI...
#     00F0: B8 F0 34 03 8F 94 3E 04   83 BF 7B EB 0C 63 59 6D  ..4...>......cYm
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.689 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DA 84 1E 87 4F 21 1B B2   F2 8B 86 9F EE C4 1D C7  ....O!..........
#     0010: D4 B7 F3 D7 BA 43 25 E1   93 A0 46 DF D6 BE 65 37  .....C%...F...e7
#     0020: 8D 3F 45 15 A3 74 28 19   DB 26 4C F6 B6 83 A8 73  .?E..t(..&L....s
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.702 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 09:53:30.703 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.703 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 09:53:30.704 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.704 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 09:53:30.704 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:30.711 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:30.711 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:30.712 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:30.712 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:30.711 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.714 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.722 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 52 F6 2C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:16.000 UTC",
#       "not  after"         : "2024-01-12 09:53:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#           0010: 71 4C 45 E2                                        qLE.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 1E 23 AC 96 07 7D 58   40 0B F2 19 1B CB 3D BD  ..#....X@.....=.
#           0010: 1E 03 E7 2B                                        ...+
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 86 5D BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:09.000 UTC",
#       "not  after"         : "2024-01-12 09:53:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#           0010: D6 23 B6 B8                                        .#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#           0010: 71 4C 45 E2                                        qLE.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.757 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 02 11 66 61 75 81 0D 20   F7 9C 5D 52 ED F2 8A 76  ..fau.. ..]R...v
#     0010: 0A 4C 03 BF 79 8D 10 00   DE C7 24 09 2C 3D A1 0E  .L..y.....$.,=..
#     0020: 86 7A B1 AA D7 E1 9B 40   79 EA 6F AA 63 B9 7B 0C  .z.....@y.o.c...
#     0030: 72 05 08 82 42 39 E9 DB   E5 BC 6F F1 91 15 A7 D3  r...B9....o.....
#     0040: 2D AE F9 C8 AB 2D EE 10   D6 61 B2 C4 A8 01 DB 14  -....-...a......
#     0050: 35 E7 AC 1F FD C4 96 8E   B5 D2 4E 93 3B A7 DF C6  5.........N.;...
#     0060: 9D C2 AC 5B F5 E0 64 86   B1 19 B0 66 14 84 F8 51  ...[..d....f...Q
#     0070: 41 D6 5F CB 73 AD 78 E1   72 48 8F D1 7B 0E 57 74  A._.s.x.rH....Wt
#     0080: 5E 50 AA 2D 1A 4D 93 CD   0B B8 4A 6C 10 1B FD D7  ^P.-.M....Jl....
#     0090: 7D A2 7D 0E E1 97 FB 14   9D 7F 0F 4F 21 F1 03 C2  ...........O!...
#     00A0: 64 53 AD D7 67 4D 14 9E   BB 76 06 CF FF A7 CB F4  dS..gM...v......
#     00B0: EF B0 74 FC 3A 03 E9 E2   E0 A0 A3 47 51 BB B7 2E  ..t.:......GQ...
#     00C0: 45 26 B1 97 97 9B E4 C5   02 41 99 4F 9E 2A FE DE  E&.......A.O.*..
#     00D0: 1E BF 86 AF EE 6F 32 AB   AA 22 A9 E7 16 90 59 29  .....o2.."....Y)
#     00E0: A9 5B 57 8F C2 72 D4 77   BA 55 44 F6 95 BE 63 49  .[W..r.w.UD...cI
#     00F0: 51 72 75 B1 FA 14 09 E8   7E 1D 2F 4A DF 35 93 7A  Qru......./J.5.z
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.759 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 75 31 3A 32 78 21 35 AE   6A 74 B8 03 CE 33 60 4F  u1:2x!5.jt...3`O
#     0010: 53 B5 31 76 B1 47 4B CE   5C D1 41 37 90 47 31 D3  S.1v.GK.\.A7.G1.
#     0020: 72 6D 6E 4F 3B A8 2C 9A   2B AC 51 DA 5D 0B 21 9F  rmnO;.,.+.Q.].!.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.762 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:30.992 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "90 92 11 17 1F ED AE 58 74 0C 4D C7 B3 A5 60 FE DF 8A 37 7E 87 FA 01 41 EF 25 EA A3 6F 9A 1D DC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 09:53:31.937 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 09:53:31.938 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 09:53:33.753; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 09:53:33.758; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 09:53:34.185; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@25ddbbbb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@757d6814[provider=null,keyStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 09:53:34.188; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@757d6814[provider=null,keyStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 09:53:34.188; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(ca,h=[localhost],a=[],w=[]) for Client@757d6814[provider=null,keyStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2EiJ3m/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:34.230 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 52 F6 2C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:16.000 UTC",
#     "not  after"         : "2024-01-12 09:53:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F5 1E 23 AC 96 07 7D 58   40 0B F2 19 1B CB 3D BD  ..#....X@.....=.
#         0010: 1E 03 E7 2B                                        ...+
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 86 5D BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:09.000 UTC",
#     "not  after"         : "2024-01-12 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:34.234 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 86 5D BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:09.000 UTC",
#     "not  after"         : "2024-01-12 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 E5 5C 51",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:07.000 UTC",
#     "not  after"         : "2024-01-12 09:53:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:34.247 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:34.421 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:34.421 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:34.423 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:34.423 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:34.427 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:34.440 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:34.440 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:34.440 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:34.447 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:34.447 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:34.447 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 09:53:34.447 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:34.449 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B4 96 FD D8 8B EC 8A 0C E9 20 F1 F2 79 EC 97 F8 48 88 9D E4 CC 68 EE C6 58 76 37 25 29 6B A8 EE",
#   "session id"          : "87 5E 16 0C 6D 57 6D D4 18 F0 B1 89 50 9B 8C F2 74 CA A3 9E E4 26 70 40 81 52 27 53 26 F3 2F 4A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F FB A1 B9 D0 95 34 49   F1 52 40 4C A4 E8 71 25  ......4I.R@L..q%
#             0010: 5B 24 D4 E3 DD 27 18 BA   3C 18 20 30 E0 67 B7 54  [$...'..<. 0.g.T
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.600 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "27 6A 56 EB 06 D5 80 83 FE 19 21 B8 0C 04 D1 66 6B 8C A3 A3 23 66 BE EF 2C 81 60 59 50 AE 7B DB",
#   "session id"          : "87 5E 16 0C 6D 57 6D D4 18 F0 B1 89 50 9B 8C F2 74 CA A3 9E E4 26 70 40 81 52 27 53 26 F3 2F 4A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FA 6F 9D C4 AC 2A 00 83   94 B4 A7 4A 63 AA 6B 12  .o...*.....Jc.k.
#           0010: 29 B3 4F 6F 8E D3 58 43   D8 E3 32 A3 A5 54 41 5D  ).Oo..XC..2..TA]
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.601 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.601 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.604 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.610 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.610 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.610 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.613 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.613 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.614 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.614 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.615 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.641 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.643 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.650 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.657 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.657 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.657 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.658 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.658 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.658 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.658 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.658 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.659 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.659 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.660 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.660 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.660 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.661 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.661 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.674 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 74 80 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:12.000 UTC",
#       "not  after"         : "2024-01-12 09:53:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#           0010: 71 4C 45 E2                                        qLE.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 56 46 8A 0F 4A 77 89   47 C0 D3 CD 03 99 4A 57  .VF..Jw.G.....JW
#           0010: 7C 14 1D 3C                                        ...<
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.674 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.731 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 86 5D BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 09:53:09.000 UTC",
#     "not  after"         : "2024-01-12 09:53:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#         0010: D6 23 B6 B8                                        .#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#         0010: 71 4C 45 E2                                        qLE.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.735 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 42 60 CE A7 4E 99 F5 BA   22 AF 81 5C A4 4E 99 DE  B`..N..."..\.N..
#     0010: 58 EB AC FC 8C 0E 79 72   2C CC D7 54 71 D6 6A 36  X.....yr,..Tq.j6
#     0020: 7D 23 48 6C A4 10 C0 D3   A6 5F 43 D7 F9 CF 79 F3  .#Hl....._C...y.
#     0030: 63 F8 65 C6 85 08 01 44   B6 E9 62 C8 C5 EF 52 4C  c.e....D..b...RL
#     0040: 66 D2 13 E8 10 84 11 A0   D6 81 16 FF 1B 74 11 93  f............t..
#     0050: DB 00 2C 36 A9 C5 D3 43   05 E1 8A 93 54 1A 3D B2  ..,6...C....T.=.
#     0060: 7A EA 59 EE B5 23 4A 9D   CB 57 F0 1A 07 4A 6B 6A  z.Y..#J..W...Jkj
#     0070: 34 55 90 58 89 84 DC C7   2E 92 48 36 2E 63 C9 D4  4U.X......H6.c..
#     0080: DA A8 C8 30 95 E5 40 81   EC 17 C2 66 79 D6 FD A2  ...0..@....fy...
#     0090: F0 58 81 0B 3B F2 7D 13   53 BE 37 4F 1C B5 75 59  .X..;...S.7O..uY
#     00A0: 2D 15 B7 B7 59 4A 61 A8   DD D0 3F 75 2A 6B 63 CA  -...YJa...?u*kc.
#     00B0: 97 C9 43 7A 33 AC E5 2B   7A 96 4C C4 1E 79 2E 90  ..Cz3..+z.L..y..
#     00C0: C9 E8 E8 A4 CC AB 43 34   31 19 3A DE B3 BE F3 2A  ......C41.:....*
#     00D0: FE 8D 98 37 A4 59 9C FD   8B 5B 9F 42 38 FD 4A 03  ...7.Y...[.B8.J.
#     00E0: 25 68 A6 43 86 28 4E 76   FB 88 DA 0A 43 B7 B8 67  %h.C.(Nv....C..g
#     00F0: B7 C1 9D DC FA 5B 66 86   11 7B 03 95 23 33 97 CB  .....[f.....#3..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.736 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 52 2D 32 6D AA C1 6D   2F 7F 4D 81 76 F5 10 89   R-2m..m/.M.v...
#     0010: 8D 71 D8 ED C2 3F E1 CF   3D 84 B1 3D F7 51 FD 0D  .q...?..=..=.Q..
#     0020: B6 4A A0 61 4B 6C 4B A6   73 66 87 C5 17 ED EC 7C  .J.aKlK.sf......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.738 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 09:53:34.739 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.739 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 09:53:34.739 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.739 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 09:53:34.739 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:34.740 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.740 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.742 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 52 F6 2C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:16.000 UTC",
#       "not  after"         : "2024-01-12 09:53:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#           0010: 71 4C 45 E2                                        qLE.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F5 1E 23 AC 96 07 7D 58   40 0B F2 19 1B CB 3D BD  ..#....X@.....=.
#           0010: 1E 03 E7 2B                                        ...+
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 86 5D BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:09.000 UTC",
#       "not  after"         : "2024-01-12 09:53:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#           0010: D6 23 B6 B8                                        .#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#           0010: 71 4C 45 E2                                        qLE.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.764 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 3D 8E E8 77 8B 14 A5   C9 38 06 12 C4 21 5E 1A  b=..w....8...!^.
#     0010: C9 AF 0B E7 C9 3E 2E 87   12 6C 04 99 49 6F 71 4C  .....>...l..IoqL
#     0020: 16 B0 3C C2 36 CA 7A 3D   3A 8D 91 F1 C4 27 1D 78  ..<.6.z=:....'.x
#     0030: 7F 12 EB 8C 33 1F 7E A0   BB 3A 9B ED 45 50 47 D9  ....3....:..EPG.
#     0040: D2 98 57 A8 2A C4 D6 F5   81 7A 1B 0A 7C 34 EA B1  ..W.*....z...4..
#     0050: 1B DA 82 50 1E 61 8A A0   56 BC 82 C6 40 6C 52 4C  ...P.a..V...@lRL
#     0060: 62 3A 76 4E 1A E6 79 47   3D 4F CD 47 C7 17 86 D8  b:vN..yG=O.G....
#     0070: 8D 10 D6 11 92 6A 6E A3   12 04 89 38 BD D2 86 EA  .....jn....8....
#     0080: 55 83 EA 1F 30 16 A5 8C   06 C3 E3 1A 2E 80 3D 6D  U...0.........=m
#     0090: D8 25 F6 B5 2D E5 3B D3   9A C6 FB F7 76 3E 2E 05  .%..-.;.....v>..
#     00A0: FC 42 55 D9 92 2B 01 F2   A9 89 C1 7E F9 D1 13 8E  .BU..+..........
#     00B0: C2 E0 D9 FF 19 D8 72 19   B5 ED 1D DE 2F A2 0E 06  ......r...../...
#     00C0: 8E CE 2E 6E 63 8E 6F A3   D6 03 BF 84 00 46 DE 24  ...nc.o......F.$
#     00D0: F0 21 B7 85 E6 B9 E3 E9   FB 0E BD 9D 04 2F 3B 6C  .!.........../;l
#     00E0: 12 CE C6 E5 B0 91 33 1F   2B 74 DA D2 D0 E0 57 73  ......3.+t....Ws
#     00F0: 09 CB BF 89 4E 35 8B 5E   A5 28 2F 16 58 6E 9A BE  ....N5.^.(/.Xn..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.765 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B ED 2E 4B BE AE B8 82   58 08 90 46 B2 C0 42 D5  ...K....X..F..B.
#     0010: 8B 71 22 53 56 BB BD 25   33 5E 07 13 DF FE 3E 6B  .q"SV..%3^....>k
#     0020: 72 BA 85 2C D9 03 14 7D   D9 91 0E 09 4F E6 00 44  r..,........O..D
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.766 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:34.910 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "40 BF D7 26 C3 16 A1 B6 AC 24 F1 28 B0 CE 01 F0 66 B0 F5 3D 56 92 0E 10 BC F1 EC 2D 8E 27 DC 92",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 09:53:35.209 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 09:53:35.210 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-14 09:53:48.561; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:48.890 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 86 5D BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:09.000 UTC",
#       "not  after"         : "2024-01-12 09:53:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#           0010: D6 23 B6 B8                                        .#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 FC 08 C3 B8 C0 41 91   52 0F 33 F9 AC 6E BD 07  7.....A.R.3..n..
#           0010: 71 4C 45 E2                                        qLE.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 E5 5C 51",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 09:53:07.000 UTC",
#       "not  after"         : "2024-01-12 09:53:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7B F2 31 9A 41 70 95 3A   4F AE 7E 0C AE C1 36 50  ..1.Ap.:O.....6P
#           0010: D6 23 B6 B8                                        .#..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 09:53:48.903 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:49.105 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:49.105 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:49.107 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 09:53:49.107 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:49.112 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:49.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:49.123 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:49.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 09:53:49.125 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "E6 4F 70 08 33 62 48 D1 72 01 15 76 D7 0D 8B 39 FA 65 26 42 2E 6E 58 D1 9C 66 19 CC 8E A5 D4 8C",
#     "session id"          : "3D B5 0B 88 59 3D 7D F4 72 63 17 34 5A E2 17 F9 96 DB 0B 4C 90 E5 48 46 0A 6B 4B 4D 5B 83 17 BF",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: B5 01 0E 16 56 3E A0 0F   FF 13 24 E3 BA 57 9E 23  ....V>....$..W.#
#               0010: BA 25 E7 BD E5 2D E7 10   65 1B 47 F5 53 51 12 44  .%...-..e.G.SQ.D
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.144 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D8 8B B7 29 34 6F DA 30 41 D7 78 FE 11 AA 52 0F 38 23 52 01 39 FD BA 30 18 45 9B 0E 27 A3 61 03",
#     "session id"          : "3D B5 0B 88 59 3D 7D F4 72 63 17 34 5A E2 17 F9 96 DB 0B 4C 90 E5 48 46 0A 6B 4B 4D 5B 83 17 BF",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 10 EE 21 45 4C E5 8C E8   78 FA 67 17 41 96 89 58  ..!EL...x.g.A..X
#             0010: C1 5F 38 F1 31 97 1A 0A   2F A0 DF EE 31 22 20 62  ._8.1.../...1" b
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.144 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.144 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.146 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.146 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.146 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.147 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:49.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:49.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.155 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.157 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.158 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.161 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.161 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.161 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.161 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.162 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.162 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.162 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:49.162 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:49.162 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.163 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.163 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.163 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.164 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.164 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 09:53:49.165 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:53:49.165 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 09:55:03.004 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:36922/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14739ms
ok 75 stop command for single port in 18153ms
ok 76 status detects locally running solr in 9453ms
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7537ms
ok 78 status help flag outputs message highlighting not to use solrUrl. in 1104ms
ok 79 listing out files in 2829ms
ok 80 copying files around in 6744ms
ok 81 upconfig in 2739ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1256ms
ok 84 Cleanup in 2098ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vwcaa26taby4i

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8179 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8179/

All tests passed

Build Log:
[...truncated 1273 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32977/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-14 05:58:54.741; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 05:58:54.746; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:32977/solr] to [https://127.0.0.1:32977].
# WARN  - 2023-10-14 05:58:55.550; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 05:58:55.609; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17257ms
ok 71 start solr with client truststore and security manager in 20320ms
not ok 72 start solr with mTLS needed in 56311ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-mhYOWr/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 32977 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32977 (pid=2564314). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 32978 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32978 (pid=2564426). Happy searching!
#
#     INFO  - 2023-10-14 05:59:59.753; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 05:59:59.761; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 06:00:00.878; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 06:00:00.881; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 06:00:00.883; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:00.950 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 89 22 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:45.000 UTC",
#     "not  after"         : "2024-01-12 05:59:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 92 2C 54 26 B4 D2 D0   F3 08 DF 52 5E EA C0 4B  +.,T&......R^..K
#         0010: 2A 6C 34 99                                        *l4.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E C6 D1 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:38.000 UTC",
#     "not  after"         : "2024-01-12 05:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:00.956 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 66 E9 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:36.000 UTC",
#     "not  after"         : "2024-01-12 05:59:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E C6 D1 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:38.000 UTC",
#     "not  after"         : "2024-01-12 05:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:00.971 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:01.176 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:01.176 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:01.176 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:01.176 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:01.531 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:01.532 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:01.536 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:01.537 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:01.551 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:01.575 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:01.575 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:01.576 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:01.592 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "48 B7 96 B0 D4 E6 8F 7B CD C7 10 AA 3D 02 86 EE CB D1 33 F7 B4 F1 F6 21 8A 39 8C 83 78 6B 23 3E",
#   "session id"          : "C7 52 BD 63 B7 08 99 8B BD 04 59 6F DA AF F1 91 6C 7C 76 10 28 39 20 7B 4C EC CB B1 F7 4B 10 61",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E 43 60 76 8D 7B 9C F3   91 A6 EF 2B D5 F1 BB CD  ^C`v.......+....
#             0010: A0 73 7C 1D F5 4E B4 7A   76 76 AE 4F AD 6A 00 7F  .s...N.zvv.O.j..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.820 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "40 4B 8D AD 57 E9 B4 C6 26 B8 85 5C FE 2A 0E 6D AA 99 ED 56 AC 7C E1 D1 E1 F8 B5 E5 8F 20 0F B8",
#   "session id"          : "C7 52 BD 63 B7 08 99 8B BD 04 59 6F DA AF F1 91 6C 7C 76 10 28 39 20 7B 4C EC CB B1 F7 4B 10 61",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D0 58 F0 CD 8D 97 63 A3   75 83 8B D6 19 E4 BC F3  .X....c.u.......
#           0010: A9 5E CB C2 7C 9A DF B4   07 85 AB F2 49 EC 1C 04  .^..........I...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.821 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.821 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.830 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.830 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.830 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.832 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.832 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.838 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.838 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:01.838 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:01.838 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.838 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.838 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.866 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.868 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.869 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.882 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.889 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.890 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.890 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.890 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:01.897 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:01.898 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.899 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.900 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.900 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:01.903 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.007 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.008 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:02.008 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.027 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 F9 E5 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:41.000 UTC",
#       "not  after"         : "2024-01-12 05:59:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#           0010: 58 D3 58 20                                        X.X
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 B4 AF 26 28 E9 D6 F7   9E 24 A4 33 7E FC AD FA  c..&(....$.3....
#           0010: EF 7C 96 3E                                        ...>
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.028 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.148 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E C6 D1 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:38.000 UTC",
#     "not  after"         : "2024-01-12 05:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.152 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 08 60 C6 81 13 77 55 70   2F A9 46 11 69 0A 58 6A  .`...wUp/.F.i.Xj
#     0010: C8 FB 5E A0 77 6B CB 3C   81 72 3F 5F 96 90 CF 72  ..^.wk.<.r?_...r
#     0020: 0A 90 52 D7 88 A2 65 72   40 DC 42 81 4D 69 6D A6  ..R...er@.B.Mim.
#     0030: 8D 26 5E E2 27 3B FF BC   89 95 21 21 56 D6 67 1B  .&^.';....!!V.g.
#     0040: 5E 47 77 A3 CD E7 D2 FF   18 0F BD E1 2C 20 92 77  ^Gw........., .w
#     0050: 37 BA DE 4A D6 6F 6B 6F   4F 92 F1 F9 AF AA 9B D5  7..J.okoO.......
#     0060: B1 D1 15 81 27 52 95 95   69 48 D1 4A B2 2C 7F EB  ....'R..iH.J.,..
#     0070: 5E 5B 61 D8 53 17 13 88   73 FD EA 0F 4C 67 90 FF  ^[a.S...s...Lg..
#     0080: 99 7E 72 4F BB FC 42 32   0A 31 42 AE 32 15 C5 96  ..rO..B2.1B.2...
#     0090: 1C 00 43 83 DE 54 F1 FB   0A 50 B8 EF D8 A1 7B 39  ..C..T...P.....9
#     00A0: B6 F6 4E 26 8E A8 32 46   5F CC 1C 74 0F DD 1D 72  ..N&..2F_..t...r
#     00B0: 08 41 E0 CF E0 24 7E 8D   41 E5 F6 FB E9 A1 3E 0B  .A...$..A.....>.
#     00C0: CF 89 01 22 A8 2D 23 20   21 99 6A 60 24 BF 7C BD  ...".-# !.j`$...
#     00D0: 9B 6E FC A3 F8 8E 73 70   96 13 C2 23 41 45 62 40  .n....sp...#AEb@
#     00E0: 44 8A 2D A9 C8 77 A2 D4   DE F6 71 A3 BE 29 33 23  D.-..w....q..)3#
#     00F0: B6 82 A7 75 50 92 50 25   82 E3 23 1D 57 43 FB 25  ...uP.P%..#.WC.%
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.154 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C 9D 3F 02 78 95 1D 08   75 96 22 C0 34 E2 AB 4B  <.?.x...u.".4..K
#     0010: 44 2F B6 E8 09 61 5F 1D   B7 C0 B4 CB 29 FD B4 B2  D/...a_.....)...
#     0020: EC 12 09 89 AB F6 82 7A   63 DB FC F5 C6 4E BA 7F  .......zc....N..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.157 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 06:00:02.159 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:02.159 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 06:00:02.160 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:02.160 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 06:00:02.161 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:02.164 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.164 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.168 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 89 22 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:45.000 UTC",
#       "not  after"         : "2024-01-12 05:59:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#           0010: 58 D3 58 20                                        X.X
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 92 2C 54 26 B4 D2 D0   F3 08 DF 52 5E EA C0 4B  +.,T&......R^..K
#           0010: 2A 6C 34 99                                        *l4.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E C6 D1 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:38.000 UTC",
#       "not  after"         : "2024-01-12 05:59:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#           0010: 20 95 9D F0                                         ...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#           0010: 58 D3 58 20                                        X.X
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.230 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F 25 73 04 E5 AA B8 34   FE 54 05 32 C2 62 6E 4F  o%s....4.T.2.bnO
#     0010: 7E 54 BF C0 C5 CE C1 6A   0D 8A 6E 9B 77 94 A3 F9  .T.....j..n.w...
#     0020: F9 25 3C 84 88 E3 07 B3   3E 73 0B D2 30 A1 7A 7A  .%<.....>s..0.zz
#     0030: FD 32 11 66 5F E1 7F ED   AE 3B 37 8D 47 B2 44 C5  .2.f_....;7.G.D.
#     0040: 35 57 61 98 68 AE F6 EF   C5 2D 3B D5 43 2A 09 2D  5Wa.h....-;.C*.-
#     0050: BF C4 E4 32 DA 33 7B EE   30 C3 C3 E4 BA 2F 7A EA  ...2.3..0..../z.
#     0060: 99 C1 D5 75 8A C1 5F 42   8D 1F CE 1A FB D2 A4 90  ...u.._B........
#     0070: 04 5F 8E 92 C1 09 F3 E0   A0 8C 8A 3A D7 0B 63 76  ._.........:..cv
#     0080: 1A FD DC B1 9A 6D CD 45   7E 82 29 F0 E8 62 7A 80  .....m.E..)..bz.
#     0090: AA 54 D9 BC 0E 1C 1E F9   AD 77 90 6F F0 FC D4 7C  .T.......w.o....
#     00A0: 52 88 2E A5 8D B3 7D 27   85 EF 04 64 1A 69 9E D1  R......'...d.i..
#     00B0: C0 90 31 56 59 C0 EA 25   A9 A3 7E E5 8A 79 C0 1F  ..1VY..%.....y..
#     00C0: 9B F0 C8 B9 99 90 06 5A   8E 2E F2 0C E8 38 B6 0F  .......Z.....8..
#     00D0: F3 9C AC 15 F1 51 A6 58   0E DD 25 FD 9F D7 BF 9C  .....Q.X..%.....
#     00E0: 4B 13 BE 21 F3 21 0E 60   C6 9E 2C 2F 4D 38 E8 B2  K..!.!.`..,/M8..
#     00F0: EE A7 87 A7 75 06 CA 69   1A 75 F4 33 F1 71 FE 07  ....u..i.u.3.q..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.233 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4A 2E A1 F1 5E 6B 8B 7B   8F 6B 34 F3 54 F3 02 1E  J...^k...k4.T...
#     0010: 29 06 30 6B F0 7F AE 7B   85 71 F5 BB AE F1 0C 39  ).0k.....q.....9
#     0020: 13 5A B8 E5 14 BA 47 10   64 AE FA 92 60 0D 96 8A  .Z....G.d...`...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.239 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:02.576 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "85 76 8F E4 72 52 BC 93 45 01 92 30 7F 09 16 F6 1A 62 44 96 24 25 A7 1D EC 4A 7C 79 A9 BF A3 67",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 06:00:03.278 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 06:00:03.279 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-14 06:00:03.288 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-14 06:00:04.883; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 06:00:04.888; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 06:00:05.345; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 06:00:05.347; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 06:00:05.349; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-mhYOWr/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:05.564 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 89 22 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:45.000 UTC",
#     "not  after"         : "2024-01-12 05:59:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2B 92 2C 54 26 B4 D2 D0   F3 08 DF 52 5E EA C0 4B  +.,T&......R^..K
#         0010: 2A 6C 34 99                                        *l4.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E C6 D1 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:38.000 UTC",
#     "not  after"         : "2024-01-12 05:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:05.569 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 66 E9 62",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:36.000 UTC",
#     "not  after"         : "2024-01-12 05:59:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E C6 D1 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:38.000 UTC",
#     "not  after"         : "2024-01-12 05:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:05.586 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:05.832 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:05.833 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:05.835 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:05.835 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:05.840 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:05.853 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:05.854 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:05.854 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:05.860 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "99 9A 6C CB 97 09 7C 67 5F BE 56 09 CB 1C CF 29 57 0F CA 77 89 6B B5 25 3A 5E 5F 40 E3 A0 94 15",
#   "session id"          : "76 10 37 1C BA 49 80 23 44 E9 FF CE C9 54 59 FE FC 2F 3F 23 A8 97 BD EB 27 5E DB 77 77 6B 57 FB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2C 81 32 5C 9C F6 F1 0F   E7 89 53 40 7C FB C4 39  ,.2\......S@...9
#             0010: B5 22 C6 E1 AE 2B FB 02   18 62 FA 5D 22 23 42 52  ."...+...b.]"#BR
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.073 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "21 9E 24 F3 AB 06 13 BF 7D C5 5A 2A 3F 0A E3 A1 8B 3E 98 D2 96 75 C3 8E E1 63 8D DC 0B 65 5F 77",
#   "session id"          : "76 10 37 1C BA 49 80 23 44 E9 FF CE C9 54 59 FE FC 2F 3F 23 A8 97 BD EB 27 5E DB 77 77 6B 57 FB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 22 CF 37 01 3B 9F 0A 30   F8 AA 50 7B C9 33 03 06  ".7.;..0..P..3..
#           0010: 60 CD 09 35 5A AA B1 13   B4 FD 0C 04 25 53 AC 3B  `..5Z.......%S.;
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.073 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.074 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.074 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.074 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.074 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.074 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.075 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.075 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.075 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.075 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.077 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.077 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.077 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.077 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.078 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.093 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.094 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.101 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.105 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.105 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.105 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.105 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.106 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.106 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.106 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.106 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.107 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.108 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.108 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.108 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.109 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.110 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.110 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.137 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "25 F9 E5 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:41.000 UTC",
#       "not  after"         : "2024-01-12 05:59:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#           0010: 58 D3 58 20                                        X.X
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 B4 AF 26 28 E9 D6 F7   9E 24 A4 33 7E FC AD FA  c..&(....$.3....
#           0010: EF 7C 96 3E                                        ...>
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.140 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.246 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E C6 D1 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 05:59:38.000 UTC",
#     "not  after"         : "2024-01-12 05:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#         0010: 20 95 9D F0                                         ...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#         0010: 58 D3 58 20                                        X.X
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.249 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 66 55 9E 98 77 D2 35 94   6C 46 65 B1 0B 3E 74 DC  fU..w.5.lFe..>t.
#     0010: A9 47 C9 D6 C3 0A C9 3F   17 29 7C CF 52 78 67 44  .G.....?.)..RxgD
#     0020: A4 FF B8 02 F2 91 84 33   26 65 C9 36 54 AC 4C B6  .......3&e.6T.L.
#     0030: E1 29 A0 94 8D 47 CC 86   87 CD 86 04 2F 22 CA FE  .)...G....../"..
#     0040: A8 AD FD FA FF CB B7 E7   60 AB 91 C8 66 08 18 0B  ........`...f...
#     0050: 30 D3 4B 3E 81 D6 D7 41   5A 3E 19 6B 6A 92 73 5C  0.K>...AZ>.kj.s\
#     0060: FD 19 B4 A3 F0 DF A1 57   32 A2 EE ED 12 88 F6 05  .......W2.......
#     0070: B4 19 20 53 A2 D3 96 E5   32 0C B7 87 4D C3 35 C9  .. S....2...M.5.
#     0080: B2 E5 B3 8D 8B 57 A4 B7   1C E9 85 D7 BF B1 74 46  .....W........tF
#     0090: 36 C1 F9 A9 A3 3C AC E7   E4 97 3E F1 19 A5 FC 88  6....<....>.....
#     00A0: 8F 75 87 3A 98 41 43 2F   67 DE 96 4A E2 71 76 1D  .u.:.AC/g..J.qv.
#     00B0: F9 C6 FA 24 EA 3A 6F C0   52 D6 AE B5 B1 14 53 68  ...$.:o.R.....Sh
#     00C0: 48 B7 16 AF DC 08 AD E7   8A 21 E2 50 3A F0 DB 1E  H........!.P:...
#     00D0: BD 01 12 7B 06 50 54 0B   48 54 FC CA E6 0C A4 14  .....PT.HT......
#     00E0: 68 E2 CD 7C 30 64 B7 C5   D8 FF C2 62 EA 78 80 01  h...0d.....b.x..
#     00F0: 3E C9 67 0B B0 AC 5B 5B   EC 4F 87 1E 04 01 C3 EE  >.g...[[.O......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.251 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 97 6D 35 83 68 3C 7A D0   D9 1C 3F 00 C2 2E 15 15  .m5.h<z...?.....
#     0010: 3E 8E 3D 5C A7 9B E0 9F   3A 31 91 9E 79 08 3D B3  >.=\....:1..y.=.
#     0020: 51 11 04 39 CD CF 4D AE   E5 F0 7E 56 66 FE 9E 24  Q..9..M....Vf..$
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.252 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 06:00:06.253 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.253 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 06:00:06.254 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.254 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 06:00:06.254 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:06.254 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.254 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.258 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 89 22 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:45.000 UTC",
#       "not  after"         : "2024-01-12 05:59:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#           0010: 58 D3 58 20                                        X.X
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2B 92 2C 54 26 B4 D2 D0   F3 08 DF 52 5E EA C0 4B  +.,T&......R^..K
#           0010: 2A 6C 34 99                                        *l4.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E C6 D1 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:38.000 UTC",
#       "not  after"         : "2024-01-12 05:59:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#           0010: 20 95 9D F0                                         ...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#           0010: 58 D3 58 20                                        X.X
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.294 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 81 F0 A8 64 93 F8 CD FE   09 C7 E0 5D 44 C8 88 68  ...d.......]D..h
#     0010: 35 51 F6 F4 CF A4 2C 82   FE 5B 14 C8 F8 36 7E F2  5Q....,..[...6..
#     0020: 11 17 6A BD 6E 60 87 6D   C3 CD E5 0B F7 F9 FB 0D  ..j.n`.m........
#     0030: A3 1E 2D AE 5E F1 20 30   6B F6 7A 53 EF BF 75 61  ..-.^. 0k.zS..ua
#     0040: CA D9 82 F1 36 93 96 47   77 3A E0 44 FB B7 E6 99  ....6..Gw:.D....
#     0050: 9D 8E 7B 3C DE 4B 61 66   C8 19 91 E1 04 15 0A 38  ...<.Kaf.......8
#     0060: 96 F0 54 42 8F 04 CB 5B   87 00 F6 91 07 58 DF 1A  ..TB...[.....X..
#     0070: E3 45 99 6A 7A 45 F7 1F   78 F1 9B 6F 6D A9 ED EB  .E.jzE..x..om...
#     0080: 38 F8 5F 91 56 55 23 AB   0E 22 35 4C C9 E3 64 7E  8._.VU#.."5L..d.
#     0090: BA D6 90 3C 6A 80 BE EA   16 C2 10 95 74 E4 EA 6F  ...<j.......t..o
#     00A0: 82 A2 A8 37 9A 5C 14 A7   71 10 67 76 F2 BC 2E AE  ...7.\..q.gv....
#     00B0: C5 40 58 7A FF 34 41 B1   DD F3 50 56 ED 84 92 E1  .@Xz.4A...PV....
#     00C0: 65 B4 FD C4 A3 53 5D 15   00 6F 5E 9E 32 81 C1 35  e....S]..o^.2..5
#     00D0: A1 6C 27 18 6F 62 7A D2   15 ED 06 D1 92 55 7A 61  .l'.obz......Uza
#     00E0: FE 77 C4 3F 67 90 99 9E   9C CB 54 54 3E 72 EA B6  .w.?g.....TT>r..
#     00F0: D8 64 0A B0 32 9E 67 E9   C4 10 1F CC 04 97 E2 E0  .d..2.g.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.299 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE AB 63 2B B2 85 D0 D0   88 D4 64 91 80 64 83 BC  ..c+......d..d..
#     0010: B2 CF 1C 97 E7 2A 2E 4D   7E 87 ED CC 21 37 8F 93  .....*.M....!7..
#     0020: F1 B5 13 6F 4A 16 C6 DE   E3 50 EB CE 3E 8D E7 CE  ...oJ....P..>...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.302 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:06.367 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:06.367 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:06.367 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 06:00:06.367 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:06.499 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "64 9C 1E 48 CF E4 DB 17 3A C5 F0 FB A4 ED 59 91 88 FB 20 E5 5C 85 FC CA 8D B7 12 9A EA B1 E0 F0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 06:00:06.906 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 06:00:06.906 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-14 06:00:06.915 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-14 06:00:21.909; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:22.375 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 66 E9 62",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:36.000 UTC",
#       "not  after"         : "2024-01-12 05:59:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#           0010: 20 95 9D F0                                         ...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E C6 D1 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 05:59:38.000 UTC",
#       "not  after"         : "2024-01-12 05:59:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 88 A9 09 AA 00 F1 86 7D   D6 BB CD 32 BA 89 E1 D6  ...........2....
#           0010: 20 95 9D F0                                         ...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 48 15 41 00 5A 79 DE 28   6B 88 74 DB 30 AD 62 69  H.A.Zy.(k.t.0.bi
#           0010: 58 D3 58 20                                        X.X
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 06:00:22.388 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:22.548 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:22.548 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:22.550 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 06:00:22.550 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:22.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:22.567 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:22.567 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:22.567 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 06:00:22.569 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "E2 76 6A 5B 3C 1B 7B E0 58 CC 31 79 6A A6 42 8C 38 0B 50 29 DF 7A 81 8B A3 12 93 22 F2 C8 61 05",
#     "session id"          : "A4 67 DF 48 CA 2D 82 93 EE 66 F8 9A A6 A3 08 DF C7 BD B5 77 D6 43 FC D7 36 5B B4 89 73 19 94 FE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 61 57 24 2E 1F B1 2D B2   3C 5F 58 A5 17 43 AF 61  aW$...-.<_X..C.a
#               0010: F2 63 A8 C7 5E 3C B7 15   CB CA 51 5D C8 34 0B 44  .c..^<....Q].4.D
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.586 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "18 D7 B9 F2 CF 32 3C 8E DB 6E CC F7 F4 F8 16 DA 90 25 5F 4B 7D AD A3 22 A1 F0 B2 1A B1 E0 F9 3F",
#     "session id"          : "A4 67 DF 48 CA 2D 82 93 EE 66 F8 9A A6 A3 08 DF C7 BD B5 77 D6 43 FC D7 36 5B B4 89 73 19 94 FE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1C FE DB A0 35 D9 A0 D1   BA 01 49 79 49 6E C7 44  ....5.....IyIn.D
#             0010: EF FF 70 2A 37 A7 18 F1   8B F4 5E 35 59 F5 27 06  ..p*7.....^5Y.'.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.586 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.586 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.586 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.587 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.587 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.587 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.587 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.587 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.587 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.587 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:22.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:22.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.598 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.599 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.602 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:22.605 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 06:00:22.606 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.607 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.607 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.607 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 06:00:22.607 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14766ms
ok 75 stop command for single port in 18568ms
not ok 76 status detects locally running solr in 1576ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7439ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1544ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2414ms
ok 80 copying files around in 7405ms
ok 81 upconfig in 4272ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1255ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1280ms
not ok 84 Cleanup in 2540ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 43s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/323gw737ujm7w

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8178 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8178/

All tests passed

Build Log:
[...truncated 1479 lines...]
BUILD FAILED in 1h 7m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3hi3do2lobpzo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8177 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8177/

All tests passed

Build Log:
[...truncated 1267 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46467/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-14 00:10:46.601; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 00:10:46.605; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:46467/solr] to [https://127.0.0.1:46467].
# WARN  - 2023-10-14 00:10:47.448; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-14 00:10:47.502; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17318ms
ok 71 start solr with client truststore and security manager in 19607ms
not ok 72 start solr with mTLS needed in 52372ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-tKHCXY/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 46467 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46467 (pid=2054776). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 46468 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 46468 (pid=2054901). Happy searching!
#
#     INFO  - 2023-10-14 00:11:49.627; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 00:11:49.634; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 00:11:50.519; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 00:11:50.522; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 00:11:50.522; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 24:11:50.598 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 5C E7 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:36.000 UTC",
#     "not  after"         : "2024-01-12 24:11:36.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC AE B8 A9 FD 4E 99 C6   7D EE 71 A8 BE C2 BD 48  .....N....q....H
#         0010: D3 39 75 CD                                        .9u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 74 7A 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:29.000 UTC",
#     "not  after"         : "2024-01-12 24:11:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 24:11:50.606 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D B5 1E 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:27.000 UTC",
#     "not  after"         : "2024-01-12 24:11:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 74 7A 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:29.000 UTC",
#     "not  after"         : "2024-01-12 24:11:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 24:11:50.625 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:50.977 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:50.977 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:50.977 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:50.978 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:11:51.023 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:51.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:11:51.025 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:11:51.031 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:51.035 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:51.047 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:51.047 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:51.048 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:51.049 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A0 E2 8D CF 9E 56 18 F3 8D 99 06 50 8C 24 33 BB A8 F0 A6 D6 DD A4 C1 6B BC D3 03 32 23 3B 9B 63",
#   "session id"          : "AA C1 68 CE D2 60 40 39 56 9E 8C E4 3F 87 84 EC 42 82 64 60 F5 1D 31 2C 56 2A 7B 0A EF 3B 98 42",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 92 32 45 72 FA 6B ED AD   81 63 5A 7E 79 FF 1F 94  .2Er.k...cZ.y...
#             0010: 91 57 EE C0 2E E4 F4 C4   0A 81 C3 A4 61 18 95 07  .W..........a...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.562 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CF 4D 7E 75 3C 7B AA F2 8F DC 30 D1 5B 80 8B 90 4D 57 B2 E2 6B 52 D9 2B 51 CA 05 AC 5D 97 1B 3C",
#   "session id"          : "AA C1 68 CE D2 60 40 39 56 9E 8C E4 3F 87 84 EC 42 82 64 60 F5 1D 31 2C 56 2A 7B 0A EF 3B 98 42",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CD F6 78 5B 83 74 E6 E3   8B 3B B4 2F 8D 2C 52 55  ..x[.t...;./.,RU
#           0010: 3D 91 3F F4 0A 5B 74 79   12 A1 F7 91 46 9C E1 20  =.?..[ty....F..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.562 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.562 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.563 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.564 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.564 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.564 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.569 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.570 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.570 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.573 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.573 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.573 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.573 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.574 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.610 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.612 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.617 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.631 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.632 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.634 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.634 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.634 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.634 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.635 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.636 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.636 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.638 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 15 C7 BB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:32.000 UTC",
#       "not  after"         : "2024-01-12 24:11:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#           0010: 93 E8 26 4D                                        ..&M
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 64 F7 67 FA E4 A3 54   2A 2E C6 B5 EA 82 99 33  Td.g...T*......3
#           0010: 1C 7A C1 19                                        .z..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.638 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.715 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 74 7A 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:29.000 UTC",
#     "not  after"         : "2024-01-12 24:11:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.723 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5B B5 E7 29 5D F9 5E C7   85 79 DB E2 E5 18 7A BB  [..)].^..y....z.
#     0010: B9 72 09 76 76 87 6E DE   F0 ED 16 CF 71 F5 ED 02  .r.vv.n.....q...
#     0020: C6 BD F9 D8 AC 9C B8 E6   0A C0 85 66 FB EF C8 FB  ...........f....
#     0030: 70 E9 67 92 5C E4 01 44   AF 7F 7E DC 11 A4 48 E1  p.g.\..D......H.
#     0040: 13 2A 5A 0C BF 71 29 79   5E DA A7 74 0B 08 52 27  .*Z..q)y^..t..R'
#     0050: AB 1E 1D EF 89 8D D5 52   BF A6 95 60 57 93 CD CA  .......R...`W...
#     0060: 33 A7 27 EC 50 F5 60 C9   33 47 0D 00 1F 5F C3 89  3.'.P.`.3G..._..
#     0070: E0 1F 45 E7 AF 8E 4F 20   9D AC 3F 3C E6 89 73 00  ..E...O ..?<..s.
#     0080: A8 47 D7 24 58 03 EC 15   15 25 3D 9F A8 9C 39 5D  .G.$X....%=...9]
#     0090: F7 71 9A DC 37 1D 9C 61   CC 8C 1F DB E9 96 FA 50  .q..7..a.......P
#     00A0: AD 22 D3 7C 37 80 5C A9   F0 C7 A6 63 E4 74 13 F9  ."..7.\....c.t..
#     00B0: 31 9D CD 13 13 F9 BE B5   26 08 10 D6 F6 BC B2 46  1.......&......F
#     00C0: 5C 4A BC BB 67 0F DD 7B   68 78 19 77 EA 50 CE 4F  \J..g...hx.w.P.O
#     00D0: E4 EF 9B C2 2B 1D D7 E5   3B 57 E3 E6 1D 7C 30 DB  ....+...;W....0.
#     00E0: EB F4 6C FA A6 FC AE 0C   11 C4 DF 22 29 2B 21 45  ..l........")+!E
#     00F0: 4B 71 EB F7 FF 1B 62 FB   26 19 2E A8 02 5F AA 34  Kq....b.&...._.4
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.724 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A0 EA 70 B5 8C 9C BF ED   FB F6 3A 71 99 3C 9D BF  ..p.......:q.<..
#     0010: 95 31 58 6C 81 D7 07 5C   2B 09 E1 D1 49 60 7D C8  .1Xl...\+...I`..
#     0020: 11 04 6A 62 94 37 22 3B   E9 E2 E7 97 7C 36 2A B6  ..jb.7";.....6*.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.731 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 24:11:51.732 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.732 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 24:11:51.732 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.733 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 24:11:51.733 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:51.733 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.734 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.737 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 5C E7 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:36.000 UTC",
#       "not  after"         : "2024-01-12 24:11:36.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#           0010: 93 E8 26 4D                                        ..&M
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC AE B8 A9 FD 4E 99 C6   7D EE 71 A8 BE C2 BD 48  .....N....q....H
#           0010: D3 39 75 CD                                        .9u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 74 7A 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:29.000 UTC",
#       "not  after"         : "2024-01-12 24:11:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#           0010: 93 1D 6B E0                                        ..k.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#           0010: 93 E8 26 4D                                        ..&M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.780 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5D BB 0F BE A3 A1 D9 C0   62 BF 3D 17 75 7E 07 AC  ].......b.=.u...
#     0010: FF E1 BF ED 09 72 4A C0   4D 95 C5 83 91 F9 87 47  .....rJ.M......G
#     0020: 34 ED CC 66 F8 42 27 42   8F 47 8E A1 69 6D 7F B9  4..f.B'B.G..im..
#     0030: 38 D7 7C 83 6D 4A 3A DA   F8 F6 78 67 0D 56 50 41  8...mJ:...xg.VPA
#     0040: 71 29 58 41 6E 9D 52 A7   99 ED 84 4C 19 9D 23 A9  q)XAn.R....L..#.
#     0050: B2 49 73 9D A9 EB F7 22   B5 3B 73 E8 AB 70 B8 E9  .Is....".;s..p..
#     0060: E0 1B A1 74 BD 5E 34 4D   6D 22 04 40 D1 CB BB F9  ...t.^4Mm".@....
#     0070: B9 DC 66 45 95 77 60 5A   48 DE A7 3B F4 E8 FA 40  ..fE.w`ZH..;...@
#     0080: AC 78 04 AD 64 B6 DD DE   2E C6 57 5B C8 C2 E3 E0  .x..d.....W[....
#     0090: 2F 96 AB E8 BE 31 7E AD   AD A7 6B DD CF 13 94 A8  /....1....k.....
#     00A0: E6 7C 56 5E 70 F2 F5 1F   EC 62 FD 76 B5 E9 40 AB  ..V^p....b.v..@.
#     00B0: 64 BE B9 77 A2 4F 54 3F   CF F4 22 40 8F 68 28 CE  d..w.OT?.."@.h(.
#     00C0: 4A 24 1F 6B A0 C8 CA A6   9A 31 A5 72 50 27 84 34  J$.k.....1.rP'.4
#     00D0: F0 DC 29 86 92 20 47 12   A4 10 13 C5 86 7C 4D DF  ..).. G.......M.
#     00E0: A7 D6 D2 DD 20 21 B7 0D   21 E9 68 ED E8 EB 51 D7  .... !..!.h...Q.
#     00F0: BE B7 5C C7 FA D9 A9 DC   0A 4E 9C 7F 5F 6D 89 28  ..\......N.._m.(
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.782 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 93 4D BC B2 63 6B E8 7E   CA 93 2D 7B E4 7F E8 EF  .M..ck....-.....
#     0010: 40 2E 75 CA 8A 2E 11 6D   FA CF 23 5B 37 D9 AA 71  @.u....m..#[7..q
#     0020: 17 78 CA B8 A8 12 9D 41   A8 B2 CE ED F0 18 02 61  .x.....A.......a
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.782 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:51.881 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1B DB 60 60 F8 6C 0F CC 25 C0 7C 6B D7 BF 69 FA 4C 72 12 68 03 04 90 02 5A 5B 6E E1 E2 3F 0B A6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-14 24:11:52.451 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 24:11:52.451 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-14 24:11:52.451 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-14 00:11:54.478; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-14 00:11:54.483; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-14 00:11:54.872; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 00:11:54.875; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-14 00:11:54.875; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-tKHCXY/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-14 24:11:54.911 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 5C E7 8C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:36.000 UTC",
#     "not  after"         : "2024-01-12 24:11:36.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DC AE B8 A9 FD 4E 99 C6   7D EE 71 A8 BE C2 BD 48  .....N....q....H
#         0010: D3 39 75 CD                                        .9u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 74 7A 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:29.000 UTC",
#     "not  after"         : "2024-01-12 24:11:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 24:11:54.914 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D B5 1E 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:27.000 UTC",
#     "not  after"         : "2024-01-12 24:11:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 74 7A 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:29.000 UTC",
#     "not  after"         : "2024-01-12 24:11:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-14 24:11:54.927 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:11:55.112 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:55.112 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:11:55.114 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:11:55.114 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:55.118 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:55.129 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:55.130 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:55.130 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:11:55.132 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A8 2D C6 02 FE 07 FC 0B 4C 9B DC 1A EE 91 DC 14 E7 2F 38 58 A3 4F FA 69 DB D6 46 A1 8B 57 55 39",
#   "session id"          : "3B C6 6B 33 51 74 41 F5 BD E3 7A B3 4B 85 4A 5B BE F8 0A 98 58 BA D3 06 E2 DB B2 1F 30 D5 8D 5C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B8 77 50 43 42 D9 E1 45   C3 FE 41 8D DA 11 89 E5  .wPCB..E..A.....
#             0010: 77 81 D8 57 47 E0 6E 7A   76 D5 01 1D 69 1B E0 53  w..WG.nzv...i..S
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.226 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "03 A9 C4 61 19 0F 3B E3 6E E6 7F 6F 39 A9 08 4B FC DB 7F B0 4B BD 9E 9A 39 C1 6C 64 27 D8 58 1F",
#   "session id"          : "3B C6 6B 33 51 74 41 F5 BD E3 7A B3 4B 85 4A 5B BE F8 0A 98 58 BA D3 06 E2 DB B2 1F 30 D5 8D 5C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 13 CE 95 C7 40 3E A5 0B   83 E6 F5 C5 F2 41 4E 49  ....@>.......ANI
#           0010: BB 8B 48 B6 14 0B 2A E3   EC BA 4A 5E CF 1A AB 03  ..H...*...J^....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.227 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.227 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.232 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.232 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.232 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.233 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.233 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.241 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.246 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.247 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.248 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.248 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.248 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.262 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.264 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.265 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.270 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.270 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.270 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.273 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.273 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.273 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.274 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.274 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.276 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.277 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.277 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.279 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.280 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.281 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.281 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.288 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 15 C7 BB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:32.000 UTC",
#       "not  after"         : "2024-01-12 24:11:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#           0010: 93 E8 26 4D                                        ..&M
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 54 64 F7 67 FA E4 A3 54   2A 2E C6 B5 EA 82 99 33  Td.g...T*......3
#           0010: 1C 7A C1 19                                        .z..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.289 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.347 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "02 74 7A 89",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-14 24:11:29.000 UTC",
#     "not  after"         : "2024-01-12 24:11:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#         0010: 93 1D 6B E0                                        ..k.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#         0010: 93 E8 26 4D                                        ..&M
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.349 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 FC 2D 9E B1 26 21 D2   95 A6 8D 6A 5D 33 4A 1F  t.-..&!....j]3J.
#     0010: 2B F5 64 0D AB BF F3 C5   46 0F 16 B7 1E 91 2A DF  +.d.....F.....*.
#     0020: E4 D8 57 39 D0 74 05 C9   AA 1E CB 00 AC 02 16 14  ..W9.t..........
#     0030: C3 C4 BC FC C8 05 91 BD   79 7F 68 58 6D 46 D3 07  ........y.hXmF..
#     0040: DC F8 3B 44 06 A6 78 17   0C D0 AE CC B9 FD F3 B1  ..;D..x.........
#     0050: 7B 3E 60 4A AB 0E 60 96   1F C5 95 AC C3 40 7E 64  .>`J..`......@.d
#     0060: 0F 29 C5 F3 E9 48 DA 65   4A E7 7B AB FD D6 A2 D2  .)...H.eJ.......
#     0070: 51 88 C1 89 48 86 A3 C8   EC 8D F8 7C 73 71 5A 2B  Q...H.......sqZ+
#     0080: 32 D9 07 95 D4 BA D5 C0   2B 79 CA D1 7E A6 06 A0  2.......+y......
#     0090: 6D 09 88 EA 3A 20 9B D0   10 3E A4 D4 76 2E 8A F5  m...: ...>..v...
#     00A0: 37 76 87 E6 42 B0 10 C8   D8 29 E1 E6 9E 2E AB 92  7v..B....)......
#     00B0: F4 9A 5E C9 D9 70 BE 6F   6F 66 74 0F 96 91 52 D1  ..^..p.ooft...R.
#     00C0: D5 E4 A5 18 78 34 BD FC   FF F9 35 D8 6C 18 C4 98  ....x4....5.l...
#     00D0: 14 4B 2F 71 A5 E9 2C 97   E4 36 88 FD AD 53 21 E3  .K/q..,..6...S!.
#     00E0: 26 70 E0 23 A4 52 F7 26   D4 DF 73 13 AA 71 35 C8  &p.#.R.&..s..q5.
#     00F0: 61 0E 50 1D 03 97 E3 CE   E3 7E F1 63 A3 94 05 10  a.P........c....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.351 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 57 26 93 E2 E0 0E 7E   96 01 97 3A DB 0C 1F 0D  .W&........:....
#     0010: 5D 81 5D D0 3B 85 C6 B2   B1 63 E8 35 A4 CF 06 76  ].].;....c.5...v
#     0020: 26 9D 71 21 64 72 DE C8   37 9D B8 12 71 EE 28 38  &.q!dr..7...q.(8
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.353 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 24:11:55.354 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.354 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 24:11:55.354 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.354 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-14 24:11:55.354 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:11:55.354 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.355 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.356 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 5C E7 8C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:36.000 UTC",
#       "not  after"         : "2024-01-12 24:11:36.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#           0010: 93 E8 26 4D                                        ..&M
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DC AE B8 A9 FD 4E 99 C6   7D EE 71 A8 BE C2 BD 48  .....N....q....H
#           0010: D3 39 75 CD                                        .9u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 74 7A 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:29.000 UTC",
#       "not  after"         : "2024-01-12 24:11:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#           0010: 93 1D 6B E0                                        ..k.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#           0010: 93 E8 26 4D                                        ..&M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.379 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 27 7F 7C EC 91 18 73 B5   5E 17 CE 99 3B 6B A5 D4  '.....s.^...;k..
#     0010: 1F 18 42 07 75 B9 93 22   92 C9 5C 4F F8 E9 69 A4  ..B.u.."..\O..i.
#     0020: 5B 89 E7 8F 5A 84 FD CA   50 EC 3F 91 62 EE E2 C9  [...Z...P.?.b...
#     0030: 87 97 D2 2A 71 4D 7A AC   F9 02 9A 49 7C 9F 34 B2  ...*qMz....I..4.
#     0040: 8F C3 75 12 66 6B F9 8F   9C 78 34 AD 08 6B 87 CD  ..u.fk...x4..k..
#     0050: 13 13 EC D7 14 AA B6 DE   E6 2B 2D 71 BB A3 48 78  .........+-q..Hx
#     0060: C4 45 19 0F 46 6B 26 E7   99 5B DE 73 2A 79 47 14  .E..Fk&..[.s*yG.
#     0070: 5B 3B 29 88 B2 46 B1 44   20 ED 06 18 C4 2D 95 2B  [;)..F.D ....-.+
#     0080: 32 5F 35 8A 4C 96 10 89   6A 77 65 91 49 FC A4 19  2_5.L...jwe.I...
#     0090: A2 38 55 0A 7B 09 7A 4F   31 1C F9 86 6E BD 87 D8  .8U...zO1...n...
#     00A0: 45 C8 46 20 A2 CC 54 D9   0F 6F 37 AD 9E C7 86 BB  E.F ..T..o7.....
#     00B0: 16 E2 92 40 11 67 92 C0   5E 1F 9F 10 F9 77 FE 1F  ...@.g..^....w..
#     00C0: A1 40 B8 24 96 3C 4D 34   3D B7 DD 43 2C 19 06 8A  .@.$.<M4=..C,...
#     00D0: AD 30 93 BD A2 DC 11 67   47 1B 3E 43 F9 F4 73 8B  .0.....gG.>C..s.
#     00E0: 97 88 D2 CE 24 42 A9 15   22 5C 09 BB F4 57 D0 A4  ....$B.."\...W..
#     00F0: E2 82 69 6F 89 F3 10 2A   84 9C 6E EC F6 03 B9 45  ..io...*..n....E
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.380 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 53 95 46 0A D3 6E 72 A8   AA 09 24 61 7F CE D6 25  S.F..nr...$a...%
#     0010: 23 ED 0E 07 7D E7 B3 EB   49 90 CB 5B F8 0E 80 EA  #.......I..[....
#     0020: 10 D4 09 B1 C0 F0 7C 51   FE 82 32 47 68 72 03 86  .......Q..2Ghr..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.381 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:55.558 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:55.558 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:55.558 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-14 24:11:55.558 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:11:55.586 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "2E D2 ED 35 DA 39 FE 72 25 0C 44 31 63 32 92 1B 78 26 B5 8A CC 3D 6A 8D 7D C8 1C B6 26 8E B1 E5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-14 24:11:55.884 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|0E|h2sc-1-thread-2|2023-10-14 24:11:55.889 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-14 24:11:55.891 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-14 00:12:09.523; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-14 24:12:09.891 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D B5 1E 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:27.000 UTC",
#       "not  after"         : "2024-01-12 24:11:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#           0010: 93 1D 6B E0                                        ..k.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "02 74 7A 89",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-14 24:11:29.000 UTC",
#       "not  after"         : "2024-01-12 24:11:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E5 36 DB CC B0 73 4E C8   81 C3 71 F2 7C C3 30 58  .6...sN...q...0X
#           0010: 93 1D 6B E0                                        ..k.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C4 B2 9A F6 09 F1 89 C6   55 63 5B F1 30 61 BD 45  ........Uc[.0a.E
#           0010: 93 E8 26 4D                                        ..&M
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-14 24:12:09.905 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:12:10.203 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:12:10.203 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:12:10.205 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-14 24:12:10.205 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:12:10.210 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:12:10.225 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:12:10.225 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:12:10.226 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-14 24:12:10.228 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "7E 2C 2E 6A AB 14 CB 6B C7 E7 0B A3 6A 06 05 71 A8 28 58 21 D8 7A 8B CF 45 F5 EF A8 43 7B 28 91",
#     "session id"          : "D3 E0 71 7A B0 FF DE 26 0A 2B 44 30 96 EE 8F D8 11 A5 6D AA 36 56 2A 09 E7 8F A3 FB 73 9F 29 69",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 55 B7 AF 42 C4 8E 00 E1   36 26 39 52 7D 26 CD C4  U..B....6&9R.&..
#               0010: 82 19 2D 88 FD 10 10 2A   72 FE F3 EB 84 E0 82 4F  ..-....*r......O
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.251 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "58 57 E5 2B B0 3C 17 C3 29 67 CC F4 A4 3F F5 4A DA 64 EE 9C AA 3D DC 70 EA BA 16 D6 79 60 C2 4D",
#     "session id"          : "D3 E0 71 7A B0 FF DE 26 0A 2B 44 30 96 EE 8F D8 11 A5 6D AA 36 56 2A 09 E7 8F A3 FB 73 9F 29 69",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E 99 16 2C 2F 67 EE DF   2E A6 2F CC 61 88 F5 11  ^..,/g..../.a...
#             0010: 49 6C AE 10 7D 61 43 9F   49 C9 87 4D 53 A1 07 55  Il...aC.I..MS..U
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.251 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.252 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.253 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.253 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.255 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.255 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.257 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.257 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.257 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.257 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.257 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.258 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.264 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.266 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.267 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.270 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.270 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.270 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.270 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.271 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.271 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:12:10.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-14 24:12:10.271 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.272 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.272 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.272 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-14 24:12:10.273 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 15233ms
ok 75 stop command for single port in 17679ms
not ok 76 status detects locally running solr in 1583ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7468ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1536ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3033ms
ok 80 copying files around in 6734ms
ok 81 upconfig in 2713ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1254ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1259ms
not ok 84 Cleanup in 2517ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 43s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/h32mnj4edqss6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8176 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8176/

All tests passed

Build Log:
[...truncated 1273 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45565/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-13 21:44:21.059; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 21:44:21.064; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:45565/solr] to [https://127.0.0.1:45565].
# WARN  - 2023-10-13 21:44:21.914; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 21:44:21.964; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17493ms
ok 71 start solr with client truststore and security manager in 19598ms
not ok 72 start solr with mTLS needed in 54027ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-8vSlHv/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45565 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45565 (pid=1758099). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45566 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 45566 (pid=1758208). Happy searching!
#
#     INFO  - 2023-10-13 21:45:24.360; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 21:45:24.375; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 21:45:25.397; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 21:45:25.502; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 21:45:25.503; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:25.590 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 F2 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:11.000 UTC",
#     "not  after"         : "2024-01-11 21:45:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 70 B4 6B 45 82 B3 6E   68 54 32 21 C5 7C 64 F1  1p.kE..nhT2!..d.
#         0010: 46 36 5E E5                                        F6^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 4D D9 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:04.000 UTC",
#     "not  after"         : "2024-01-11 21:45:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:25.596 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 4D D9 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:04.000 UTC",
#     "not  after"         : "2024-01-11 21:45:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 7B A4 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:02.000 UTC",
#     "not  after"         : "2024-01-11 21:45:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:25.616 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:25.966 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:25.966 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:25.970 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:25.971 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:25.992 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:26.015 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:26.015 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:26.015 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:26.017 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D8 CE A1 1E 97 86 F0 17 DA 3A B0 61 A5 11 D6 2C 99 61 4A A8 7D 36 10 90 9B E6 F1 26 84 D4 C9 5B",
#   "session id"          : "F0 99 62 E6 77 01 7A F5 6A 96 4F C8 6B FF 55 69 CF 5E C3 46 F3 0C 9B DB 09 73 A1 6E F8 58 61 B4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 00 AC B4 4A 53 4D C1 05   28 9E 03 D3 BD 63 36 33  ...JSM..(....c63
#             0010: 91 9B 70 94 5E 5C 6D F7   B8 30 3D 9B 54 DE 7A 75  ..p.^\m..0=.T.zu
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.219 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "1B A7 51 9B B3 7C 5C 82 3D D0 15 0E 59 33 BC 77 00 6A 66 1D 3A B4 17 2F DF 62 5E 48 18 F7 C5 A7",
#   "session id"          : "F0 99 62 E6 77 01 7A F5 6A 96 4F C8 6B FF 55 69 CF 5E C3 46 F3 0C 9B DB 09 73 A1 6E F8 58 61 B4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 AE E1 81 2F 61 CA 5D   C8 67 1B DF 05 B8 14 39  ..../a.].g.....9
#           0010: 60 1E 98 C2 4F 6A DF FE   CC 9D A9 DA E0 43 94 2A  `...Oj.......C.*
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.220 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.221 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.222 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.223 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.225 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.225 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.225 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.225 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.226 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.236 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.241 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.241 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.256 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.257 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.258 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.261 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.261 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.262 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.262 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.262 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.264 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.265 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.265 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.268 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.268 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.269 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.269 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.516 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 49 CE 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:06.000 UTC",
#       "not  after"         : "2024-01-11 21:45:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#           0010: 25 24 E2 4F                                        %$.O
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 3F 50 AB F5 7F D0 39   3E 89 46 8F 2C 0B BC AC  $?P....9>.F.,...
#           0010: 4F D0 99 0E                                        O...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.517 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 21:45:26.589 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 21:45:26.589 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 21:45:26.590 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 21:45:26.590 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.677 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 4D D9 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:04.000 UTC",
#     "not  after"         : "2024-01-11 21:45:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.685 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 69 B1 BB CF 36 42 4F 11   81 E7 D1 D3 89 23 5A 9A  i...6BO......#Z.
#     0010: 66 2C 9C D7 1F 7B 18 75   25 C9 25 C8 11 88 6F 6C  f,.....u%.%...ol
#     0020: 82 76 79 31 13 D6 AE B3   41 93 33 A5 D7 EF 7F 72  .vy1....A.3....r
#     0030: 29 2A 73 FE 27 CD D2 28   8B A4 F2 4C 62 9A 87 05  )*s.'..(...Lb...
#     0040: 57 F8 D6 0A 92 6B 90 26   72 AD F1 1C 2D BF BA 99  W....k.&r...-...
#     0050: DC 1B 2D 59 6C 59 8B 65   DB 06 78 28 9B 6D 73 42  ..-YlY.e..x(.msB
#     0060: 2A 51 5D 63 5E F1 C6 8B   39 87 1C 38 1C 50 E7 9F  *Q]c^...9..8.P..
#     0070: DB 27 46 F4 51 EB 89 64   80 73 D1 28 EE 56 CD B8  .'F.Q..d.s.(.V..
#     0080: 62 49 DD E5 6D A9 43 E0   87 93 1C 51 35 BF 7F 3A  bI..m.C....Q5..:
#     0090: 74 F5 DA BA CA ED 24 30   85 2B C5 74 0C EC F9 3B  t.....$0.+.t...;
#     00A0: 10 1A BF 66 54 01 B3 25   96 72 EC 2E A1 61 5F FB  ...fT..%.r...a_.
#     00B0: 4E F0 99 B7 C8 3B 22 60   6D 50 7F CD DA 6E 68 5C  N....;"`mP...nh\
#     00C0: 83 5F 37 6B 61 03 C9 83   B3 E0 B5 D0 35 E0 FE FF  ._7ka.......5...
#     00D0: 21 D0 F2 F6 70 1F 7C 17   77 0E 92 3A 1B 1F B0 24  !...p...w..:...$
#     00E0: F6 C1 22 1E A5 95 A9 4B   04 F1 CE 6F 30 A7 71 22  .."....K...o0.q"
#     00F0: C9 05 B4 4A 77 0B CF 3A   EA BF AA 23 0C 4C 66 B8  ...Jw..:...#.Lf.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.687 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EC 58 EB D8 A6 E8 45 AB   F2 A6 8B 36 52 E5 74 61  .X....E....6R.ta
#     0010: 04 E9 2A 92 F5 ED DE 91   40 81 89 1E B5 A6 09 07  ..*.....@.......
#     0020: 77 27 BC 6C DF 05 88 35   A5 C8 3E D0 7D DA AF A1  w'.l...5..>.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.689 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 21:45:26.690 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.691 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 21:45:26.691 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.691 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 21:45:26.693 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:26.695 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.695 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.698 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 F2 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:11.000 UTC",
#       "not  after"         : "2024-01-11 21:45:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#           0010: 25 24 E2 4F                                        %$.O
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 70 B4 6B 45 82 B3 6E   68 54 32 21 C5 7C 64 F1  1p.kE..nhT2!..d.
#           0010: 46 36 5E E5                                        F6^.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 4D D9 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:04.000 UTC",
#       "not  after"         : "2024-01-11 21:45:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#           0010: B3 74 58 70                                        .tXp
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#           0010: 25 24 E2 4F                                        %$.O
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.754 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 02 2B C6 41 A7 08 3E 3F   AE 48 C4 B0 4F F7 8A 28  .+.A..>?.H..O..(
#     0010: 09 63 45 CD 12 F8 08 CB   79 35 F6 04 2A CA 70 DD  .cE.....y5..*.p.
#     0020: 92 F3 F4 57 D9 24 56 BF   A9 BA AD F6 1D 2A 24 3B  ...W.$V......*$;
#     0030: E6 60 0E 95 11 06 CF 92   2A 3B 1F EA E1 F7 72 06  .`......*;....r.
#     0040: 60 B7 B1 6B A7 54 10 B6   9F B2 7A 9B 29 3E 8E A3  `..k.T....z.)>..
#     0050: 8F BC 77 5D 7D 34 3A C4   83 86 C5 B2 F0 15 99 BC  ..w].4:.........
#     0060: 1F 26 F1 03 0C BA 72 ED   82 CC 92 78 43 50 54 F9  .&....r....xCPT.
#     0070: 0D 1F E7 5D 06 48 A4 06   29 B0 A3 4E 19 57 0B C0  ...].H..)..N.W..
#     0080: C7 9B 1C AE 2A 73 C5 FC   C0 02 EC 8B CE 22 EF FF  ....*s......."..
#     0090: 57 5A E2 F9 83 55 0F 99   DA C2 D7 A1 6C A6 86 9E  WZ...U......l...
#     00A0: 9C B5 D6 0E 9E 19 55 E8   42 68 75 64 17 1E 06 AF  ......U.Bhud....
#     00B0: 79 85 D6 34 CA 15 3C 15   CD 3D E5 F0 96 95 7F 1C  y..4..<..=......
#     00C0: 1C BD 16 CA 36 90 A7 47   E5 56 68 E2 14 71 55 26  ....6..G.Vh..qU&
#     00D0: 22 BD BF 42 B7 3B 47 23   16 94 0C 60 A0 4E 8A CB  "..B.;G#...`.N..
#     00E0: CA F3 B6 29 80 42 BA D0   46 D0 B4 7A 7B 8A 44 04  ...).B..F..z..D.
#     00F0: 82 D5 25 4E 5F 06 E0 F5   62 51 DE 80 45 DA 37 45  ..%N_...bQ..E.7E
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.756 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C7 BD 19 8A 19 97 64 BF   CC 29 A8 E5 CE 0F 9E 68  ......d..).....h
#     0010: 35 4C C5 23 EF F3 45 8A   5E 34 82 9B AB C4 56 87  5L.#..E.^4....V.
#     0020: 6C 76 24 96 B9 75 5F 15   99 65 87 B1 02 29 BE 23  lv$..u_..e...).#
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.760 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:26.853 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "42 05 5F 0A D3 3C CC 2B C0 D7 2A 2F E9 BA B2 97 91 81 54 E9 79 04 A6 75 19 BF C5 A7 78 48 77 B6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 21:45:27.426 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 21:45:27.427 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 21:45:29.093; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 21:45:29.098; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 21:45:29.462; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 21:45:29.465; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 21:45:29.465; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-8vSlHv/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:29.498 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 F2 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:11.000 UTC",
#     "not  after"         : "2024-01-11 21:45:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 70 B4 6B 45 82 B3 6E   68 54 32 21 C5 7C 64 F1  1p.kE..nhT2!..d.
#         0010: 46 36 5E E5                                        F6^.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 4D D9 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:04.000 UTC",
#     "not  after"         : "2024-01-11 21:45:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:29.503 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 4D D9 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:04.000 UTC",
#     "not  after"         : "2024-01-11 21:45:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 7B A4 EB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:02.000 UTC",
#     "not  after"         : "2024-01-11 21:45:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:29.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:29.700 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:29.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:29.702 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:29.702 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:29.707 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:29.719 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:29.719 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:29.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:29.722 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B4 E9 84 C8 20 19 12 F5 19 1E 22 56 E3 2D 22 8B D1 EA 1F 5D DD 09 FC 59 E2 82 DE E3 84 5B 79 01",
#   "session id"          : "0E 97 18 BC 42 61 8A AF FA B8 9D 20 37 4A 7F C9 E0 B6 2D F8 BD D4 F5 15 67 7A 5F F4 04 1C 88 20",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A5 43 ED 42 17 A7 05 37   46 5A 42 77 2D 68 A5 5C  .C.B...7FZBw-h.\
#             0010: D0 5D A1 37 7C 75 BA FD   20 BB C6 8F AB 9B D2 3D  .].7.u.. ......=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.930 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "69 7F 55 BC 7C ED 43 61 98 C7 73 8C 53 BF CB BE 6B D3 B5 85 21 AB B5 00 6A 50 A1 4D 6C 01 61 05",
#   "session id"          : "0E 97 18 BC 42 61 8A AF FA B8 9D 20 37 4A 7F C9 E0 B6 2D F8 BD D4 F5 15 67 7A 5F F4 04 1C 88 20",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F1 1C 82 21 BE 93 D0 C3   76 58 21 69 8B FB E8 58  ...!....vX!i...X
#           0010: DC 2B A9 23 F9 F0 02 EF   8C F7 47 97 18 DF 9E 5B  .+.#......G....[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.930 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.931 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.934 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.934 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.935 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.935 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.941 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.944 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.944 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:29.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:29.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.973 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.982 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.985 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.990 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.991 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.991 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.991 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.991 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.991 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.992 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:29.992 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:29.992 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.993 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.994 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.994 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.994 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.995 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.996 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:29.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:29.999 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "20 49 CE 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:06.000 UTC",
#       "not  after"         : "2024-01-11 21:45:06.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#           0010: 25 24 E2 4F                                        %$.O
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 3F 50 AB F5 7F D0 39   3E 89 46 8F 2C 0B BC AC  $?P....9>.F.,...
#           0010: 4F D0 99 0E                                        O...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.000 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.064 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 4D D9 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 21:45:04.000 UTC",
#     "not  after"         : "2024-01-11 21:45:04.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#         0010: B3 74 58 70                                        .tXp
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#         0010: 25 24 E2 4F                                        %$.O
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.067 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 25 6B 48 BB 7B 78 C6   31 99 C6 B0 8D 25 94 D6  x%kH..x.1....%..
#     0010: FA 35 4E 58 15 3B 6D 96   A5 A6 10 F3 71 9C 61 AA  .5NX.;m.....q.a.
#     0020: 73 CA 03 08 68 7E DF F3   2A 13 4E D8 F5 F8 8D 4E  s...h...*.N....N
#     0030: 48 2D BB CF 67 0C F8 97   8D DD D4 25 25 4E 48 05  H-..g......%%NH.
#     0040: 9E FA 1C 2A FC 93 02 0E   A6 4E 57 9D 5A 20 30 CB  ...*.....NW.Z 0.
#     0050: 01 E6 DD E6 54 21 7B ED   7F 43 0F 9F 04 BF 84 97  ....T!...C......
#     0060: 68 F0 E0 5E F1 1A 1D 8A   FE 90 16 1B 72 67 B4 E1  h..^........rg..
#     0070: C3 04 0C 45 98 4D D0 79   77 04 E9 B8 70 ED 94 CD  ...E.M.yw...p...
#     0080: 05 F5 A7 F0 50 0B DF FC   94 D0 B4 A2 56 9F 0C C5  ....P.......V...
#     0090: C2 FD A2 AE 1E 0D 3B 73   A6 44 90 C6 C3 D9 6D 4D  ......;s.D....mM
#     00A0: 54 BC 62 66 2D AF 80 BD   A1 45 55 38 43 E8 60 4B  T.bf-....EU8C.`K
#     00B0: 47 74 1C 8C 02 64 AF 73   2D 92 46 2F 22 C3 8B A5  Gt...d.s-.F/"...
#     00C0: 7B D1 FF 71 86 2F C5 F7   F0 B1 02 34 2E DE BE 4A  ...q./.....4...J
#     00D0: BD 1E 3A 20 BD 88 2A 37   D6 8D CE FF 91 DF A1 4D  ..: ..*7.......M
#     00E0: E7 04 00 DD 3D 57 CF 51   CA 80 F9 67 9A 0B 75 92  ....=W.Q...g..u.
#     00F0: E7 BE B3 06 D9 DB 56 99   AC 66 BB 7E B2 DB CD 6D  ......V..f.....m
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.069 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4E 32 1C C7 49 80 B7 AB   02 E2 A4 65 75 A6 01 F4  N2..I......eu...
#     0010: AE 71 BE 61 CE 09 79 15   83 17 4D 85 D9 09 14 26  .q.a..y...M....&
#     0020: AD AD 80 C2 3B 8D 48 0C   A6 AB 31 AF 49 A7 34 8E  ....;.H...1.I.4.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.071 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 21:45:30.072 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:30.072 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 21:45:30.072 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:30.073 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 21:45:30.073 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:30.073 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.073 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.079 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 F2 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:11.000 UTC",
#       "not  after"         : "2024-01-11 21:45:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#           0010: 25 24 E2 4F                                        %$.O
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 70 B4 6B 45 82 B3 6E   68 54 32 21 C5 7C 64 F1  1p.kE..nhT2!..d.
#           0010: 46 36 5E E5                                        F6^.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 4D D9 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:04.000 UTC",
#       "not  after"         : "2024-01-11 21:45:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#           0010: B3 74 58 70                                        .tXp
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#           0010: 25 24 E2 4F                                        %$.O
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.111 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 0F B2 2F 38 0B 5E 9B   0F 5E EC A6 FC A2 59 0C  "../8.^..^....Y.
#     0010: 37 F2 E9 A4 7A B9 3C 09   77 E0 3D 16 92 80 1C BC  7...z.<.w.=.....
#     0020: 47 99 5D 91 79 96 B1 55   A8 0A CE 11 D7 DB BA 50  G.].y..U.......P
#     0030: 6A 3C A1 97 DE 5E B5 6E   41 8B 0E DC AD 96 DB F8  j<...^.nA.......
#     0040: B4 4F EE 62 87 F3 D8 15   2F 40 5E F9 4E 86 35 CA  .O.b..../@^.N.5.
#     0050: 35 E1 7C B4 B5 8A 12 F5   01 AD 10 2C 95 6F 38 96  5..........,.o8.
#     0060: 96 B7 2A 53 6F DA CC B1   B2 CC B6 F5 B3 88 A5 DD  ..*So...........
#     0070: 41 92 C6 69 D5 C5 E2 00   9E 07 2D B7 3A EC 39 4C  A..i......-.:.9L
#     0080: 0C 2B 50 85 83 83 55 33   F1 43 D8 70 55 92 24 ED  .+P...U3.C.pU.$.
#     0090: D5 31 69 28 26 8B EA 45   8D F7 A3 F7 08 42 48 B8  .1i(&..E.....BH.
#     00A0: 0D F3 F6 C0 B6 A7 3A C6   38 51 95 62 CF FD D9 77  ......:.8Q.b...w
#     00B0: 13 E5 88 2B 8F B7 02 4A   5B FF 60 10 AF 02 BD DA  ...+...J[.`.....
#     00C0: 00 85 93 E8 A0 15 CE D4   9A 22 B4 16 22 76 40 B1  .........".."v@.
#     00D0: 01 5D 35 BC 23 C5 65 03   E7 99 B9 DA B8 BE 16 C6  .]5.#.e.........
#     00E0: D4 71 76 67 6B 29 A0 7B   AA D9 DD 8B 9B EA 4A 3B  .qvgk)........J;
#     00F0: 89 F8 D7 F3 B7 6C D7 FD   D8 F1 06 24 DC EB 5A 3E  .....l.....$..Z>
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.113 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 35 87 6C 80 A7 CF 57   D5 5D E4 CC E2 34 CA 49  D5.l...W.]...4.I
#     0010: 88 E0 AD C5 F1 89 AB D1   89 09 8F 4C BE A3 8E 05  ...........L....
#     0020: 5E F7 AB D4 87 4E BA D9   80 A7 88 1D E3 36 F7 67  ^....N.......6.g
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.113 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:30.237 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "03 06 45 88 EE 22 73 F8 AA 74 FC 74 14 74 4E A3 84 A0 3D B3 FB 1B 8C 47 27 B7 65 38 9C 0F 71 E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 21:45:30.580 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 21:45:30.581 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-13 21:45:44.001; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:44.321 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 4D D9 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:04.000 UTC",
#       "not  after"         : "2024-01-11 21:45:04.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#           0010: B3 74 58 70                                        .tXp
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 F5 56 DA C1 F0 44 0E   AB 1E 91 8E 81 9B F6 67  ..V...D........g
#           0010: 25 24 E2 4F                                        %$.O
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 7B A4 EB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 21:45:02.000 UTC",
#       "not  after"         : "2024-01-11 21:45:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 CE 0E E5 19 05 B9 62   47 9E 77 45 59 9C DB 65  v......bG.wEY..e
#           0010: B3 74 58 70                                        .tXp
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 21:45:44.335 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:44.542 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:44.542 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:44.544 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 21:45:44.544 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:44.549 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:44.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:44.560 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:44.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 21:45:44.563 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "0B 1D BA 95 51 17 3A 7D 81 0C 80 C8 89 29 93 1F FF 57 32 AC 90 62 9E 73 61 0A AC 3A F4 1A FF F2",
#     "session id"          : "90 D4 C5 DC E5 7D C1 55 7C 6D 02 BB C8 50 A6 DE DB F1 A3 30 AB EC 36 CE 1E 31 F1 5B 66 60 65 5F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E1 31 AC 8B 6C 17 50 F4   E2 6A 1C 3E 11 B2 25 3A  .1..l.P..j.>..%:
#               0010: 3D AD 55 31 29 49 9C 3B   F1 FC 07 B2 57 15 89 5E  =.U1)I.;....W..^
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.580 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "38 68 82 B6 84 E8 45 CA A9 F0 CA 68 EF 50 5A 0F E5 33 3F 18 B0 82 DC BB 38 CC 09 4B 20 F4 FF 88",
#     "session id"          : "90 D4 C5 DC E5 7D C1 55 7C 6D 02 BB C8 50 A6 DE DB F1 A3 30 AB EC 36 CE 1E 31 F1 5B 66 60 65 5F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 72 52 14 0B 1E EA FC EC   DD A0 4A 1C 60 F6 34 C6  rR........J.`.4.
#             0010: 3A B3 1E 90 A9 E6 9B CD   CC 93 C0 50 BA E0 39 1F  :..........P..9.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.580 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.580 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.581 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.582 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.582 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.582 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.582 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.583 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.584 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:44.585 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:44.585 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.585 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.585 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.595 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.596 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.600 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.603 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.603 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.603 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.604 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.604 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:44.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:44.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.605 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.605 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.606 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.606 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.606 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.607 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 21:45:44.607 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 21:45:44.615 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "20 49 CE 91",
#         "signature algorithm": "SHA256withRSA",
#         "issuer"             : "CN=localh

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14954ms
ok 75 stop command for single port in 18095ms
not ok 76 status detects locally running solr in 1506ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7552ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1504ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2947ms
ok 80 copying files around in 6759ms
ok 81 upconfig in 2628ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1253ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1260ms
not ok 84 Cleanup in 2523ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 46s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/swo6wajqre3fm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8175 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8175/

All tests passed

Build Log:
[...truncated 1270 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44113/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-13 17:33:01.751; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 17:33:01.756; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 11000ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 44113 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44113 (pid=1365249). Happy searching!
#
#     INFO  - 2023-10-13 17:33:09.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 17:33:09.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-13 17:33:12.638; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 17:33:12.643; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 19018ms
not ok 72 start solr with mTLS needed in 54645ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ZfU12m/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 44113 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44113 (pid=1366957). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 44114 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44114 (pid=1367129). Happy searching!
#
#     INFO  - 2023-10-13 17:33:58.362; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 17:33:58.373; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 17:33:59.277; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 17:33:59.279; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 17:33:59.280; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 17:33:59.322 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 96 A3 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:44.000 UTC",
#     "not  after"         : "2024-01-11 17:33:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B2 AB 51 10 D3 96 8E   17 F9 AA 9A E5 1B 13 F3  n..Q............
#         0010: C6 C7 CB 1F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 34 09 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:37.000 UTC",
#     "not  after"         : "2024-01-11 17:33:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 17:33:59.339 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 34 09 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:37.000 UTC",
#     "not  after"         : "2024-01-11 17:33:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 37 BF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:35.000 UTC",
#     "not  after"         : "2024-01-11 17:33:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 17:33:59.355 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:33:59.871 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:33:59.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:33:59.873 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:33:59.874 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:33:59.892 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:33:59.912 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:33:59.913 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:33:59.913 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:33:59.915 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4A 10 DD BB A8 D6 25 F0 7D 45 2C BB E5 6C 1B 41 0D 98 48 95 83 77 EC 77 27 5D 86 EE E4 BB 88 1A",
#   "session id"          : "2D CF 81 16 D5 91 28 A3 62 F6 E7 D7 2B 89 96 D8 B7 89 B1 AC AC 7A 42 6E AA B5 E5 3E 5F AB 5A 19",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B8 4F CF C3 2A 4E 54 A0   3D 9F 33 40 1C 65 F4 62  .O..*NT.=.3@.e.b
#             0010: 38 83 E0 E6 95 53 C8 49   72 0B 2A 39 F1 B7 60 5A  8....S.Ir.*9..`Z
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.167 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E7 F9 71 C0 7E 87 CB 4B 78 16 55 20 2D 59 E2 0B F7 AA B4 5A 2A 1A 0F E2 74 F5 1C 50 B0 2B F5 4A",
#   "session id"          : "2D CF 81 16 D5 91 28 A3 62 F6 E7 D7 2B 89 96 D8 B7 89 B1 AC AC 7A 42 6E AA B5 E5 3E 5F AB 5A 19",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 76 0C AD A6 79 D4 B4 76   2B 2B 84 02 90 A9 0F A2  v...y..v++......
#           0010: C0 33 EF E5 90 7B 31 6D   75 59 DA 83 C2 D4 4F 61  .3....1muY....Oa
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.167 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.168 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.181 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.182 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.182 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.192 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.192 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.192 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.193 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.204 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.206 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.207 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.232 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.232 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.232 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.233 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.233 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.233 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.233 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.233 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.233 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.234 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.235 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.235 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.235 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.235 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.236 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.236 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.246 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B AF 6F 98",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:40.000 UTC",
#       "not  after"         : "2024-01-11 17:33:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#           0010: 0D D8 F6 F1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 61 30 93 9F BA 3E 8C   41 95 45 21 06 AB 35 4A  .a0...>.A.E!..5J
#           0010: 66 42 CB 25                                        fB.%
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.248 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 17:34:00.278 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 17:34:00.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 17:34:00.278 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 17:34:00.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.686 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 34 09 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:37.000 UTC",
#     "not  after"         : "2024-01-11 17:33:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.690 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 BD 6D 8F 89 6A 84 3E   48 EA 57 3C FB A7 76 25  U.m..j.>H.W<..v%
#     0010: 31 E6 FB DE EF 02 49 40   14 11 ED C2 7B E9 1B 35  1.....I@.......5
#     0020: CA 74 8A AF 49 39 B9 70   E5 57 9F 1F 8C A2 04 07  .t..I9.p.W......
#     0030: 0D C9 19 EE 56 AC 4D 4D   FF B3 83 98 D5 AD E6 91  ....V.MM........
#     0040: 58 33 DA 5B 25 5C B6 36   40 20 27 30 05 9F 7C 63  X3.[%\.6@ '0...c
#     0050: 59 8C 21 3B A9 EA 7D 7B   C0 65 DD CD 9E 84 D5 8B  Y.!;.....e......
#     0060: E4 E0 69 4D C5 C1 7A D2   81 55 E2 05 D3 BD 4E C4  ..iM..z..U....N.
#     0070: 07 87 0A B2 F7 27 0E C6   76 4B 5E 86 5E 98 9F 4D  .....'..vK^.^..M
#     0080: E8 53 EB FB F4 99 36 37   EA C4 EC 21 FC FE 53 95  .S....67...!..S.
#     0090: 4E 65 97 A8 7B 07 EF FB   BB 13 D5 8A 68 7C 72 3B  Ne..........h.r;
#     00A0: 42 4F 9E A2 0A 75 31 77   B6 17 95 8D A7 8A 31 DF  BO...u1w......1.
#     00B0: C7 B5 40 88 2C 9D 13 27   02 36 F8 B3 79 FF 94 EC  ..@.,..'.6..y...
#     00C0: A0 36 52 51 3E 94 77 C6   F5 EF 03 5B 69 ED CD 58  .6RQ>.w....[i..X
#     00D0: 5A B8 B9 FD 80 35 E4 86   10 BC E8 CB C1 03 70 A6  Z....5........p.
#     00E0: 26 31 7F DD A6 5D 05 2F   E0 93 70 A3 9C 52 A1 5B  &1...]./..p..R.[
#     00F0: 65 23 6B 82 83 21 33 4F   4F D2 0E 55 D6 47 76 F7  e#k..!3OO..U.Gv.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.692 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D8 E1 5C 30 73 F2 E4 70   A7 8E F3 E9 A5 9F 97 57  ..\0s..p.......W
#     0010: 29 F7 7B B6 F3 63 AB FC   48 A2 3A 46 62 E6 BB A7  )....c..H.:Fb...
#     0020: 8C 00 EB 1C 0B 13 ED 81   B5 4A 8E 04 F9 59 CA 93  .........J...Y..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.696 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 17:34:00.699 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.699 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 17:34:00.700 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.700 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 17:34:00.700 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:00.702 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.703 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.705 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 96 A3 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:44.000 UTC",
#       "not  after"         : "2024-01-11 17:33:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#           0010: 0D D8 F6 F1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E B2 AB 51 10 D3 96 8E   17 F9 AA 9A E5 1B 13 F3  n..Q............
#           0010: C6 C7 CB 1F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 34 09 26",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:37.000 UTC",
#       "not  after"         : "2024-01-11 17:33:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#           0010: 3F 93 F0 A0                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#           0010: 0D D8 F6 F1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.738 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: D2 3F 83 34 7F 9A 13 21   02 B9 64 A9 57 1B 02 8A  .?.4...!..d.W...
#     0010: B9 7A 1C B8 EB 53 B3 A9   DA 68 61 4D 67 90 AB 49  .z...S...haMg..I
#     0020: 67 31 14 06 30 14 74 2C   80 3F 78 B8 14 F5 E8 DF  g1..0.t,.?x.....
#     0030: 07 5D 63 01 A6 CF E6 96   37 CD 5A E0 82 A3 86 75  .]c.....7.Z....u
#     0040: CD B2 C0 F6 36 D7 39 F9   45 43 02 CD 70 5B 12 1A  ....6.9.EC..p[..
#     0050: E3 AE 2A 51 BF 58 AA 98   E2 51 05 B6 48 F8 CD 1C  ..*Q.X...Q..H...
#     0060: 4E 8F 52 5B 43 CD 06 0E   C0 71 13 5C 52 DA 65 0E  N.R[C....q.\R.e.
#     0070: B7 D6 AA 7A DF 6A 17 03   40 FA 1F 4D 75 FB A4 55  ...z.j..@..Mu..U
#     0080: 6D 5D 61 9F 57 B1 47 4C   27 16 98 AA DC 5F 58 CB  m]a.W.GL'...._X.
#     0090: 67 E8 61 ED 9D 77 29 D6   4C 2F E2 D0 55 24 04 8A  g.a..w).L/..U$..
#     00A0: A6 B9 14 65 67 28 85 21   88 D8 9D D1 36 7F FC 15  ...eg(.!....6...
#     00B0: 59 D1 58 83 FB 23 F9 3B   CD 18 2B B2 57 47 71 CA  Y.X..#.;..+.WGq.
#     00C0: 7F 35 9A BD EA 5A FE E3   CD BE 09 0D AA D9 07 09  .5...Z..........
#     00D0: 91 7C DA 0A AD 24 ED D3   55 97 79 7F A9 46 1D 28  .....$..U.y..F.(
#     00E0: DD F5 87 7B BE 94 61 34   B2 EF C8 3A 5F A6 D0 75  ......a4...:_..u
#     00F0: F6 0A 5A 0E 90 9A 3F 7A   C2 5C BA 7C E3 30 97 4D  ..Z...?z.\...0.M
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.739 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9E 26 96 2C 58 1E FA DE   61 A8 A1 6D 91 7A F5 C5  .&.,X...a..m.z..
#     0010: A4 5D EB EF DF 32 C9 2F   DB D8 25 52 CB C0 BA 27  .]...2./..%R...'
#     0020: E2 27 21 B7 5D 7B AF 0C   A7 0B 2B B4 7A 25 08 ED  .'!.].....+.z%..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.742 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:00.844 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "88 AE 46 16 7B 10 68 6B 67 06 DC 3C 97 3C C0 2D 6F 6B 4E 2D 5A 86 BE EC 1D E7 5E 5B 43 05 3A 8F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 17:34:01.528 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 17:34:01.529 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 17:34:03.227; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 17:34:03.232; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 17:34:03.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 17:34:03.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 17:34:03.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZfU12m/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 17:34:03.694 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "07 96 A3 F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:44.000 UTC",
#     "not  after"         : "2024-01-11 17:33:44.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6E B2 AB 51 10 D3 96 8E   17 F9 AA 9A E5 1B 13 F3  n..Q............
#         0010: C6 C7 CB 1F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 34 09 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:37.000 UTC",
#     "not  after"         : "2024-01-11 17:33:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 17:34:03.697 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 34 09 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:37.000 UTC",
#     "not  after"         : "2024-01-11 17:33:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 37 BF 4D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:35.000 UTC",
#     "not  after"         : "2024-01-11 17:33:35.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 17:34:03.710 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:34:03.908 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:03.909 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:34:03.910 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:34:03.911 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:03.915 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:03.927 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:03.927 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:03.927 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:03.929 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "70 16 8E EC 74 49 D1 58 88 13 75 75 10 6D 51 7E 3A 69 F0 A2 08 96 6C 60 65 F8 8A F1 4F 44 5D 7E",
#   "session id"          : "3A BA F4 31 65 2A 28 BD 3B 8B D3 36 75 7F 53 BC 9E 3D B7 0E 1F D8 33 2C AF BC C2 E5 A5 5D 98 1E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 69 4E 6C C9 31 AD 11 B1   B5 47 4C AB C6 75 AD C5  iNl.1....GL..u..
#             0010: DA 2E 61 65 29 DB DC EE   23 C6 88 F6 20 2E 4B 0F  ..ae)...#... .K.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.031 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "5C 4F BD 76 7A 4C F0 C3 76 02 82 71 32 4B 88 C7 EC C3 1B 17 D2 0F 0E FA 61 BB A5 10 73 15 31 AB",
#   "session id"          : "3A BA F4 31 65 2A 28 BD 3B 8B D3 36 75 7F 53 BC 9E 3D B7 0E 1F D8 33 2C AF BC C2 E5 A5 5D 98 1E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 3D C5 67 52 11 CC B6   41 4F 6A 53 B6 EC 0C 0B  C=.gR...AOjS....
#           0010: 69 23 AB F0 0E B1 D3 4D   CD 6E CE 88 F3 96 A0 1F  i#.....M.n......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.032 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.032 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.033 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.036 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.036 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.039 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.045 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.045 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.045 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.058 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.063 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.064 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.068 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.069 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.073 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.073 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.073 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.073 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.075 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.076 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.076 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.076 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.078 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.260 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B AF 6F 98",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:40.000 UTC",
#       "not  after"         : "2024-01-11 17:33:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#           0010: 0D D8 F6 F1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 61 30 93 9F BA 3E 8C   41 95 45 21 06 AB 35 4A  .a0...>.A.E!..5J
#           0010: 66 42 CB 25                                        fB.%
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.261 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.333 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3D 34 09 26",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 17:33:37.000 UTC",
#     "not  after"         : "2024-01-11 17:33:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#         0010: 3F 93 F0 A0                                        ?...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#         0010: 0D D8 F6 F1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.337 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 63 17 E1 94 69 C3 57 0B   40 75 46 E1 7E CE 99 BD  c...i.W.@uF.....
#     0010: 58 07 B1 B3 64 F1 A1 90   57 32 58 9D 7F 1A 0B 02  X...d...W2X.....
#     0020: D5 D5 27 98 33 B4 0A EF   D4 07 00 11 04 0E F8 1F  ..'.3...........
#     0030: 31 A6 43 D1 DA 3E 85 F6   B3 8E 50 81 39 6C 7F F2  1.C..>....P.9l..
#     0040: F0 DB BA D8 C0 D8 F0 3E   B8 16 CE D6 A8 51 48 17  .......>.....QH.
#     0050: 61 1F 97 48 35 A1 78 2C   D5 C1 CB 12 BA 49 FA BF  a..H5.x,.....I..
#     0060: A2 90 9F 18 78 28 78 97   91 84 FD B7 73 0B 9A CD  ....x(x.....s...
#     0070: 85 A6 D0 C5 1B BA 9D 4D   30 E4 9C 0C A0 4A 5E E6  .......M0....J^.
#     0080: 29 2B EB 8C 01 A6 F9 F3   15 00 2B 40 CF 7C AE 05  )+........+@....
#     0090: C9 F7 A1 B4 5E 67 D5 DF   55 6C AB C1 32 57 4E 77  ....^g..Ul..2WNw
#     00A0: 9C F5 95 58 04 4B 22 ED   2D 34 41 41 C1 C4 C8 76  ...X.K".-4AA...v
#     00B0: 0D EF 0E 0B D4 73 C3 65   33 B0 F3 0B 73 AF CB F2  .....s.e3...s...
#     00C0: 1F 17 82 EB 1C E9 A3 28   D6 B5 79 D4 B7 1F D7 40  .......(..y....@
#     00D0: E9 A8 34 C2 CD 70 49 75   F6 D4 73 A1 F7 38 4B 33  ..4..pIu..s..8K3
#     00E0: 08 E2 35 85 AF 96 0F 0F   92 1B DF CF 19 DE F5 74  ..5............t
#     00F0: BC B5 FD 81 4B CC F0 53   F5 7F BB FE D8 38 DF FA  ....K..S.....8..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.338 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B A6 93 6F 79 94 93 2C   26 5B 1F D1 35 A0 15 0A  ...oy..,&[..5...
#     0010: EF 8A 80 73 27 9A 06 17   1C 46 4D 53 34 93 A2 54  ...s'....FMS4..T
#     0020: 66 AF 88 45 1C F8 9A 66   D9 7A FD D3 DE D8 F6 BE  f..E...f.z......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.340 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 17:34:04.341 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.341 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 17:34:04.341 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.341 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 17:34:04.341 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 17:34:04.341 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.342 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.344 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 96 A3 F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:44.000 UTC",
#       "not  after"         : "2024-01-11 17:33:44.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#           0010: 0D D8 F6 F1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6E B2 AB 51 10 D3 96 8E   17 F9 AA 9A E5 1B 13 F3  n..Q............
#           0010: C6 C7 CB 1F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 34 09 26",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:37.000 UTC",
#       "not  after"         : "2024-01-11 17:33:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#           0010: 3F 93 F0 A0                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#           0010: 0D D8 F6 F1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.367 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: CB DA FF 5C 04 45 85 39   C7 3A BE 7B B1 6E 00 2A  ...\.E.9.:...n.*
#     0010: 52 FA D9 82 0D D1 7C BB   AF 42 2B 08 CC 5D CA 6B  R........B+..].k
#     0020: C1 DE 6E F2 1B 05 5E 0A   26 05 F9 69 37 BB 1F FA  ..n...^.&..i7...
#     0030: FE 89 CA CE E3 ED 39 6E   47 74 25 58 8B 53 39 0C  ......9nGt%X.S9.
#     0040: 5A 89 01 79 03 AB 71 1B   78 A4 5B BF C8 A0 57 32  Z..y..q.x.[...W2
#     0050: 2C EE BE 60 99 2B DA 4B   6F CD 21 57 F8 4A 6D 72  ,..`.+.Ko.!W.Jmr
#     0060: A6 DD 7C E4 14 A8 B5 E3   4F 7B 0B 0A 0B EC A4 9F  ........O.......
#     0070: E0 5B 06 5C A2 09 B2 CE   C8 C1 9E 55 D9 71 39 AA  .[.\.......U.q9.
#     0080: 10 95 70 27 9B 8E CF 2D   EF 29 BF 76 11 66 83 2F  ..p'...-.).v.f./
#     0090: E4 26 5A ED B6 83 C3 3B   53 C0 CA 90 7C 48 A0 C9  .&Z....;S....H..
#     00A0: 49 F3 FC 6A D7 25 9B EB   6D 14 91 74 0E 22 C2 6B  I..j.%..m..t.".k
#     00B0: 0F 3A FA C4 69 2B D0 55   F5 CE 63 E3 CA CF 75 CB  .:..i+.U..c...u.
#     00C0: 57 D5 A7 FA D2 8A 66 9F   42 CA AC 62 6B EE C6 72  W.....f.B..bk..r
#     00D0: 3A FB 9F 11 A9 25 F1 E4   01 4B 5E 9B 77 31 C3 EB  :....%...K^.w1..
#     00E0: B7 79 12 EA 59 03 95 86   3A 83 49 1B FD 63 67 E4  .y..Y...:.I..cg.
#     00F0: 4B E6 0F 96 23 5E 36 FA   03 FB 08 70 20 46 36 3F  K...#^6....p F6?
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.369 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 E3 80 95 79 23 EF 8F   E5 A7 C5 1F 22 26 68 79  ....y#......"&hy
#     0010: E9 88 2B 67 29 67 2B D8   98 C6 E7 A0 66 52 09 AD  ..+g)g+.....fR..
#     0020: 3B 30 E6 2C CE 2B F1 9F   92 70 AA EC 16 CF 9E D2  ;0.,.+...p......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.369 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:04.435 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9E 24 7A 42 DF B2 EB 66 35 93 18 89 F3 F3 92 C7 ED E0 BC F6 9E 0F F0 DB 6D 1A 09 16 A8 EB 57 C2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 17:34:04.711 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 17:34:04.712 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-13 17:34:18.449; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 17:34:18.782 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 34 09 26",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:37.000 UTC",
#       "not  after"         : "2024-01-11 17:33:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#           0010: 3F 93 F0 A0                                        ?...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 1C 18 F5 1A F1 5B 57   4D 62 7A D8 7D 66 0B B6  ......[WMbz..f..
#           0010: 0D D8 F6 F1                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 37 BF 4D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 17:33:35.000 UTC",
#       "not  after"         : "2024-01-11 17:33:35.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CA 2A CD CB F6 BB 25 C3   5B 15 E3 78 F5 02 F3 20  .*....%.[..x...
#           0010: 3F 93 F0 A0                                        ?...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 17:34:18.796 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:34:19.001 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:19.001 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:34:19.003 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 17:34:19.003 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:19.007 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:19.019 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:19.019 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:19.019 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 17:34:19.021 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "4F 9A 02 2A FE 0A 13 EA 6C 7C 71 EB 45 5D BA 07 78 08 AD 98 1D 72 14 31 29 D8 8A 2D C8 07 AD 42",
#     "session id"          : "31 75 43 82 BA 29 41 5F 73 30 8C 16 B4 2F 3F D7 E6 C0 1A 21 2E 60 FE C3 8F 72 EA D0 98 43 99 BB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A7 9A B9 73 02 9C 5E 2E   53 23 D8 9D FB 19 7E E0  ...s..^.S#......
#               0010: 21 B6 96 20 43 BC F0 5C   37 97 1A BB C9 CB 4C 26  !.. C..\7.....L&
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.041 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "DE 92 AD DF 99 32 F1 B7 98 8B 47 77 4B 9B 6E 1A 26 EE C1 1F D7 13 96 BB 50 39 86 37 A3 40 F4 CA",
#     "session id"          : "31 75 43 82 BA 29 41 5F 73 30 8C 16 B4 2F 3F D7 E6 C0 1A 21 2E 60 FE C3 8F 72 EA D0 98 43 99 BB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 41 6B DB 35 2B 99 01 E1   4C 56 47 72 9B C0 3B D8  Ak.5+...LVGr..;.
#             0010: 17 F4 0E B3 56 B1 7D 1F   DC 6C 42 9C 56 08 48 55  ....V....lB.V.HU
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.042 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.042 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.043 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.043 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.043 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.043 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.043 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.043 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.044 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.044 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.045 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.045 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 17:34:19.046 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 

[...truncated too long message...]

 C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 14607ms
ok 75 stop command for single port in 18955ms
not ok 76 status detects locally running solr in 1579ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7641ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1520ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3114ms
ok 80 copying files around in 6667ms
ok 81 upconfig in 2610ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1264ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1255ms
not ok 84 Cleanup in 2537ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 54s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3sjejq7ibqrek

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8174 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8174/

All tests passed

Build Log:
[...truncated 1389 lines...]
BUILD FAILED in 1h 2m 35s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/gzfdxnzmgow64

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8173 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8173/

All tests passed

Build Log:
[...truncated 1439 lines...]
BUILD FAILED in 1h 2m 24s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3d2crpsuqel46

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8172 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8172/

All tests passed

Build Log:
[...truncated 1270 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40629/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-13 10:15:39.042; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 10:15:39.047; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40629/solr] to [https://127.0.0.1:40629].
# WARN  - 2023-10-13 10:15:39.843; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 10:15:39.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17254ms
ok 71 start solr with client truststore and security manager in 19547ms
not ok 72 start solr with mTLS needed in 54771ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-zIQsCi/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40629 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40629 (pid=512531). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40630 [|]   [/]   [-]   [\]   [|]   [/]   [-]
# Started Solr server on port 40630 (pid=512704). Happy searching!
#
#     INFO  - 2023-10-13 10:16:42.206; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 10:16:42.211; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 10:16:43.459; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 10:16:43.463; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 10:16:43.463; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 10:16:43.531 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 DC 4F 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:28.000 UTC",
#     "not  after"         : "2024-01-11 10:16:28.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E 23 E4 C5 EC 3B C9 38   9F 01 D9 DC EE DC E6 4F  >#...;.8.......O
#         0010: 27 9D EE EA                                        '...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B2 34 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:21.000 UTC",
#     "not  after"         : "2024-01-11 10:16:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 10:16:43.536 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B2 34 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:21.000 UTC",
#     "not  after"         : "2024-01-11 10:16:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 00 38 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:19.000 UTC",
#     "not  after"         : "2024-01-11 10:16:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 10:16:43.548 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:16:43.927 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:43.927 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:16:43.929 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:16:43.929 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:43.934 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:43.946 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:43.947 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:43.950 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:43.952 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "74 3F 7D 0C A3 12 1A 12 17 06 47 67 8E CC 54 73 B7 7D B5 70 63 5C 94 A7 B6 64 70 82 76 B6 44 EF",
#   "session id"          : "11 1A 14 31 F7 0A 6E BB 08 EC 49 99 95 37 DA BE 14 C6 E8 23 D0 1A E7 29 4B EE 02 CE 70 ED C2 93",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F0 7A CB B8 DB B4 4E 26   36 D1 4F 19 6E 91 12 99  .z....N&6.O.n...
#             0010: 9C 1A 97 46 E1 1E 8B E7   36 A7 3C 78 85 E5 31 14  ...F....6.<x..1.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.116 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "66 E4 90 38 2B 21 B3 E0 83 9C B4 39 7E C0 1A 4C 9D 59 FB 0A EB F5 F1 1F F1 41 08 0D 3C C4 DA 18",
#   "session id"          : "11 1A 14 31 F7 0A 6E BB 08 EC 49 99 95 37 DA BE 14 C6 E8 23 D0 1A E7 29 4B EE 02 CE 70 ED C2 93",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2B 4F 8B 93 29 41 61 26   99 00 0A D8 0B 01 6C D9  +O..)Aa&......l.
#           0010: 17 0B 41 59 50 79 0B F2   3A A2 19 4F 92 F7 E3 6A  ..AYPy..:..O...j
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.116 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.116 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.117 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.118 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.118 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.119 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.119 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.120 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.121 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.140 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.141 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.142 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.165 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.165 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.165 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.169 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.169 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.169 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.182 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.182 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.183 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.184 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.184 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.187 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.188 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.188 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.189 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.196 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 CD 8D 0D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:24.000 UTC",
#       "not  after"         : "2024-01-11 10:16:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#           0010: DC 66 05 61                                        .f.a
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 2C 2B D4 DC 61 77 8D   A6 2A 5A 28 58 35 C4 F0  ,,+..aw..*Z(X5..
#           0010: CB 03 6E 7E                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.198 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:44.635 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:44.635 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:44.636 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:44.636 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.644 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B2 34 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:21.000 UTC",
#     "not  after"         : "2024-01-11 10:16:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.653 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 DD 5B AF 0D FA BB D3   E0 D4 87 0B 41 75 31 34  U.[.........Au14
#     0010: 28 7D 21 E4 8E F6 1A 71   95 4F 2A 17 26 8B 3E CC  (.!....q.O*.&.>.
#     0020: 0A C6 EE 9E C3 AB D4 F4   77 61 C7 D8 93 0A CA 47  ........wa.....G
#     0030: 4E 55 B5 5C 98 F9 AD 7A   A1 24 3D 47 CC 6F 4B 12  NU.\...z.$=G.oK.
#     0040: 4E 7A FA A8 25 3D D0 0F   9E 99 77 4A D9 29 99 4D  Nz..%=....wJ.).M
#     0050: 81 03 B4 F6 DB CA 52 C9   65 E0 04 E7 29 E9 23 A5  ......R.e...).#.
#     0060: 00 C7 4A FE 8E E1 E8 57   5F 77 91 90 F7 A9 49 91  ..J....W_w....I.
#     0070: 88 74 95 BF 67 C4 9F 50   7A 9D 55 3D 44 E2 9E A6  .t..g..Pz.U=D...
#     0080: AC E4 02 76 88 CD 2D D8   C2 9F 3B 28 0C 71 AA B0  ...v..-...;(.q..
#     0090: 2C 0D F4 E5 96 88 F1 A5   67 2D 28 E3 10 9F A5 6F  ,.......g-(....o
#     00A0: 29 54 C5 3C 55 30 AA FA   5B C2 A8 77 8A D4 60 A0  )T.<U0..[..w..`.
#     00B0: DE 0D 4C 17 E1 35 54 4E   99 62 F5 2A 51 78 C8 EB  ..L..5TN.b.*Qx..
#     00C0: 6B C6 67 B3 43 E3 A7 FB   E1 4A B6 96 5B 90 C4 1C  k.g.C....J..[...
#     00D0: 10 87 E0 58 47 9A 41 A4   A4 D9 9D 15 EE 16 B9 15  ...XG.A.........
#     00E0: 4F 08 AA F6 B0 8F B8 6D   E4 25 B2 65 6C BD 2A 3D  O......m.%.el.*=
#     00F0: 2F 7A 87 EA 93 76 7F 3C   35 C6 EC C3 D1 99 A2 D6  /z...v.<5.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.655 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3B D2 D0 F1 91 91 3E 74   E4 D7 A1 08 11 33 80 25  ;.....>t.....3.%
#     0010: 48 B4 9C B8 F6 34 23 1D   54 F5 8F 33 2B 1A 9A E9  H....4#.T..3+...
#     0020: 90 EE 1A 39 48 F3 71 F3   B7 23 66 E5 A1 F0 56 E4  ...9H.q..#f...V.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.662 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 10:16:44.663 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.664 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 10:16:44.664 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.664 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 10:16:44.664 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:44.664 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.665 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.672 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 DC 4F 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:28.000 UTC",
#       "not  after"         : "2024-01-11 10:16:28.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#           0010: DC 66 05 61                                        .f.a
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E 23 E4 C5 EC 3B C9 38   9F 01 D9 DC EE DC E6 4F  >#...;.8.......O
#           0010: 27 9D EE EA                                        '...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B2 34 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:21.000 UTC",
#       "not  after"         : "2024-01-11 10:16:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#           0010: B6 D5 55 19                                        ..U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#           0010: DC 66 05 61                                        .f.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.708 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 94 B8 E3 77 BD EE 3C   5E 6B 7E 04 82 92 9C 0E  `...w..<^k......
#     0010: 22 41 13 21 2E 4A F6 14   81 EB FC 05 CD 70 46 EF  "A.!.J.......pF.
#     0020: E4 6A 0C 17 59 8A 14 96   A7 48 F1 0A 5A 24 47 E6  .j..Y....H..Z$G.
#     0030: 31 4B A5 3A 17 B3 E7 BB   86 22 93 EE 96 49 C0 68  1K.:....."...I.h
#     0040: F5 66 99 3A F8 F0 75 82   50 9A D8 14 7B 4C A6 A2  .f.:..u.P....L..
#     0050: 79 C9 DC B5 E2 3A 05 1D   3A F7 C5 6C 92 74 D8 18  y....:..:..l.t..
#     0060: 3D 78 D7 84 C3 DA 77 D6   34 EA 9C 9D 4F 55 14 04  =x....w.4...OU..
#     0070: CD A3 C5 7B C3 16 6B E1   15 2A 09 1F E7 FB 79 88  ......k..*....y.
#     0080: A1 36 6A 3E E0 84 56 2B   19 7A 32 69 35 FF 59 53  .6j>..V+.z2i5.YS
#     0090: 8C 96 70 31 EC D8 44 7A   2A DF AA 0F C6 D3 A6 55  ..p1..Dz*......U
#     00A0: 78 20 4B 66 D7 1D BE 22   95 AF B2 32 10 4A 29 9A  x Kf..."...2.J).
#     00B0: 20 F7 32 9B 86 1D 20 01   75 E8 5F A2 28 5D 38 7B   .2... .u._.(]8.
#     00C0: EC 31 FC E7 6A 92 D3 6C   FF 3C 46 5A 1C CE 89 05  .1..j..l.<FZ....
#     00D0: B8 BD 19 AA 6F 39 E8 BD   0A 48 58 65 1A 81 19 24  ....o9...HXe...$
#     00E0: 1D F8 51 85 F0 27 A7 BF   75 12 3E 26 57 22 B1 5D  ..Q..'..u.>&W".]
#     00F0: 60 AB 61 EC A5 7B B8 6E   16 28 B0 D7 42 68 63 6C  `.a....n.(..Bhcl
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.710 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 76 C1 D3 86 CD 45 50 4B   70 E0 79 4F 75 8C 0E 1E  v....EPKp.yOu...
#     0010: D3 62 29 32 26 52 9A C1   2D 93 FF 3B 76 2F 29 C6  .b)2&R..-..;v/).
#     0020: 6B E5 7F 58 99 35 06 F1   62 0D BE BB 61 26 0B 87  k..X.5..b...a&..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.714 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:44.837 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6E 79 18 08 32 32 82 89 D4 79 3F A3 26 EF EF C4 4D 15 CA 6B 91 18 AE C3 FA 18 7A 72 36 D0 B4 5E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 10:16:45.529 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 10:16:45.529 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 10:16:47.575; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 10:16:47.581; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 10:16:47.955; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 10:16:47.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 10:16:47.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-zIQsCi/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 10:16:47.991 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 DC 4F 8D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:28.000 UTC",
#     "not  after"         : "2024-01-11 10:16:28.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3E 23 E4 C5 EC 3B C9 38   9F 01 D9 DC EE DC E6 4F  >#...;.8.......O
#         0010: 27 9D EE EA                                        '...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B2 34 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:21.000 UTC",
#     "not  after"         : "2024-01-11 10:16:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 10:16:47.994 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B2 34 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:21.000 UTC",
#     "not  after"         : "2024-01-11 10:16:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 00 38 9D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:19.000 UTC",
#     "not  after"         : "2024-01-11 10:16:19.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 10:16:48.007 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:16:48.192 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:48.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:16:48.194 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:16:48.194 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:48.198 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:48.209 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:48.210 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:48.210 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:16:48.212 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A2 44 62 4C 21 FA 57 01 57 3D F4 B3 91 29 A9 97 1B 41 79 5B 84 F3 94 0A 69 DD DD 7D 51 93 DE A9",
#   "session id"          : "E4 0E 46 E3 73 F8 BA 7F FB BA 7E 46 B7 61 C6 ED BA 15 1D FA 70 6E DB 09 EB 0F 08 E1 E7 1F A9 9F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A6 15 D3 33 35 92 90 A9   12 5F 29 BE 91 D3 39 F6  ...35...._)...9.
#             0010: 98 90 9C C5 4D 24 08 B7   45 AC D9 09 34 01 D7 3E  ....M$..E...4..>
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.294 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C0 10 4B 9F F5 53 AB AF DF 4D F2 59 63 4A 0C 77 DE DA E8 10 19 36 1C 9A FF F2 47 A2 BF 37 75 93",
#   "session id"          : "E4 0E 46 E3 73 F8 BA 7F FB BA 7E 46 B7 61 C6 ED BA 15 1D FA 70 6E DB 09 EB 0F 08 E1 E7 1F A9 9F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 25 8B 7F 24 B6 02 BD 3E   12 7D 29 53 D2 07 B3 F0  %..$...>..)S....
#           0010: 7F 1A 32 1F 0D 78 16 D4   DD 83 67 28 F2 56 4C 2A  ..2..x....g(.VL*
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.295 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.295 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.295 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.296 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.296 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.296 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.296 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.296 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.296 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.296 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.299 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.300 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.300 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.315 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.316 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.321 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.326 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.327 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.333 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.333 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.333 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.333 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.335 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.335 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.336 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.339 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "45 CD 8D 0D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:24.000 UTC",
#       "not  after"         : "2024-01-11 10:16:24.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#           0010: DC 66 05 61                                        .f.a
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2C 2C 2B D4 DC 61 77 8D   A6 2A 5A 28 58 35 C4 F0  ,,+..aw..*Z(X5..
#           0010: CB 03 6E 7E                                        ..n.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.340 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.442 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B2 34 9B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 10:16:21.000 UTC",
#     "not  after"         : "2024-01-11 10:16:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#         0010: B6 D5 55 19                                        ..U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#         0010: DC 66 05 61                                        .f.a
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.445 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D E1 E6 09 66 51 15 51   A4 A9 CF 10 C7 0B CF 9F  ....fQ.Q........
#     0010: 56 11 C5 F5 63 F5 51 C7   F0 DD 46 1E 76 8C B2 56  V...c.Q...F.v..V
#     0020: 66 8A A2 06 21 49 15 33   CF 32 D5 21 58 89 96 15  f...!I.3.2.!X...
#     0030: BD 02 6A 16 71 46 56 0B   E4 34 BC 2C 31 D9 5B 92  ..j.qFV..4.,1.[.
#     0040: 7F 7C 4C 14 20 09 17 C1   73 C5 12 EC 23 F3 36 48  ..L. ...s...#.6H
#     0050: CA E6 21 61 FF 33 EA D4   D1 3A F4 39 1D 88 2E 3E  ..!a.3...:.9...>
#     0060: E8 E4 E3 DD 3F 6D AB 69   08 EE EB 1C C0 C1 EB 8B  ....?m.i........
#     0070: C7 A6 26 1D 52 26 13 A2   51 55 B8 42 6D 67 67 CC  ..&.R&..QU.Bmgg.
#     0080: CD 63 B4 3A 29 61 C9 89   45 3C A9 01 94 A1 87 28  .c.:)a..E<.....(
#     0090: ED FF 95 B2 C2 E6 42 67   C1 06 E5 49 B8 9B F1 03  ......Bg...I....
#     00A0: A2 20 03 3C 3C 44 4B AC   C7 8A 43 FE 19 AD DC AA  . .<<DK...C.....
#     00B0: 5F 25 5D 71 DC AC 03 4F   21 6C 81 DF CD DC C7 1F  _%]q...O!l......
#     00C0: 1D 28 F9 94 41 F7 52 6B   38 B5 9D C8 01 B4 BB CA  .(..A.Rk8.......
#     00D0: 7D A1 48 BD A5 97 69 C2   DD AE 36 82 BB 3F 01 8B  ..H...i...6..?..
#     00E0: 81 A9 E6 08 C0 BD 42 B5   F9 46 5B D6 3C 1A 3D 27  ......B..F[.<.='
#     00F0: 67 DD DF 4E FA 20 0D BB   1A FE 9C 10 A7 FC 20 6D  g..N. ........ m
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.447 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0A F2 5C 9B F5 7C A5 28   F1 B7 60 1B 47 57 21 6B  ..\....(..`.GW!k
#     0010: 90 D2 05 E5 0D 10 40 19   DC F0 55 BD 43 2B 7E 36  ......@...U.C+.6
#     0020: 70 FC 40 34 50 15 5C 3D   1F 47 5B DF 9F 8D D7 74  p.@4P.\=.G[....t
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.448 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 10:16:48.449 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.449 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 10:16:48.450 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.450 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 10:16:48.450 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:16:48.450 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.450 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.458 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 DC 4F 8D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:28.000 UTC",
#       "not  after"         : "2024-01-11 10:16:28.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#           0010: DC 66 05 61                                        .f.a
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3E 23 E4 C5 EC 3B C9 38   9F 01 D9 DC EE DC E6 4F  >#...;.8.......O
#           0010: 27 9D EE EA                                        '...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B2 34 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:21.000 UTC",
#       "not  after"         : "2024-01-11 10:16:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#           0010: B6 D5 55 19                                        ..U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#           0010: DC 66 05 61                                        .f.a
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.499 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 F7 AC 98 66 D7 8A 3C   6C DF A6 91 F1 97 C9 0F  4...f..<l.......
#     0010: 16 DA 41 0D 43 E9 24 CC   14 0F 7F E4 88 78 00 7A  ..A.C.$......x.z
#     0020: C6 8D C6 D6 F6 B9 3B E0   47 BF F0 9D 29 8E 19 F5  ......;.G...)...
#     0030: 53 D5 6F 7E 48 50 43 8C   2B 51 81 B7 1B 16 B0 BC  S.o.HPC.+Q......
#     0040: 05 7B 9B AD DA B3 22 80   C3 2C 0B 04 FF F8 67 D1  ......"..,....g.
#     0050: D4 80 73 56 D5 0F FA 47   D3 3A C7 17 F1 91 72 F7  ..sV...G.:....r.
#     0060: 9A 7A B5 35 70 DD 05 7E   A0 C6 4E A3 A7 E0 35 EA  .z.5p.....N...5.
#     0070: B1 84 00 9C 3F 99 B5 64   66 49 ED 32 DD 46 55 93  ....?..dfI.2.FU.
#     0080: 8C 18 52 4D F9 8E 5D A2   BB CE 9B F9 6F F4 80 CB  ..RM..].....o...
#     0090: 58 A5 15 C3 A8 A1 F8 05   4D 0E D8 67 10 C7 E7 7D  X.......M..g....
#     00A0: 25 B0 21 E6 E1 01 EF 9D   38 A4 BC BF F7 32 4E 49  %.!.....8....2NI
#     00B0: 18 81 A3 C0 66 0A B2 E8   AA 9D BF 8D 42 02 54 1C  ....f.......B.T.
#     00C0: 56 2D 5D 73 94 FC EE 62   7D A6 AF 92 6B CC 96 26  V-]s...b....k..&
#     00D0: 85 1D F1 C7 06 2F 88 13   F5 2E 18 E1 05 D8 5B 9E  ...../........[.
#     00E0: 95 33 33 3F 77 64 B9 17   43 D8 D4 38 EC 38 7E 52  .33?wd..C..8.8.R
#     00F0: D9 30 C7 07 62 3B 80 D7   77 DB EF CF E0 1A 98 FB  .0..b;..w.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.502 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 A2 98 29 9A FE 17 F2   13 42 AC 4A 08 52 F2 EC  ...).....B.J.R..
#     0010: D7 D7 58 7F 6C 53 04 37   3D 9B A3 68 AF A1 ED 9B  ..X.lS.7=..h....
#     0020: 55 E5 C2 AD E2 EE AC F8   A4 99 DF F0 DB A4 51 F7  U.............Q.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.507 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:16:48.583 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "75 32 9C 99 F6 E2 49 9D E8 F0 9B B0 48 4D 0F 89 FD 5A 61 B5 DF 66 69 23 0F FB 2C 2A 9B 59 41 FB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:48.636 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:48.636 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:48.636 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 10:16:48.637 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-13 10:16:48.964 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 10:16:48.965 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-13 10:17:02.559; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 10:17:02.914 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B2 34 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:21.000 UTC",
#       "not  after"         : "2024-01-11 10:16:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#           0010: B6 D5 55 19                                        ..U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 49 EC A6 FA 41 C6 49 CC   7D 9F E8 6C 73 90 FD FF  I...A.I....ls...
#           0010: DC 66 05 61                                        .f.a
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 00 38 9D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 10:16:19.000 UTC",
#       "not  after"         : "2024-01-11 10:16:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 47 53 29 CE 16 AA 3F   37 EB 32 0A 82 5E 86 6F  .GS)...?7.2..^.o
#           0010: B6 D5 55 19                                        ..U.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 10:17:02.928 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:17:03.101 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:17:03.102 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:17:03.103 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 10:17:03.104 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:17:03.108 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:17:03.119 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:17:03.119 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:17:03.120 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 10:17:03.121 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6E CD F5 1C 29 E3 19 30 1A D6 20 22 01 8B 6F 7F 1A 4D 83 D6 28 C1 4B D6 53 3D 41 FA 69 C4 75 8E",
#     "session id"          : "2C 72 F9 FF D8 6F 33 1F 1C AD 08 11 B4 89 07 CC D9 02 CE 64 02 8F 13 25 9F 20 DB 6A 0C 46 C0 22",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 18 16 18 A7 3E CC 29 0C   55 10 CF 59 D5 E4 EF 58  ....>.).U..Y...X
#               0010: 6F 30 26 A7 A4 78 71 91   46 EC 79 60 A9 64 09 56  o0&..xq.F.y`.d.V
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.136 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "80 54 2D 02 18 70 9D 6F E9 CD B9 27 50 AF 2A 13 57 E2 47 A6 10 01 68 60 6B A1 7A 2D 22 27 FA 14",
#     "session id"          : "2C 72 F9 FF D8 6F 33 1F 1C AD 08 11 B4 89 07 CC D9 02 CE 64 02 8F 13 25 9F 20 DB 6A 0C 46 C0 22",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 81 CE 2F A4 BB F3 EB 96   1E 5D 4F 54 37 82 64 2A  ../......]OT7.d*
#             0010: C0 97 53 90 6B 2D 92 DF   CB 4F 42 BB E9 6B 5B 52  ..S.k-...OB..k[R
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.137 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.137 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.138 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.138 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.139 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.139 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:17:03.140 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.141 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.149 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.151 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.152 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.155 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.155 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.156 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.156 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.156 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:17:03.156 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:17:03.156 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.157 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.158 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.158 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.158 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.159 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 10:17:03.159 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 10:17:03.159 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# 

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14574ms
ok 75 stop command for single port in 17393ms
not ok 76 status detects locally running solr in 1543ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7655ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1489ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2592ms
ok 80 copying files around in 6937ms
ok 81 upconfig in 2844ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
not ok 84 Cleanup in 2516ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 51s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jmam5xezpq7gm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8171 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8171/

1 tests failed.
FAILED:  org.apache.solr.search.LargeFieldTest.test

Error Message:
org.junit.ComparisonFailure: expected:<v][
]HsJw#14;BF#26;#2;D%+...> but was:<v][
]HsJw#14;BF#26;#2;D%+...>

Stack Trace:
org.junit.ComparisonFailure: expected:<v][
]HsJw#14;BF#26;#2;D%+...> but was:<v][
]HsJw#14;BF#26;#2;D%+...>
	at __randomizedtesting.SeedInfo.seed([AD8C93CA5787E31B:25D8AC10F97B8EE3]:0)
	at org.junit.Assert.assertEquals(Assert.java:117)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.search.LargeFieldTest.test(LargeFieldTest.java:117)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1432 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:45313/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-13 08:08:12.044; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 08:08:12.049; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:45313/solr] to [https://127.0.0.1:45313].
# WARN  - 2023-10-13 08:08:12.816; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-13 08:08:12.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17152ms
ok 71 start solr with client truststore and security manager in 19330ms
not ok 72 start solr with mTLS needed in 56387ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-nPYPXs/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45313 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45313 (pid=251836). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45314 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 45314 (pid=251948). Happy searching!
#
#     INFO  - 2023-10-13 08:09:15.087; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 08:09:15.091; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 08:09:16.375; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@743cb8e0(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 08:09:16.377; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 08:09:16.378; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(ca,h=[localhost],a=[],w=[]) for Client@4fad94a7[provider=null,keyStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:16.451 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C E2 2C A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:09:01.000 UTC",
#     "not  after"         : "2024-01-11 08:09:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 CF 46 C4 5A 61 E5 48   D1 7D 42 5B FF 55 B2 AB  7.F.Za.H..B[.U..
#         0010: 0C BD D0 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 B1 23 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:54.000 UTC",
#     "not  after"         : "2024-01-11 08:08:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:16.455 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C5 00 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:52.000 UTC",
#     "not  after"         : "2024-01-11 08:08:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 B1 23 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:54.000 UTC",
#     "not  after"         : "2024-01-11 08:08:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:16.496 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 08:09:16.763 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 08:09:16.763 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 08:09:16.764 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 08:09:16.764 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:16.827 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:16.827 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:16.829 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:16.829 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:16.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:16.981 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:16.982 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:16.982 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:16.984 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 9B B7 8E F1 BB 3F 62 AD 8D 5F 7D E2 3F A3 40 0D 62 B1 7B 38 01 74 42 26 11 AA F5 71 1C 0B 0D",
#   "session id"          : "2E 7F D2 71 B7 E5 BB 25 2C 26 ED 0E 85 A0 0E 2D 25 1F EE 24 39 62 EB 75 1F 6E 95 96 AB 9F 64 2A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0E D2 3A 10 FE CE AD 7C   67 88 91 EA DE 73 89 01  ..:.....g....s..
#             0010: 33 2E 11 4A 8A 09 CD 14   B8 2A 9C ED EE 20 23 50  3..J.....*... #P
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.155 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F6 FE 30 10 C3 F9 2F A2 44 4C 01 54 A2 46 6C 3D B2 B4 47 89 06 F7 7C 19 A4 AF 2B 50 24 66 44 11",
#   "session id"          : "2E 7F D2 71 B7 E5 BB 25 2C 26 ED 0E 85 A0 0E 2D 25 1F EE 24 39 62 EB 75 1F 6E 95 96 AB 9F 64 2A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 40 A0 96 10 8A B2 8F 2D   19 68 DC DC C9 ED CD 9A  @......-.h......
#           0010: 3A 34 C3 1B 5F 7C 68 BB   F4 D8 C8 B9 37 C2 4C 0C  :4.._.h.....7.L.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.155 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.155 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.161 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.162 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.162 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.162 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.167 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.167 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.170 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.171 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.172 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.172 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.178 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.198 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.200 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.201 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.218 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.218 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.218 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.219 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.220 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.220 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.220 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.220 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.227 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.227 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.227 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.230 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.230 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.231 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.231 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.242 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 16 88 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:08:57.000 UTC",
#       "not  after"         : "2024-01-11 08:08:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#           0010: 1E 19 9E D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 91 E2 FA 58 07 A0 BF   38 8A 8B C9 99 C1 91 16  ....X...8.......
#           0010: A9 0B 96 C0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.242 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.352 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 B1 23 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:54.000 UTC",
#     "not  after"         : "2024-01-11 08:08:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.355 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 59 38 7E A6 F8 20 F4 E3   DD 5E 1E 49 93 47 3B 93  Y8... ...^.I.G;.
#     0010: CD E0 B0 D9 1D 6F 12 A8   99 A1 D7 26 7E 06 B0 45  .....o.....&...E
#     0020: C0 18 72 24 3D 16 40 CB   BE D3 7D F0 5A 82 04 FA  ..r$=.@.....Z...
#     0030: 7C 46 6A 0D 3E 4D 62 5F   79 BF 05 C2 BD 5A FE 9F  .Fj.>Mb_y....Z..
#     0040: 15 08 81 FE 53 0B A0 3B   5E 95 B8 98 D6 E9 3B 59  ....S..;^.....;Y
#     0050: 3F D8 64 E3 DA F0 4A 52   55 26 E0 8F 3A 75 7C 8F  ?.d...JRU&..:u..
#     0060: 25 85 69 7E F3 91 5C CC   24 F3 73 1F 83 45 3B A4  %.i...\.$.s..E;.
#     0070: 4F AA 49 56 3B 01 F6 3A   49 82 BB 84 2D 40 32 0E  O.IV;..:I...-@2.
#     0080: AE 75 26 09 F0 35 78 42   74 A1 B9 A5 F0 64 CC 0E  .u&..5xBt....d..
#     0090: AC 07 B7 DE E5 48 80 8D   90 14 0D 74 CB C8 01 12  .....H.....t....
#     00A0: 08 FB C7 C4 C9 EB 0C 39   36 63 0D 51 F5 37 57 BB  .......96c.Q.7W.
#     00B0: 29 4F 88 1E 42 36 61 3D   0E 7A 3F A0 F1 68 37 92  )O..B6a=.z?..h7.
#     00C0: F0 C4 58 5E DC 11 31 A7   F6 E5 E2 EC 77 99 A4 82  ..X^..1.....w...
#     00D0: 9F 8D 73 49 86 F8 24 A2   F4 2F FB A0 39 B6 49 F5  ..sI..$../..9.I.
#     00E0: 93 17 3E 05 42 AE 10 08   BA 22 D1 D8 90 BD F9 6E  ..>.B....".....n
#     00F0: 5D 0C C8 4B 38 6C C9 54   FB 2A 7C BA 49 A4 B8 CF  ]..K8l.T.*..I...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.359 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 46 3F 49 36 54 59 70   2B CC 6E 9D 97 B9 2B 31  .F?I6TYp+.n...+1
#     0010: 24 28 55 AA DB D8 5F 95   F3 38 BB 35 C3 CC 98 93  $(U..._..8.5....
#     0020: 90 57 D7 77 FA E4 58 3D   07 5C 3A 0F 26 F9 07 B6  .W.w..X=.\:.&...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.362 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 08:09:17.363 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.363 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 08:09:17.363 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.363 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 08:09:17.363 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:17.363 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.364 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.369 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C E2 2C A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:09:01.000 UTC",
#       "not  after"         : "2024-01-11 08:09:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#           0010: 1E 19 9E D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 CF 46 C4 5A 61 E5 48   D1 7D 42 5B FF 55 B2 AB  7.F.Za.H..B[.U..
#           0010: 0C BD D0 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 B1 23 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:08:54.000 UTC",
#       "not  after"         : "2024-01-11 08:08:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#           0010: 00 F0 8E D6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#           0010: 1E 19 9E D1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.852 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E DC E2 D3 8E 9E F0 90   D3 DB 5C 5F 8A DC DF BB  ^.........\_....
#     0010: 41 B5 3B 7C 1D 41 04 2D   E0 C5 BC 1F B9 60 60 8E  A.;..A.-.....``.
#     0020: E1 28 64 FD 41 AC 53 D8   93 42 11 60 66 86 C0 98  .(d.A.S..B.`f...
#     0030: FB 04 C7 91 89 67 63 9F   F2 A3 50 B0 06 C0 0F F4  .....gc...P.....
#     0040: FF F0 45 D0 DE A0 35 34   69 DD 99 11 A2 B5 55 87  ..E...54i.....U.
#     0050: D2 E7 E2 15 51 B7 59 C8   25 CF 31 88 90 BB D8 58  ....Q.Y.%.1....X
#     0060: 9D BC 4C 76 3C 38 93 27   72 B4 DD F0 A6 F7 65 BD  ..Lv<8.'r.....e.
#     0070: 97 4E E6 DC AB 7F 0F 30   EC B2 98 2D D8 5E 34 49  .N.....0...-.^4I
#     0080: FE DB F3 F8 3D 7A 17 C6   10 66 01 DE 50 B2 D1 87  ....=z...f..P...
#     0090: CD E1 5A BE D9 C7 B7 D2   C5 0C 56 25 8D E8 88 D9  ..Z.......V%....
#     00A0: 47 A0 BF EE 92 A7 82 9B   8C DB 83 2E 56 24 64 18  G...........V$d.
#     00B0: FE 62 F9 96 76 57 1D 24   F2 4F 2B C7 8E F4 90 EB  .b..vW.$.O+.....
#     00C0: 55 5F DA 53 3A 6D F4 47   AD 6B 4F 35 B4 C3 37 A1  U_.S:m.G.kO5..7.
#     00D0: FB 1C 85 33 7B A4 A2 D1   89 04 36 E7 8C 79 A0 11  ...3......6..y..
#     00E0: 32 42 4F D5 42 A3 38 94   4E 0A 1B D7 33 F4 95 65  2BO.B.8.N...3..e
#     00F0: AC 05 48 C6 F5 A1 FF 6D   7D AF 55 32 EC AE CC 54  ..H....m..U2...T
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.853 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 5A A1 04 D6 EA 4F 29   40 75 6E 1B 59 CD F5 A0  .Z....O)@un.Y...
#     0010: 69 A3 47 E7 8C D6 60 D7   F3 86 28 7E BF B9 0E 61  i.G...`...(....a
#     0020: CA 17 DF 5A A2 09 74 02   09 D0 96 BA 85 A7 48 69  ...Z..t.......Hi
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.853 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:17.983 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "39 1D D5 70 FA 9B 40 62 C1 AD 78 54 AA 8E 8A 62 C0 49 E1 2D FE F1 EC 95 5E 43 A8 E5 D9 A7 30 6C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 08:09:18.508 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 08:09:18.509 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 08:09:19.610; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 08:09:19.614; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 08:09:20.072; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@43b4fe19(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 08:09:20.075; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 08:09:20.075; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(ca,h=[localhost],a=[],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nPYPXs/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:20.109 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C E2 2C A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:09:01.000 UTC",
#     "not  after"         : "2024-01-11 08:09:01.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 37 CF 46 C4 5A 61 E5 48   D1 7D 42 5B FF 55 B2 AB  7.F.Za.H..B[.U..
#         0010: 0C BD D0 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 B1 23 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:54.000 UTC",
#     "not  after"         : "2024-01-11 08:08:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:20.113 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "43 C5 00 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:52.000 UTC",
#     "not  after"         : "2024-01-11 08:08:52.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 B1 23 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:54.000 UTC",
#     "not  after"         : "2024-01-11 08:08:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:20.125 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:20.295 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:20.295 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:20.297 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:20.297 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:20.301 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:20.312 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:20.313 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:20.313 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:20.315 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 E1 23 6D 5E DF C1 4E 20 A6 28 53 7B 46 68 7D 05 0D 70 4C B2 99 8D 96 7A 86 44 12 C4 60 2C 45",
#   "session id"          : "AD 78 A6 1D 4D 05 DC 08 A9 85 E0 6E 6C 46 25 DD 64 F8 9B 53 BC 42 2C 5D 6B E7 CB 0E 0E B5 33 24",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 32 B0 8E 3C 34 AB F4 65   72 5A D7 A5 A2 74 10 7D  2..<4..erZ...t..
#             0010: 75 6C 48 C4 7E 58 FB 37   50 74 1D 77 3B 87 A1 6D  ulH..X.7Pt.w;..m
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.447 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0F DE 66 14 EF A8 2D ED 3F D6 96 08 EF E1 99 34 E4 6D 51 20 1E F3 9B F5 EF F0 D6 6C 0E 8E 4E 87",
#   "session id"          : "AD 78 A6 1D 4D 05 DC 08 A9 85 E0 6E 6C 46 25 DD 64 F8 9B 53 BC 42 2C 5D 6B E7 CB 0E 0E B5 33 24",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 78 94 DE 6F 8C 8F 32 01   CE F7 98 1A 53 9E 77 4D  x..o..2.....S.wM
#           0010: 6F D0 1D 5A C4 98 C1 F1   2D C5 B9 8F 0F 12 E9 1A  o..Z....-.......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.447 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.448 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.453 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.454 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.455 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.455 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.455 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.462 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.474 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.475 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.478 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.478 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.479 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.479 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.479 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.479 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.491 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.491 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.492 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.492 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.493 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.493 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.494 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.500 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 16 88 FD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:08:57.000 UTC",
#       "not  after"         : "2024-01-11 08:08:57.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#           0010: 1E 19 9E D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: FB 91 E2 FA 58 07 A0 BF   38 8A 8B C9 99 C1 91 16  ....X...8.......
#           0010: A9 0B 96 C0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.502 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.794 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "15 B1 23 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 08:08:54.000 UTC",
#     "not  after"         : "2024-01-11 08:08:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#         0010: 00 F0 8E D6                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#         0010: 1E 19 9E D1                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.797 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D CC 09 45 F9 08 03 F6   F6 C8 DB 51 23 29 10 3A  M..E.......Q#).:
#     0010: B1 08 4F 3B 78 CC 2D 5C   85 81 03 D2 74 35 6C 96  ..O;x.-\....t5l.
#     0020: 55 4D CB 59 4C D1 03 3B   4F F4 48 D3 D8 4D 70 16  UM.YL..;O.H..Mp.
#     0030: 7B 5A 8E 35 84 15 B1 F2   75 B5 FD 4F 65 7A 96 94  .Z.5....u..Oez..
#     0040: C9 8E 62 23 0E 67 0A 64   48 46 A2 5E 77 01 B0 9E  ..b#.g.dHF.^w...
#     0050: A1 CF 13 91 4C 4B 08 34   59 7B 8B 6F 3A B4 8D 16  ....LK.4Y..o:...
#     0060: 83 78 45 A8 63 35 99 AE   40 BD EA 3E 7E C6 C8 6A  .xE.c5..@..>...j
#     0070: 95 FF 9C EB 72 78 3E 73   F3 BA EF 50 E4 E6 F4 29  ....rx>s...P...)
#     0080: AC 23 81 9F 33 A9 6D 69   25 22 4F 8C 24 FA A2 AC  .#..3.mi%"O.$...
#     0090: 2E E2 EA B7 E4 EE 34 AA   B0 BE FC C7 9E 90 D2 CC  ......4.........
#     00A0: FA 3D 7C 11 31 3E F7 D0   0C C6 60 AB 57 EF AD 60  .=..1>....`.W..`
#     00B0: 6F 42 60 DB 8D 37 64 31   5E A5 31 69 B3 9F A1 89  oB`..7d1^.1i....
#     00C0: 13 DE EB D0 C7 63 4B 1D   7D A4 28 EA 37 16 56 8A  .....cK...(.7.V.
#     00D0: D1 FB F8 04 B4 A9 BC 36   3D 17 FD 0D 82 AB 74 6D  .......6=.....tm
#     00E0: 9A 70 A5 0C 42 40 A0 48   24 B9 E0 9A 4B 84 06 D7  .p..B@.H$...K...
#     00F0: D7 49 61 F1 03 CA 7C 2D   C2 3F D7 E9 64 5B E0 D4  .Ia....-.?..d[..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.799 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7A 8E FF 83 C5 B4 62 5B   01 CE 03 6C AA 86 F0 52  z.....b[...l...R
#     0010: 18 49 19 1E 96 29 70 75   33 11 68 D5 EB 32 7C 32  .I...)pu3.h..2.2
#     0020: 59 55 D7 F0 69 3E 6E FF   4D F1 CD 31 A4 C1 80 92  YU..i>n.M..1....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.801 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 08:09:20.801 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.801 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 08:09:20.802 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.802 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 08:09:20.802 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:20.802 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.802 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.804 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C E2 2C A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:09:01.000 UTC",
#       "not  after"         : "2024-01-11 08:09:01.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#           0010: 1E 19 9E D1                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 37 CF 46 C4 5A 61 E5 48   D1 7D 42 5B FF 55 B2 AB  7.F.Za.H..B[.U..
#           0010: 0C BD D0 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 B1 23 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:08:54.000 UTC",
#       "not  after"         : "2024-01-11 08:08:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#           0010: 00 F0 8E D6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#           0010: 1E 19 9E D1                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.826 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 07 63 AA 95 A5 E0 67   A7 C0 B7 93 51 A1 E8 3A  0.c....g....Q..:
#     0010: 8F 8F 51 15 C3 A0 61 C5   BC B8 A5 77 BA 45 DC 20  ..Q...a....w.E.
#     0020: C6 90 9D B0 09 DD 79 2E   E8 11 9C FD 0B 19 86 62  ......y........b
#     0030: 6D C8 50 65 65 13 5E 02   60 4C 94 76 68 56 0E FC  m.Pee.^.`L.vhV..
#     0040: 17 1E 3D CD 5F 3E 8D 44   07 15 A4 EA EF E6 81 D7  ..=._>.D........
#     0050: E1 BD 02 91 38 9E 14 62   B1 AB 0F F4 E2 47 20 D4  ....8..b.....G .
#     0060: A8 D9 79 88 1E A6 56 13   BD 25 62 E0 13 54 9B 60  ..y...V..%b..T.`
#     0070: 69 BE 6F 90 98 5E C7 B6   C3 A7 43 F9 50 C5 DF 97  i.o..^....C.P...
#     0080: A2 F3 AC 86 13 BE C6 E0   3B 78 DD 10 B7 1C DF EF  ........;x......
#     0090: 11 CB A5 D2 BD 8E 81 4C   9E CC F4 C2 27 47 D4 37  .......L....'G.7
#     00A0: 70 F5 72 6E E3 DC F3 73   29 D4 3F 74 17 C8 17 C1  p.rn...s).?t....
#     00B0: AB 6B 46 81 14 C5 34 4A   3F 8D B9 EB 43 30 25 E5  .kF...4J?...C0%.
#     00C0: 05 DC 70 3F 56 B2 44 EC   94 AB 5D 01 A1 69 23 F4  ..p?V.D...]..i#.
#     00D0: 6C 18 8F F8 0C 1D D9 6F   BD C3 9A CE 18 96 0D 28  l......o.......(
#     00E0: 68 43 C5 5D 16 80 5E 71   A7 2B 41 8F C0 72 61 46  hC.]..^q.+A..raF
#     00F0: BC 6F 37 D1 2D 79 C3 C7   9C A0 AA 2F 12 05 D1 57  .o7.-y...../...W
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.827 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B8 E1 2D CE CA CC 8E AB   62 8E 93 0F 1A BC EC 79  ..-.....b......y
#     0010: 3F 07 FF E4 3B CB 1D E3   1C C9 20 0E 51 5F 00 B1  ?...;..... .Q_..
#     0020: 32 CA 10 B6 E2 05 42 65   DB 6C 06 8F 2C FA 55 7A  2.....Be.l..,.Uz
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.828 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:20.879 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0A 9A 80 6A 98 86 CA 3C FC 13 4A 04 CC 47 F3 B5 68 90 B1 D5 E3 4E 85 12 DE 01 69 0B 8F F3 D2 1D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 08:09:21.168 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 08:09:21.170 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-13 08:09:34.458; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:34.930 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "43 C5 00 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:08:52.000 UTC",
#       "not  after"         : "2024-01-11 08:08:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#           0010: 00 F0 8E D6                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "15 B1 23 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 08:08:54.000 UTC",
#       "not  after"         : "2024-01-11 08:08:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 95 B5 CB F0 A7 12 BE   56 B3 C2 8C 7A 1B 10 76  u.......V...z..v
#           0010: 00 F0 8E D6                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 B2 BC FF EA E7 93 1D   EF FB FE 99 3C 69 8C C1  ............<i..
#           0010: 1E 19 9E D1                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 08:09:34.943 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:35.107 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:35.107 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:35.109 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 08:09:35.109 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:35.113 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:35.124 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:35.124 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:35.125 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 08:09:35.127 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "77 98 CE E2 18 35 3A 3C E5 DE AC C0 5A E6 8D 7C 93 D2 23 51 C8 17 1A 9E 50 78 5F 61 48 1B 2D 87",
#     "session id"          : "8A E9 F1 8F 0B 1C 8A 2C BE BF 55 4B 22 DC 81 A6 BD 22 1D 19 E0 E8 D2 D0 EF F2 96 C6 D1 3C 7B 29",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 61 E9 1C 01 2D 07 A2 6F   32 C6 F0 57 35 93 24 04  a...-..o2..W5.$.
#               0010: 5D BC 74 D9 CF 7D C0 2E   17 82 C3 15 28 08 13 03  ].t.........(...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.144 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "3F 2A 1D E2 15 16 DC 02 79 B0 FE 2A 05 C9 D2 21 47 73 5C 46 64 DC 8E 53 48 62 70 A0 8F EF 97 18",
#     "session id"          : "8A E9 F1 8F 0B 1C 8A 2C BE BF 55 4B 22 DC 81 A6 BD 22 1D 19 E0 E8 D2 D0 EF F2 96 C6 D1 3C 7B 29",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 66 E7 50 3A 10 EB 91 9C   EF 8E 76 68 9B 1F C9 E8  f.P:......vh....
#             0010: CC 33 D3 DA FC 35 DB A7   02 5A 97 B3 8E BD 39 79  .3...5...Z....9y
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.145 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.145 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.145 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.146 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.146 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.146 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.146 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.146 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.148 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.148 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.148 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.148 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 08:09:35.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:35.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 08:09:35.150 UTC|SSLExtensions.java:215|Ignore impact of unsupported

[...truncated too long message...]

etty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14697ms
ok 75 stop command for single port in 17974ms
not ok 76 status detects locally running solr in 1574ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 8006ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1558ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3098ms
ok 80 copying files around in 6677ms
ok 81 upconfig in 2620ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1241ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1258ms
not ok 84 Cleanup in 2531ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.search.LargeFieldTest.test (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.LargeFieldTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.LargeFieldTest.test" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=AD8C93CA5787E31B -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 12s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nlv37uft77rry

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8170 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8170/

All tests passed

Build Log:
[...truncated 1283 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44063/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-13 04:43:04.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 04:43:04.468; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10896ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 44063 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44063 (pid=4095015). Happy searching!
#
#     INFO  - 2023-10-13 04:43:12.864; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 04:43:12.872; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-13 04:43:15.539; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 04:43:15.544; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 19170ms
not ok 72 start solr with mTLS needed in 53607ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-eGz2KX/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 44063 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44063 (pid=4096800). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 44064 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44064 (pid=4096909). Happy searching!
#
#     INFO  - 2023-10-13 04:44:01.727; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 04:44:01.759; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 04:44:02.642; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:44:02.644; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:44:02.645; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:02.697 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 6A B3 28",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:47.000 UTC",
#     "not  after"         : "2024-01-11 04:43:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 0D 1A AA D9 10 F8 27   06 44 BB 09 BB 37 BF 47  .......'.D...7.G
#         0010: F9 2A 7F 14                                        .*..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2C 26 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:40.000 UTC",
#     "not  after"         : "2024-01-11 04:43:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:02.707 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E DB 0C 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:38.000 UTC",
#     "not  after"         : "2024-01-11 04:43:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2C 26 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:40.000 UTC",
#     "not  after"         : "2024-01-11 04:43:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:02.835 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:03.231 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:03.231 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:03.234 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:03.234 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:03.245 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:03.265 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:03.265 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:03.265 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:03.267 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 DB B5 ED 44 B5 F2 F5 AD 20 D2 5E 14 F5 9D 5E 0C D1 D2 9F E8 37 7E 72 E6 02 1C 37 AC 05 31 ED",
#   "session id"          : "1E 6F 14 F5 AC 89 EF 6A 0E BC 08 7C 0C F0 96 32 F1 C9 C4 84 5E 33 C1 62 9F 27 64 4C 2B 39 B9 9B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 93 63 EB 09 30 D7 A0 56   FD 10 AB B1 87 B2 30 21  .c..0..V......0!
#             0010: 5E 5F 44 D6 92 FE CB 06   65 B7 79 09 8A 67 C0 17  ^_D.....e.y..g..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.794 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FF 67 DF 81 E4 FE C3 66 9E AB 6C 84 E8 A0 D0 C2 1B 39 5B 40 51 6D 46 6A F4 AB 39 B4 7A 54 36 23",
#   "session id"          : "1E 6F 14 F5 AC 89 EF 6A 0E BC 08 7C 0C F0 96 32 F1 C9 C4 84 5E 33 C1 62 9F 27 64 4C 2B 39 B9 9B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AE C0 42 D7 BC AA 7C 67   B0 95 B4 DF 93 5C D6 B9  ..B....g.....\..
#           0010: AC D1 97 2D C7 CC 58 0A   F5 82 E3 0F 91 57 33 4A  ...-..X......W3J
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.794 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.795 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.805 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.806 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.808 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.811 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.813 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.813 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.813 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.814 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.831 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.832 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.833 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.844 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.845 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.845 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.848 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.848 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.848 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.848 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.849 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.849 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.851 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.851 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.851 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.853 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.854 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.855 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.855 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.857 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 51 E1 E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:43.000 UTC",
#       "not  after"         : "2024-01-11 04:43:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#           0010: 34 78 0F 9D                                        4x..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C DD A5 95 5F 74 F6 5F   6B 12 BB 32 69 EA 50 4B  ...._t._k..2i.PK
#           0010: 45 99 9C 1C                                        E...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.857 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.908 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2C 26 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:40.000 UTC",
#     "not  after"         : "2024-01-11 04:43:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.911 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 04 41 E8 4A 39 FB 47 6D   77 5C 36 29 A6 A7 E4 C6  .A.J9.Gmw\6)....
#     0010: C1 0E 96 B9 1F 9B 4E C8   25 CC 8D 6C 4B 2A 72 0D  ......N.%..lK*r.
#     0020: 16 4E B7 A6 3C 14 95 12   09 82 28 A0 E3 80 6E F5  .N..<.....(...n.
#     0030: 5D 36 FB 8C 58 E3 45 73   96 E0 64 30 CD 46 60 AB  ]6..X.Es..d0.F`.
#     0040: 0D 35 9C 8D E0 06 B5 C4   C9 B7 28 96 E0 54 59 28  .5........(..TY(
#     0050: 96 DD EB EA 0D 77 46 32   ED 9A C7 7F AF 6E 90 DF  .....wF2.....n..
#     0060: 73 E0 E7 0E 4F 22 3C BD   06 9D 5A C2 28 05 66 D8  s...O"<...Z.(.f.
#     0070: 86 89 59 B7 C6 35 9E AA   54 61 BC 11 50 E1 10 F0  ..Y..5..Ta..P...
#     0080: 7B 13 25 49 AB EF 08 79   23 40 05 2F 71 27 4B 23  ..%I...y#@./q'K#
#     0090: 63 D5 FD ED 82 82 A1 C4   7B A9 B7 D5 01 0A 6D A6  c.............m.
#     00A0: DA F4 C0 AF 2C 85 CE 41   62 93 96 56 A5 5E BC C6  ....,..Ab..V.^..
#     00B0: 2A A0 61 2B 86 68 4B 28   DD 93 E1 66 21 6D 08 1B  *.a+.hK(...f!m..
#     00C0: BB 45 3F DD DF DE D8 3C   DA 6E 27 DC 6A AE 51 79  .E?....<.n'.j.Qy
#     00D0: F0 34 10 A3 AE 32 2A 99   61 AB F7 EF FB EC 30 8E  .4...2*.a.....0.
#     00E0: 82 26 3B 62 1A 82 46 B7   21 5C B9 45 EA CE 7E 4E  .&;b..F.!\.E...N
#     00F0: 0D 4C C0 EF AA B3 30 2D   C0 29 D1 1D 36 B5 88 3C  .L....0-.)..6..<
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.913 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2A 71 75 B9 AF E6 07 C4   59 39 7E 7C CC 22 E1 92  *qu.....Y9..."..
#     0010: 25 20 87 0D 97 65 45 9E   22 61 3D 48 B1 3B 5A 73  % ...eE."a=H.;Zs
#     0020: FD 01 44 6F 60 2B F2 CD   AC FA CA A4 C8 7D 2A D7  ..Do`+........*.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.914 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 04:44:03.915 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.915 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 04:44:03.915 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.915 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 04:44:03.915 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:03.916 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.916 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.918 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 6A B3 28",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:47.000 UTC",
#       "not  after"         : "2024-01-11 04:43:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#           0010: 34 78 0F 9D                                        4x..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 0D 1A AA D9 10 F8 27   06 44 BB 09 BB 37 BF 47  .......'.D...7.G
#           0010: F9 2A 7F 14                                        .*..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 2C 26 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:40.000 UTC",
#       "not  after"         : "2024-01-11 04:43:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#           0010: 2A D3 BC F0                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#           0010: 34 78 0F 9D                                        4x..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:03.953 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:03.954 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:03.954 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:03.954 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.958 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8E 34 A2 FF 21 6C 8D F1   60 00 48 FD 1B B1 AC 74  .4..!l..`.H....t
#     0010: 4E 82 09 0C E0 89 A7 FC   51 A9 4C 58 47 F3 12 59  N.......Q.LXG..Y
#     0020: 0C 31 3C 40 E7 1B 53 1B   A5 27 0D 16 A4 72 11 C0  .1<@..S..'...r..
#     0030: DA 15 DE 9C 45 86 F7 2A   53 4A 34 F1 CB AE A8 E6  ....E..*SJ4.....
#     0040: CA C9 2B DE 4C 77 76 71   10 13 E6 4E FE A7 D7 8D  ..+.Lwvq...N....
#     0050: 73 73 3E F0 50 30 48 34   93 99 F4 74 3C AF 92 96  ss>.P0H4...t<...
#     0060: EF 99 30 BA 54 4D 1D 3D   6F 55 82 72 E6 A1 13 B2  ..0.TM.=oU.r....
#     0070: 80 0B B0 3F 55 BD A1 E2   EA 8D 20 CA DC 36 5D 8F  ...?U..... ..6].
#     0080: 2A 1E BE 2E 01 7D FE C9   54 22 59 CB 92 16 43 43  *.......T"Y...CC
#     0090: 43 4D 42 51 4E 05 99 DD   9D A9 D4 35 2A F4 25 7E  CMBQN......5*.%.
#     00A0: DF 9D 20 F2 42 CD E4 8D   C5 9B 98 C3 85 EB 29 96  .. .B.........).
#     00B0: B9 94 D8 7C 3F 35 7A FF   C6 6F BB DD 3D 03 4C 5A  ....?5z..o..=.LZ
#     00C0: DE 0C 8D FB C3 82 12 B0   DF 4A 35 0E 53 DC FD 94  .........J5.S...
#     00D0: 17 5C D1 97 77 DB 3F E4   46 7F 63 12 D7 AD B4 5E  .\..w.?.F.c....^
#     00E0: D8 54 DB DF 2D A9 CC E2   EB DA FA 9B 94 13 A6 90  .T..-...........
#     00F0: DE 9D 68 C8 FF D7 68 81   D3 88 57 B3 57 C7 CD 81  ..h...h...W.W...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.959 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 13 11 09 AF CB AA 99 38   F7 B8 15 3D B4 F4 12 96  .......8...=....
#     0010: AA 4E B0 73 3F FB 20 6F   90 B8 20 86 3C 21 FA 43  .N.s?. o.. .<!.C
#     0020: 8C 67 1E 4E A2 60 B0 D1   A9 F9 88 AA A3 21 AD 11  .g.N.`.......!..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:03.959 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:04.016 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "35 0B 03 B7 87 63 4A 36 8F 4F E2 65 AF F7 B6 EA 51 F8 C1 72 F2 32 C2 69 19 9E 5E 43 37 50 F6 78",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-13 04:44:04.320 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 04:44:04.321 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 04:44:04.322 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-13 04:44:05.501; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-13 04:44:05.507; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-13 04:44:05.897; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:44:05.900; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-13 04:44:05.900; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-eGz2KX/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:05.934 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2E 6A B3 28",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:47.000 UTC",
#     "not  after"         : "2024-01-11 04:43:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 0D 1A AA D9 10 F8 27   06 44 BB 09 BB 37 BF 47  .......'.D...7.G
#         0010: F9 2A 7F 14                                        .*..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2C 26 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:40.000 UTC",
#     "not  after"         : "2024-01-11 04:43:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:05.938 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E DB 0C 73",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:38.000 UTC",
#     "not  after"         : "2024-01-11 04:43:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2C 26 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:40.000 UTC",
#     "not  after"         : "2024-01-11 04:43:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:05.950 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:06.135 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:06.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:06.137 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:06.137 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:06.141 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:06.152 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:06.153 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:06.153 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:06.155 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3E 74 AB 51 F6 E5 F1 2B AC E3 78 7D 78 58 01 58 8D 0A B2 5F E4 D6 E6 3F EE 90 D3 0C 02 CA 34 F8",
#   "session id"          : "10 1B 7D 75 1B A1 F5 74 7C 98 AB E9 80 49 E2 07 9F B6 39 DB 99 8D C7 84 10 54 F9 FC 30 6F CC 73",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 04 A1 41 F7 8C E0 8A 01   03 96 7D E3 CF 9D 4E 3F  ..A...........N?
#             0010: F9 21 61 E4 A1 5D 65 4C   AF 94 38 5A 90 05 80 5F  .!a..]eL..8Z..._
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.245 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "87 99 C5 E2 9F 00 E0 89 A8 4C A6 8C 1A E1 C4 F2 3A 31 BB B7 F4 6E E3 60 48 23 1A 4A 53 D1 7B 93",
#   "session id"          : "10 1B 7D 75 1B A1 F5 74 7C 98 AB E9 80 49 E2 07 9F B6 39 DB 99 8D C7 84 10 54 F9 FC 30 6F CC 73",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 13 38 2F F0 71 5A 49 35   85 05 74 D7 FE 22 35 0A  .8/.qZI5..t.."5.
#           0010: 62 E3 68 95 DE 96 3C C3   3A 8D E8 F9 3C 73 0A 1B  b.h...<.:...<s..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.246 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.246 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.246 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.246 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.247 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.247 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.253 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.258 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.261 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.262 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.262 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.262 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.279 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.287 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.288 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.291 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.291 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.292 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.292 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.292 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.292 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.292 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.292 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.292 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.293 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.294 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.294 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.294 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.294 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.295 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.295 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.304 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 51 E1 E2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:43.000 UTC",
#       "not  after"         : "2024-01-11 04:43:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#           0010: 34 78 0F 9D                                        4x..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C DD A5 95 5F 74 F6 5F   6B 12 BB 32 69 EA 50 4B  ...._t._k..2i.PK
#           0010: 45 99 9C 1C                                        E...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.305 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.362 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 2C 26 56",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-13 04:43:40.000 UTC",
#     "not  after"         : "2024-01-11 04:43:40.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#         0010: 2A D3 BC F0                                        *...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#         0010: 34 78 0F 9D                                        4x..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.365 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 E0 E1 FB D4 1B D9 2A   76 9D 4D 02 A2 A2 F9 09  e......*v.M.....
#     0010: 31 94 96 D2 85 1E D9 87   88 9D 09 68 BA E1 30 CC  1..........h..0.
#     0020: D6 7A 6D 0C 60 F0 CF ED   61 A2 67 1A 5C 4D F3 C9  .zm.`...a.g.\M..
#     0030: 79 81 B4 80 7F C1 BA 1A   43 2B D6 5D 78 B7 B0 F3  y.......C+.]x...
#     0040: 39 8A 7D 92 ED 72 A5 D1   54 AF 8D AB D6 B9 46 F5  9....r..T.....F.
#     0050: C7 9B 2B 9E 16 38 36 2A   CD 9C 64 45 86 C0 A4 7C  ..+..86*..dE....
#     0060: 0D 86 6A 9E 2F 30 CC 01   90 5A 46 F4 B7 AE 13 87  ..j./0...ZF.....
#     0070: 65 90 D0 88 50 51 5E 25   94 40 C2 DE 9B 8F 0E A7  e...PQ^%.@......
#     0080: 71 C0 6A 53 DB C3 C1 F4   AD 87 17 B6 08 E7 02 D8  q.jS............
#     0090: BA 84 7F 87 BA 6F A1 FC   94 69 8D 96 2B 62 FD 1E  .....o...i..+b..
#     00A0: 89 0E 74 14 1B 12 B6 35   FC 24 77 B9 10 21 51 6F  ..t....5.$w..!Qo
#     00B0: CF C0 37 4E 6A D8 63 CD   36 42 64 B0 8E 4E 14 F0  ..7Nj.c.6Bd..N..
#     00C0: BA 61 C5 43 BC 58 D5 56   FB 58 15 55 EB 62 F2 41  .a.C.X.V.X.U.b.A
#     00D0: 3E 9B 0E B8 CF 84 77 2A   61 06 EF 4E 77 E8 E7 55  >.....w*a..Nw..U
#     00E0: 20 FC E9 AA AA 6F 69 F7   C5 56 0D C2 20 22 03 61   ....oi..V.. ".a
#     00F0: B4 67 D5 01 E0 37 FF 13   EC 6E FB 2D 76 41 B8 54  .g...7...n.-vA.T
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.367 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BF 17 1E 69 32 58 E8 30   3D 09 A4 66 53 A8 B5 4B  ...i2X.0=..fS..K
#     0010: 64 40 F5 4B B0 87 36 22   26 19 E9 2E 35 5A AF D2  d@.K..6"&...5Z..
#     0020: DE 83 2F 45 B6 CE 4C 60   3B EF 72 B8 8B 3F D6 10  ../E..L`;.r..?..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.369 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 04:44:06.369 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.370 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 04:44:06.370 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.370 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-13 04:44:06.370 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-13 04:44:06.370 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.371 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.373 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 6A B3 28",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:47.000 UTC",
#       "not  after"         : "2024-01-11 04:43:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#           0010: 34 78 0F 9D                                        4x..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 0D 1A AA D9 10 F8 27   06 44 BB 09 BB 37 BF 47  .......'.D...7.G
#           0010: F9 2A 7F 14                                        .*..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 2C 26 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:40.000 UTC",
#       "not  after"         : "2024-01-11 04:43:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#           0010: 2A D3 BC F0                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#           0010: 34 78 0F 9D                                        4x..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.396 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 27 C4 7A 6C FA 2A 3E 1B   B1 C4 4E B5 CD 92 07 C6  '.zl.*>...N.....
#     0010: 19 BE 72 87 56 30 8B E8   0C 62 BC D3 6A 88 D0 B8  ..r.V0...b..j...
#     0020: BE 20 E3 5C 10 1D 3A BE   0F 32 85 A4 52 17 9B BA  . .\..:..2..R...
#     0030: 0E 33 13 F9 15 93 A4 D0   44 41 58 3B 0D C8 0C E3  .3......DAX;....
#     0040: 74 88 4B 31 75 2F 0B 5C   D2 8B B2 F5 46 6A C0 53  t.K1u/.\....Fj.S
#     0050: 52 CA D6 FC F4 8F DA 12   D9 F9 C4 91 1A 9B 9B 67  R..............g
#     0060: 2E 80 FE C0 CD C2 70 04   76 3B 6C 85 29 24 EB 5E  ......p.v;l.)$.^
#     0070: C7 7D 1B 41 E7 68 44 ED   E0 ED D0 F2 88 4C 71 63  ...A.hD......Lqc
#     0080: DB A7 3C 23 D9 0F B7 CB   00 03 64 20 15 27 EE A8  ..<#......d .'..
#     0090: DF 6F DC 68 85 B0 AD 34   90 B3 B2 50 95 99 49 7C  .o.h...4...P..I.
#     00A0: 24 08 10 8A 12 F1 95 6D   47 3C 36 48 89 CD 1F DA  $......mG<6H....
#     00B0: 3B 33 B6 07 09 78 BD C1   E4 E8 E4 01 22 8E EF 73  ;3...x......"..s
#     00C0: DD 23 C9 AE D7 87 92 47   8D 93 FA B9 62 79 33 B8  .#.....G....by3.
#     00D0: 80 54 2B 32 75 48 81 C4   95 E1 79 EC 5E D0 12 62  .T+2uH....y.^..b
#     00E0: 16 87 9D 42 C4 5E D8 C5   7A B0 46 7A DE 86 22 A7  ...B.^..z.Fz..".
#     00F0: 75 8F C3 ED 19 8E 69 6C   1A 3A E0 99 2A 0B E8 14  u.....il.:..*...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.397 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 43 24 82 68 03 32 62 F2   0D 80 57 36 C2 E9 1A 6D  C$.h.2b...W6...m
#     0010: FE 31 CE F8 33 6F 2E F4   D4 37 60 E6 E4 75 34 F6  .1..3o...7`..u4.
#     0020: 07 12 38 51 B3 44 DA 45   D1 82 0B 6F BB DA 5D F5  ..8Q.D.E...o..].
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.398 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:06.442 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:06.442 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:06.442 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-13 04:44:06.442 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:06.477 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "44 94 30 C1 7F C2 DC D2 75 85 F6 3F 0E CD EF 00 88 EA 32 9B BC 86 E1 FC EA 9E BE CA 52 94 75 B6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-13 04:44:06.915 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-13 04:44:06.916 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-13 04:44:20.761; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:21.103 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E DB 0C 73",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:38.000 UTC",
#       "not  after"         : "2024-01-11 04:43:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#           0010: 2A D3 BC F0                                        *...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 2C 26 56",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-13 04:43:40.000 UTC",
#       "not  after"         : "2024-01-11 04:43:40.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 5D 2E C7 68 63 DB 94   6C 93 9F 70 EE F5 D1 2A  .]..hc..l..p...*
#           0010: 2A D3 BC F0                                        *...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 72 3F 0A 3A BF 2C 78 DC   10 1C B1 D8 3F 47 6F 08  r?.:.,x.....?Go.
#           0010: 34 78 0F 9D                                        4x..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-13 04:44:21.115 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:21.291 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:21.291 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:21.293 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-13 04:44:21.293 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:21.297 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:21.308 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:21.309 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:21.309 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-13 04:44:21.311 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B6 87 0B C5 27 60 50 31 9A EA 47 B1 13 AD 7F 1F A1 FF F0 47 13 0B 5B 58 D7 9B 4D 7C C7 8B 28 F6",
#     "session id"          : "9A 01 B8 67 4B 82 F1 A4 DD 58 92 58 CE 9E 06 8D EB 4B 57 5B D7 EA 77 37 51 A8 FA E6 40 D3 86 62",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7E 92 12 DB 8F 99 5E 04   65 0B A2 0E 69 9A DD 9C  ......^.e...i...
#               0010: 36 BF 89 59 56 78 E4 8D   17 19 A2 2F 9F E6 35 4D  6..YVx...../..5M
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.332 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "60 5E 16 79 A8 8F DE 7B 6D A1 16 98 56 E0 4A 8D FD 4C 99 FA 26 94 08 D7 85 C3 04 04 8A 0D 6A 58",
#     "session id"          : "9A 01 B8 67 4B 82 F1 A4 DD 58 92 58 CE 9E 06 8D EB 4B 57 5B D7 EA 77 37 51 A8 FA E6 40 D3 86 62",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6A DA 33 79 49 B9 85 CF   2E DE 80 92 0A 89 2A DE  j.3yI.........*.
#             0010: C6 B8 9D 29 4B 50 C1 88   4F 47 2F 8D 37 48 BC 08  ...)KP..OG/.7H..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.333 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.333 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.333 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.333 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.334 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.334 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.336 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.336 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.336 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.336 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-13 04:44:21.336 UTC|SSLExtensions.java:207|Ignore unavailable

[...truncated too long message...]

C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 14648ms
ok 75 stop command for single port in 17473ms
not ok 76 status detects locally running solr in 2694ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7639ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 2719ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3168ms
ok 80 copying files around in 6648ms
ok 81 upconfig in 2629ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1251ms
not ok 84 Cleanup in 3655ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/mnk37kiyvkuqw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8169 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8169/

All tests passed

Build Log:
[...truncated 1390 lines...]
BUILD FAILED in 1h 3m 48s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5puxro3ax2rj6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8168 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8168/

All tests passed

Build Log:
[...truncated 1285 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40341/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-12 22:47:19.415; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:47:19.419; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 11326ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 40341 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40341 (pid=3468226). Happy searching!
#
#     INFO  - 2023-10-12 22:47:27.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:47:27.530; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-12 22:47:30.613; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:47:30.619; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 19918ms
not ok 72 start solr with mTLS needed in 53643ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Bs3CNh/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40341 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40341 (pid=3470005). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40342 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40342 (pid=3470114). Happy searching!
#
#     INFO  - 2023-10-12 22:48:16.138; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:48:16.147; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 22:48:17.058; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@44c79f32(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:48:17.061; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:48:17.061; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(ca,h=[localhost],a=[],w=[]) for Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:17.116 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 AC 2E D3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:48:03.000 UTC",
#     "not  after"         : "2024-01-10 22:48:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C F8 57 FA 80 E1 2C 75   68 33 E5 24 C2 D5 51 CC  L.W...,uh3.$..Q.
#         0010: 15 C8 85 0F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8B 5B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:56.000 UTC",
#     "not  after"         : "2024-01-10 22:47:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:17.122 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 C6 BD 0B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:54.000 UTC",
#     "not  after"         : "2024-01-10 22:47:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8B 5B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:56.000 UTC",
#     "not  after"         : "2024-01-10 22:47:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:17.160 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:17.669 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:17.669 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:17.673 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:17.674 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:17.682 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:17.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:17.700 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:17.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:17.702 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C3 0D AA 95 A3 53 75 C2 1E 65 31 85 4B 02 3B 03 39 FA 6A BA 6B D2 6E 68 A1 27 FD A4 04 5E 63 44",
#   "session id"          : "BE A1 A6 B1 F4 F5 16 CC C4 EF FF 9F 89 F3 3F 74 D7 02 3B 6F E0 CC FF 4E A0 1E B5 98 2E DA 99 76",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 95 3B ED 4D 12 04 A6 71   FC 3A 57 22 28 76 CA DF  .;.M...q.:W"(v..
#             0010: 1A B9 79 29 78 7F DE 38   84 B6 4D 8A C7 96 97 4B  ..y)x..8..M....K
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.917 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "89 40 36 0F 9B A2 A7 30 4A 6B 8D 6F C3 29 29 2B 5B C3 FF B4 7B 01 58 F6 BC EE 61 A1 9C F9 55 E5",
#   "session id"          : "BE A1 A6 B1 F4 F5 16 CC C4 EF FF 9F 89 F3 3F 74 D7 02 3B 6F E0 CC FF 4E A0 1E B5 98 2E DA 99 76",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 44 43 69 82 B2 5D 23 0A   2F 27 65 0F 7B BF 07 EF  DCi..]#./'e.....
#           0010: CE 39 70 61 56 BC A2 44   2A CF 03 5D 00 3B 7E 48  .9paV..D*..].;.H
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.918 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.919 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.922 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.925 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.925 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.926 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.927 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.928 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.954 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.956 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.963 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.967 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.967 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.967 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.967 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.968 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.968 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.969 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:17.969 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:17.973 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.975 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.975 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.975 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:17.975 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.178 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.179 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:18.179 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.189 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 0D 2A C2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:47:58.000 UTC",
#       "not  after"         : "2024-01-10 22:47:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#           0010: 1A 69 0A 52                                        .i.R
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D 4E 9F 54 A7 1D 82 AE   C3 62 30 07 16 23 9F 6B  .N.T.....b0..#.k
#           0010: 3C A9 AE D0                                        <...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.190 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:18.259 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:18.259 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:18.259 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:18.259 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.326 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8B 5B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:56.000 UTC",
#     "not  after"         : "2024-01-10 22:47:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.333 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7A 69 CD 4B BC AF AC 77   4A A6 28 09 95 7D 6D 6A  zi.K...wJ.(...mj
#     0010: 5A B2 77 61 7C 02 91 92   FF D6 C6 8E 1E A6 D3 79  Z.wa...........y
#     0020: 48 07 27 11 16 73 40 57   BB 04 2D D1 DB 98 B1 54  H.'..s@W..-....T
#     0030: 15 A0 3B 2D EA 29 B7 B9   33 B3 F7 49 69 2B 6A AA  ..;-.)..3..Ii+j.
#     0040: A6 4F 81 5B AB 9F EA 20   27 A5 C7 0A 63 E7 93 47  .O.[... '...c..G
#     0050: AB A9 DE 91 35 73 E0 7C   45 81 F2 EE FC 67 E4 28  ....5s..E....g.(
#     0060: 55 8B C2 FF 4D 20 E4 18   05 01 0E A7 D5 71 3E 48  U...M .......q>H
#     0070: 7E 82 AC 84 8B 3F B8 F4   81 32 66 29 71 2D 5A BA  .....?...2f)q-Z.
#     0080: 6F D9 00 4A DE AF FA 6D   2A 94 3C 0D 6C 28 0A 85  o..J...m*.<.l(..
#     0090: DB A5 27 4A 43 57 FC 3D   0E 36 A4 D7 9C 1E 44 EC  ..'JCW.=.6....D.
#     00A0: AF 4B 84 12 07 2B 50 E2   C7 D0 B7 A0 BB 7F A4 80  .K...+P.........
#     00B0: 3B D1 31 27 72 8A BC F1   0B 7E A7 E2 92 4B 3B 2D  ;.1'r........K;-
#     00C0: 87 AD 9A 48 5E 85 37 60   2C C9 9D 22 50 48 2F B1  ...H^.7`,.."PH/.
#     00D0: C0 66 C6 88 38 F4 E0 B6   5F FC 90 A0 89 84 09 0D  .f..8..._.......
#     00E0: 09 E1 22 CB A7 21 D5 76   43 77 86 3B 46 87 4A 9F  .."..!.vCw.;F.J.
#     00F0: 03 C8 12 0C 0B 51 A7 0A   6F 3A 12 5D A0 3E 37 51  .....Q..o:.].>7Q
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.342 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 05 65 67 5F 19 79 B0   AE 18 85 73 2B 54 55 6F  ..eg_.y....s+TUo
#     0010: 8C 3D B9 13 72 31 52 3F   75 6A 2C EB E5 E7 E4 34  .=..r1R?uj,....4
#     0020: 13 1A AF 8B 12 0D 8D CF   D4 EB 59 4E 42 98 FD 29  ..........YNB..)
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.347 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 22:48:18.348 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:18.349 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 22:48:18.349 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:18.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 22:48:18.352 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:18.352 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.352 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.364 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 AC 2E D3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:48:03.000 UTC",
#       "not  after"         : "2024-01-10 22:48:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#           0010: 1A 69 0A 52                                        .i.R
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C F8 57 FA 80 E1 2C 75   68 33 E5 24 C2 D5 51 CC  L.W...,uh3.$..Q.
#           0010: 15 C8 85 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 8B 5B 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:47:56.000 UTC",
#       "not  after"         : "2024-01-10 22:47:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#           0010: E9 CE 4E FC                                        ..N.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#           0010: 1A 69 0A 52                                        .i.R
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.436 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BA 1F 6F 74 66 E0 19 33   BC F9 D3 91 01 6D D5 13  ..otf..3.....m..
#     0010: 07 5C B5 FA 52 06 9D B3   B7 B9 20 C8 39 A1 3A 25  .\..R..... .9.:%
#     0020: DB 20 57 27 9D 7F FC 62   9F F6 CD 39 74 66 F4 3B  . W'...b...9tf.;
#     0030: 53 E0 93 E6 95 0C D9 74   5A 7E 33 5F 0D 57 A4 D6  S......tZ.3_.W..
#     0040: 5F 9D 9F A2 E8 41 BE 40   4C E3 0B F8 B3 95 0C 92  _....A.@L.......
#     0050: 05 D2 7C 5D 23 D4 60 4E   CE 86 A0 9E C1 CF 29 A2  ...]#.`N......).
#     0060: 5D C5 C3 88 C9 25 5B 95   89 E1 C1 FA 50 6F 29 F0  ]....%[.....Po).
#     0070: BD BA 48 B2 CF 24 25 53   0C 33 D0 38 25 F8 59 19  ..H..$%S.3.8%.Y.
#     0080: 7F B2 3D 18 2B 2E 33 7F   AA B1 AB 18 08 12 14 07  ..=.+.3.........
#     0090: 28 8E 19 70 B4 DE 9A EB   D2 71 EB 31 BB C8 97 05  (..p.....q.1....
#     00A0: E0 AB 19 BE 34 52 24 91   D4 E9 0F 40 50 FD D2 C3  ....4R$....@P...
#     00B0: 80 B1 59 02 91 FA FB 89   4B F8 CE B1 24 15 EB 76  ..Y.....K...$..v
#     00C0: BF F7 48 6D C9 50 39 2D   D4 5F A7 14 61 F6 2B FB  ..Hm.P9-._..a.+.
#     00D0: 07 97 29 95 0F 8D 15 F7   D8 1B 2B E0 A1 59 0C D0  ..).......+..Y..
#     00E0: B2 13 6B 77 36 74 2C A8   6C D2 29 73 FC 8C C8 11  ..kw6t,.l.)s....
#     00F0: E1 5D BD D7 7C 08 18 45   8D 0C 14 B0 6D EE B4 74  .].....E....m..t
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.438 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 98 24 B4 8F 20 4B 89 BB   9C C4 C2 14 5B CF 75 BE  .$.. K......[.u.
#     0010: 08 5D 96 5A 03 01 C2 5F   C9 7B F2 2B 97 00 9B E8  .].Z..._...+....
#     0020: 4D F2 C2 FE 42 F2 B7 BB   2E F9 26 67 95 47 3B 8E  M...B.....&g.G;.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.438 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:18.574 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FA 0C 55 EB 9B C4 73 A8 96 40 36 4F 73 D5 DF D7 81 4A F0 93 CE C5 E9 E4 BB 66 9C 63 19 F3 19 B1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 22:48:19.444 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 22:48:19.444 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 22:48:21.283; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 22:48:21.288; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 22:48:21.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:48:21.763; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 22:48:21.764; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Bs3CNh/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:21.815 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "44 AC 2E D3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:48:03.000 UTC",
#     "not  after"         : "2024-01-10 22:48:03.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4C F8 57 FA 80 E1 2C 75   68 33 E5 24 C2 D5 51 CC  L.W...,uh3.$..Q.
#         0010: 15 C8 85 0F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8B 5B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:56.000 UTC",
#     "not  after"         : "2024-01-10 22:47:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:21.818 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "60 C6 BD 0B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:54.000 UTC",
#     "not  after"         : "2024-01-10 22:47:54.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8B 5B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:56.000 UTC",
#     "not  after"         : "2024-01-10 22:47:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:21.830 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:22.076 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:22.077 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:22.078 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:22.078 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:22.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:22.093 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:22.094 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:22.094 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:22.096 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E1 EF 70 74 DA A3 76 38 96 87 43 2B 1F 09 4F C1 60 E4 EB 4E 86 10 4F 53 19 68 95 22 24 38 59 E5",
#   "session id"          : "90 EA FB BB D6 D9 84 0B 75 84 75 A5 8C 97 BA C5 02 CA A1 A3 5E 23 A0 9F D2 EC 0F AE F9 D7 8D FC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 69 B9 97 6D 71 09 A3 2F   FF 28 11 DA 5E B7 8A 6B  i..mq../.(..^..k
#             0010: AE 97 06 76 C0 FD D7 39   0E E8 07 1C 26 37 2A 26  ...v...9....&7*&
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.177 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 2B 55 5C 89 41 FA C4 80 D2 C3 C6 4C 9C 40 26 44 36 7C 9A AB 59 1D E0 BC 85 8B BA F1 E3 8E A2",
#   "session id"          : "90 EA FB BB D6 D9 84 0B 75 84 75 A5 8C 97 BA C5 02 CA A1 A3 5E 23 A0 9F D2 EC 0F AE F9 D7 8D FC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5F EB 36 6C 13 E5 84 B7   7A A1 DD 3E 69 B9 F4 DB  _.6l....z..>i...
#           0010: 3E 6A B6 44 0A 9C C1 D5   35 CD 21 70 25 7D F2 7B  >j.D....5.!p%...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.177 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.177 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.178 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.180 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.180 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.180 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.181 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.205 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.206 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.208 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.217 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.218 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.225 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.226 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.226 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.226 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.227 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.227 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.227 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.231 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 0D 2A C2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:47:58.000 UTC",
#       "not  after"         : "2024-01-10 22:47:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#           0010: 1A 69 0A 52                                        .i.R
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D 4E 9F 54 A7 1D 82 AE   C3 62 30 07 16 23 9F 6B  .N.T.....b0..#.k
#           0010: 3C A9 AE D0                                        <...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.231 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.290 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 8B 5B 50",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 22:47:56.000 UTC",
#     "not  after"         : "2024-01-10 22:47:56.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#         0010: E9 CE 4E FC                                        ..N.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#         0010: 1A 69 0A 52                                        .i.R
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.293 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6A FD D9 26 5C 6E 60 90   9C EB 22 26 5B 41 B9 48  j..&\n`..."&[A.H
#     0010: DC A6 1E F2 1D 2D 42 F6   96 2F 74 15 F7 B4 BE 64  .....-B../t....d
#     0020: DE 86 E1 D9 91 FA 56 06   53 55 C3 BE 26 E9 E5 AF  ......V.SU..&...
#     0030: 41 DF 4F 20 0C 7B 10 A3   E4 DE E5 CC 6B 5E 30 CC  A.O ........k^0.
#     0040: C2 53 B6 2D 46 3D 3C 1A   72 E6 0D 27 26 5A C1 D4  .S.-F=<.r..'&Z..
#     0050: BF D1 65 6B 91 85 38 6B   CB A5 34 82 4B CC BF EB  ..ek..8k..4.K...
#     0060: A0 31 27 D6 17 4B 98 DD   78 0C EB FF 32 BB 64 99  .1'..K..x...2.d.
#     0070: 31 77 FA 6E 7C F4 97 63   4A 1B F6 03 42 BF B7 19  1w.n...cJ...B...
#     0080: 4A D3 D8 79 9A 9F 23 53   93 B1 AB 81 04 85 A5 52  J..y..#S.......R
#     0090: A3 35 11 97 DF F3 FF 27   DA 1E 9D 54 16 7E 10 62  .5.....'...T...b
#     00A0: BA 2D 2F 39 95 AF CB 06   01 42 A7 70 C7 7B 05 E4  .-/9.....B.p....
#     00B0: 44 83 EA 7C BC 6E 5A 24   EC DA 0B 43 17 2E DE 11  D....nZ$...C....
#     00C0: 7B 66 50 DC DB 59 02 15   81 C3 72 38 67 A2 5E 4C  .fP..Y....r8g.^L
#     00D0: 21 92 52 D3 0F 35 08 1C   22 01 C7 11 D5 AD 60 7A  !.R..5..".....`z
#     00E0: C1 38 B6 DA 45 EF 56 40   96 6E 18 36 93 F2 79 3B  .8..E.V@.n.6..y;
#     00F0: BC 76 23 FD 75 D8 79 9F   4E E9 08 BB 11 81 F8 59  .v#.u.y.N......Y
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.295 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 66 36 6C FA AB 58 6D 79   7A 3B 27 F5 30 A4 4E 1E  f6l..Xmyz;'.0.N.
#     0010: 05 22 02 42 BF 07 C5 8E   EF 8C 17 13 BD EB A3 27  .".B...........'
#     0020: 0E AC 15 5E AF 95 81 43   06 AF 44 32 9B E7 8B 8A  ...^...C..D2....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.296 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 22:48:22.297 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.297 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 22:48:22.297 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.297 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 22:48:22.298 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 22:48:22.298 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.298 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.300 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "44 AC 2E D3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:48:03.000 UTC",
#       "not  after"         : "2024-01-10 22:48:03.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#           0010: 1A 69 0A 52                                        .i.R
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4C F8 57 FA 80 E1 2C 75   68 33 E5 24 C2 D5 51 CC  L.W...,uh3.$..Q.
#           0010: 15 C8 85 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 8B 5B 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:47:56.000 UTC",
#       "not  after"         : "2024-01-10 22:47:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#           0010: E9 CE 4E FC                                        ..N.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#           0010: 1A 69 0A 52                                        .i.R
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.323 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B 57 D7 97 9E CE 0C B0   5F 6A 6C BA C5 7D 35 4A  ;W......_jl...5J
#     0010: 2F 58 03 C9 CA E1 15 18   2E 37 83 27 10 13 39 F1  /X.......7.'..9.
#     0020: FA 06 13 FD 89 10 5B 99   C2 44 34 51 3F 3B 09 A2  ......[..D4Q?;..
#     0030: F6 1A 4E A9 DD C9 3B A0   CD BF 53 6E 09 7D 7E ED  ..N...;...Sn....
#     0040: 09 A8 DA 8D FD 6A DF B3   8C C0 B7 96 B2 D9 6F 14  .....j........o.
#     0050: 3C E8 A7 0D D5 CB 1E 51   83 B7 9A D2 F9 EF 67 94  <......Q......g.
#     0060: 2B 21 1F C4 7F 35 2A 16   83 8D D3 A4 7A D1 CB 62  +!...5*.....z..b
#     0070: C0 9D 32 CE 88 9A 87 44   F1 51 E4 25 71 B2 80 5F  ..2....D.Q.%q.._
#     0080: 68 BA 1E 81 4C FE E7 33   62 17 C1 A0 CD 12 6B AF  h...L..3b.....k.
#     0090: 5C 1F E0 1E 7D 63 91 1A   51 A7 0A F1 C7 2D 70 01  \....c..Q....-p.
#     00A0: 45 6E 16 4D DD B6 2E CA   BE 62 D5 6E 68 B4 CE 14  En.M.....b.nh...
#     00B0: BE B7 8D 6D 4C D7 B3 AF   B2 F4 B8 D2 CD ED 1E DE  ...mL...........
#     00C0: E5 49 AF C6 E0 85 2D A7   D0 DA B3 58 FB C0 65 24  .I....-....X..e$
#     00D0: 45 62 06 3C 3B 16 5E 4D   8E FA 3C F2 12 A6 96 C3  Eb.<;.^M..<.....
#     00E0: AF D9 95 53 73 9E 05 50   AF 89 2E 45 B3 5F 4E CB  ...Ss..P...E._N.
#     00F0: 0F 83 C0 CB B7 A1 50 4E   AB 27 8F 90 06 02 5D AC  ......PN.'....].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.325 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FE B7 BE C2 66 5E 8C 95   80 C4 6D 37 A0 82 6E F5  ....f^....m7..n.
#     0010: 84 F2 83 53 3E 74 77 64   C9 AD 59 21 89 FB 74 CF  ...S>twd..Y!..t.
#     0020: F7 47 ED F6 9C 69 AA 67   DB 88 B5 A7 94 39 41 54  .G...i.g.....9AT
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.325 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:22.468 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:22.468 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:22.468 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 22:48:22.468 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:22.497 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A0 79 9D E6 51 FC 56 06 19 70 65 85 D8 89 59 67 77 4D B9 1D FD 0D 14 5C 34 FC 3B 2A 3A 5C 08 90",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 22:48:22.779 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 22:48:22.780 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-12 22:48:36.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:36.560 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "60 C6 BD 0B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:47:54.000 UTC",
#       "not  after"         : "2024-01-10 22:47:54.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#           0010: E9 CE 4E FC                                        ..N.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 8B 5B 50",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 22:47:56.000 UTC",
#       "not  after"         : "2024-01-10 22:47:56.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7D 20 ED 21 52 6A C2 FF   C8 D9 10 71 C2 74 5F BE  . .!Rj.....q.t_.
#           0010: E9 CE 4E FC                                        ..N.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B3 20 76 EB F2 CD 4E 06   EA DB E8 09 7C E7 A4 CC  . v...N.........
#           0010: 1A 69 0A 52                                        .i.R
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 22:48:36.573 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:36.795 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:36.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:36.797 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 22:48:36.797 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:36.802 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:36.813 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:36.813 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:36.813 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 22:48:36.815 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5F 95 92 53 D8 43 A4 88 60 DB 2E CB 85 C0 F2 C8 80 97 99 F2 FE A4 36 34 D2 02 6F 38 51 06 4D 45",
#     "session id"          : "0C 12 12 42 20 D3 CC F1 C6 55 98 38 7A D0 C6 D6 30 75 A5 99 77 AF 48 68 37 CA CA 6A 52 45 21 9E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4E 12 A7 E8 99 E4 61 72   52 DF 1B 0E 01 98 19 0C  N.....arR.......
#               0010: F3 A9 FD D4 1B 5D A3 A3   E0 0B FD 7F 2D 7E E7 79  .....]......-..y
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.833 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "7A 25 C8 19 11 01 23 AC F5 7B 06 35 63 67 D5 5F 72 09 56 F2 1A 3A 95 50 95 25 BC 85 2D FA 1C 9D",
#     "session id"          : "0C 12 12 42 20 D3 CC F1 C6 55 98 38 7A D0 C6 D6 30 75 A5 99 77 AF 48 68 37 CA CA 6A 52 45 21 9E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: DB 20 A1 28 9D 70 04 A7   A5 3D BF A7 13 2C E3 7A  . .(.p...=...,.z
#             0010: 6F 31 BE 8A 66 64 41 BE   D7 F4 62 2C C9 03 91 4B  o1..fdA...b,...K
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.833 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.833 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.833 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.834 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.836 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.836 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.836 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.836 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 22:48:36.837 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2s

[...truncated too long message...]

C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 15132ms
ok 75 stop command for single port in 17898ms
not ok 76 status detects locally running solr in 2730ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7593ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 2790ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3174ms
ok 80 copying files around in 6822ms
ok 81 upconfig in 2755ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1253ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1252ms
not ok 84 Cleanup in 3799ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 51s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nreomqmwuwngw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8167 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8167/

All tests passed

Build Log:
[...truncated 1404 lines...]
BUILD FAILED in 1h 2m 42s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/eymfbkh3vzxhc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8166 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8166/

All tests passed

Build Log:
[...truncated 1405 lines...]
BUILD FAILED in 1h 4m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7lwwqzrhyewt2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8165 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8165/

All tests passed

Build Log:
[...truncated 1286 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44553/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-12 11:37:06.239; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 11:37:06.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10863ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 44553 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44553 (pid=2339752). Happy searching!
#
#     INFO  - 2023-10-12 11:37:13.937; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 11:37:13.943; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-12 11:37:17.167; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 11:37:17.172; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 18454ms
not ok 72 start solr with mTLS needed in 52223ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-s2sjO5/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 44553 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44553 (pid=2341504). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 44554 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44554 (pid=2341614). Happy searching!
#
#     INFO  - 2023-10-12 11:38:01.516; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 11:38:01.535; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 11:38:02.062; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 11:38:02.064; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 11:38:02.065; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:02.129 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 93 6E 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:47.000 UTC",
#     "not  after"         : "2024-01-10 11:37:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C F3 5B 76 2D FB CC 0F   28 0F DD 75 50 9B 91 25  ..[v-...(..uP..%
#         0010: F7 EA 8D 0B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 7C 1E AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:41.000 UTC",
#     "not  after"         : "2024-01-10 11:37:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:02.136 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 7C 1E AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:41.000 UTC",
#     "not  after"         : "2024-01-10 11:37:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 CE D1 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:39.000 UTC",
#     "not  after"         : "2024-01-10 11:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:02.153 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:02.848 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:02.848 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:02.864 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:02.864 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 11:38:02.866 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 11:38:02.866 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 11:38:02.866 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 11:38:02.866 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:02.875 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:02.913 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:02.913 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:02.914 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:02.915 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "B8 E4 10 59 56 4C 62 6B 0A 26 4D 7F A4 9F E2 E3 09 8A 6C C2 1E BF 41 92 42 89 56 BC F0 92 C1 4A",
#   "session id"          : "89 61 C5 E6 EB 44 6A C6 EA F7 DD 6B D5 12 E7 E7 1D 09 15 D0 E5 78 93 E7 CF 11 54 51 FE 7E 53 CB",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 32 EE FE 67 AE C4 89 49   E5 A8 D9 F3 ED 2F B8 7F  2..g...I...../..
#             0010: 52 82 41 A8 67 44 D2 19   26 C3 98 F6 24 53 2A 34  R.A.gD..&...$S*4
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.130 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "9F 14 B9 35 6F CE 64 A0 2C 2C 39 11 36 99 7B 06 7C 29 D5 51 B4 6C E5 71 56 8B F3 00 90 2F 87 A9",
#   "session id"          : "89 61 C5 E6 EB 44 6A C6 EA F7 DD 6B D5 12 E7 E7 1D 09 15 D0 E5 78 93 E7 CF 11 54 51 FE 7E 53 CB",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 2E 32 A6 1B 39 0D 6D BF   03 31 2C D0 10 C8 5B 27  .2..9.m..1,...['
#           0010: E3 1C 41 F8 51 86 12 72   65 A8 32 23 14 35 F9 2D  ..A.Q..re.2#.5.-
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.130 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.130 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.136 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.137 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.142 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.143 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.143 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.148 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.148 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.148 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.149 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.182 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.184 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.188 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.201 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.201 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.201 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.201 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.203 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.203 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.203 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.203 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.203 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.209 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.210 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.210 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.212 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.214 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.214 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.214 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.224 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 22 A1 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:43.000 UTC",
#       "not  after"         : "2024-01-10 11:37:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#           0010: 6A B1 B2 A8                                        j...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F 86 0D A6 00 7F 00 58   6F B5 D6 99 14 79 36 CD  .......Xo....y6.
#           0010: 06 DE 05 E0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.224 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.343 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 7C 1E AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:41.000 UTC",
#     "not  after"         : "2024-01-10 11:37:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.345 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 00 3A 3A 8F 8D 0F 75 C1   0B AA 22 69 A2 22 56 C1  .::...u..."i."V.
#     0010: 3E 11 98 FC A0 7F 43 98   C3 2B B3 BB FD 22 5B 53  >.....C..+..."[S
#     0020: 60 82 D7 70 29 31 03 F0   5E B1 62 77 D0 B1 10 73  `..p)1..^.bw...s
#     0030: 94 50 69 76 E7 DF BA C0   85 69 4C 01 14 07 F3 B7  .Piv.....iL.....
#     0040: 8C 7A 74 33 33 CC 3D B6   C4 B3 97 9B 05 FA 4E B2  .zt33.=.......N.
#     0050: EC 28 18 08 54 3A 06 DE   74 E9 E9 92 45 F3 ED C4  .(..T:..t...E...
#     0060: 1F 0C 09 8B 33 50 EF 84   B2 8C 33 3A 3C 42 6C C1  ....3P....3:<Bl.
#     0070: EB 21 50 C2 F9 3F DC 60   B8 BD 25 D2 49 97 E9 37  .!P..?.`..%.I..7
#     0080: 36 FC 16 98 E7 6C A3 47   7A A4 7C BF 75 1A 00 C5  6....l.Gz...u...
#     0090: 06 21 53 4A 15 B7 03 20   8D 3F AC D4 CC F7 F0 B4  .!SJ... .?......
#     00A0: 4E F0 89 84 7F 56 64 A8   09 73 BD 9D 23 68 84 03  N....Vd..s..#h..
#     00B0: 67 A6 C0 BD E4 FA 78 E9   A1 C8 68 FD E5 05 3C 30  g.....x...h...<0
#     00C0: 2F D4 0D 4C 56 8C 95 08   0E 27 97 3D C5 D8 F5 AA  /..LV....'.=....
#     00D0: 8B DF 67 89 D7 05 D1 AA   3D 91 78 8E 7C 8B DD 37  ..g.....=.x....7
#     00E0: F3 F4 D2 D6 42 AA 56 DA   25 A5 D5 1F 61 F6 F5 89  ....B.V.%...a...
#     00F0: D7 7B B2 B3 03 E4 E1 E6   EE A4 EF 7B 47 8B 82 B5  ............G...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.347 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 22 2C CC 12 24 5A 54 8B   0B B2 F7 34 6B 43 AB F3  ",..$ZT....4kC..
#     0010: FE 6E 00 6A 4A F8 CD E1   86 63 91 4D BF EF 9E 6C  .n.jJ....c.M...l
#     0020: 72 AD 69 88 C8 15 2F 7A   2D 07 50 10 E1 71 23 FE  r.i.../z-.P..q#.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.349 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 11:38:03.349 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.349 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 11:38:03.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 11:38:03.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:03.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.350 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.352 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 93 6E 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:47.000 UTC",
#       "not  after"         : "2024-01-10 11:37:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#           0010: 6A B1 B2 A8                                        j...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C F3 5B 76 2D FB CC 0F   28 0F DD 75 50 9B 91 25  ..[v-...(..uP..%
#           0010: F7 EA 8D 0B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 7C 1E AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:41.000 UTC",
#       "not  after"         : "2024-01-10 11:37:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#           0010: 34 D8 22 B9                                        4.".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#           0010: 6A B1 B2 A8                                        j...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.375 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 86 57 8D B0 BB 57 FF 41   D9 46 86 03 D2 6E BC D9  .W...W.A.F...n..
#     0010: 02 E7 1E 10 20 85 5F 14   57 71 F6 1A 21 25 93 F0  .... ._.Wq..!%..
#     0020: 48 61 37 10 91 E7 BC 7C   EF C7 72 54 6F 24 4C E4  Ha7.......rTo$L.
#     0030: 02 39 43 9F CB 1E 04 C0   2A CD 89 E9 67 BA DC 3E  .9C.....*...g..>
#     0040: E4 1D 6D BE 8B 2E C7 B1   68 2D 98 DF C7 37 54 87  ..m.....h-...7T.
#     0050: 6C 31 60 3F 62 92 0F 00   56 82 06 5C A0 B8 A0 3A  l1`?b...V..\...:
#     0060: 3C 68 1A 33 D3 E4 CA A4   9C 4D C8 D5 8B A4 8A 0A  <h.3.....M......
#     0070: D7 66 A5 B5 16 87 2F C2   2D AF 8E 20 90 0C 4E E6  .f..../.-.. ..N.
#     0080: 01 65 34 F9 46 D8 B6 5A   16 C8 1F CC FA EA F8 E3  .e4.F..Z........
#     0090: 13 30 B7 A2 22 E4 BE ED   CE F2 3B AC 82 AD 57 AE  .0..".....;...W.
#     00A0: 81 6C 67 2D D8 56 C3 E8   5D F0 DF A3 4A D6 6B EE  .lg-.V..]...J.k.
#     00B0: FB B0 C0 19 AA B5 00 23   C3 AE 03 C3 3E 0B 49 B1  .......#....>.I.
#     00C0: BF 4A EC 9D E4 CB 2A C7   BA B2 EE 4C A8 7A CF 2F  .J....*....L.z./
#     00D0: F0 F0 8E 95 26 DD 6F 83   52 6B B0 A4 F4 68 81 6F  ....&.o.Rk...h.o
#     00E0: 83 08 03 22 84 DC BF A8   9E A0 FF 2B A9 E6 84 F8  ...".......+....
#     00F0: E0 9F CC 95 30 52 F4 7F   68 57 8D B6 BD AA C5 B9  ....0R..hW......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.377 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 5D 91 C2 FE 56 A8 37   4A F0 CD 0F F5 ED C9 7D  .]...V.7J.......
#     0010: 28 33 5C 15 12 EE 78 D3   41 AA 38 E1 DA 8E 5A 34  (3\...x.A.8...Z4
#     0020: 8F E9 67 68 0C 48 85 29   12 D6 A1 45 21 A7 86 B3  ..gh.H.)...E!...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.377 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:03.489 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "14 0D 92 4C 97 BC 14 AD F6 3D 95 0A 16 2B D9 F3 29 D0 2E 1D 38 6B 6B 35 5C 22 91 27 F8 56 DB 11",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 11:38:04.411 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 11:38:04.412 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 11:38:06.083; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 11:38:06.088; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 11:38:06.425; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 11:38:06.427; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 11:38:06.427; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-s2sjO5/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:06.462 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 93 6E 30",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:47.000 UTC",
#     "not  after"         : "2024-01-10 11:37:47.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9C F3 5B 76 2D FB CC 0F   28 0F DD 75 50 9B 91 25  ..[v-...(..uP..%
#         0010: F7 EA 8D 0B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 7C 1E AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:41.000 UTC",
#     "not  after"         : "2024-01-10 11:37:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:06.466 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 7C 1E AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:41.000 UTC",
#     "not  after"         : "2024-01-10 11:37:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "12 CE D1 5D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:39.000 UTC",
#     "not  after"         : "2024-01-10 11:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:06.477 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:06.640 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:06.640 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:06.642 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:06.642 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:06.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:06.660 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:06.661 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:06.661 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:06.669 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "50 A9 8F F3 31 CE 6C A8 AB 27 00 8C D0 F9 D9 39 1C 48 85 D0 59 9F CA 6C AF 1F 5C 44 40 EE E4 98",
#   "session id"          : "1C 19 38 AB 70 5D FF 82 92 DE 83 37 E4 13 50 F9 B7 9C DD 04 CD C1 0C FD AD AA BD 01 F6 AD D4 90",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0A 31 AB 62 F7 26 86 D9   A4 59 3D A3 DB 01 1B 53  .1.b.&...Y=....S
#             0010: 22 9C 7D 7F 32 F2 FD 63   BA 29 8C 8D DD 22 5E 64  "...2..c.)..."^d
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.763 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "06 E3 5C 90 9E 9A 46 F4 FE 9B 64 71 9F 1D E6 65 F5 34 24 C0 C4 16 7B C7 52 C1 46 DC C6 3A 7A 9A",
#   "session id"          : "1C 19 38 AB 70 5D FF 82 92 DE 83 37 E4 13 50 F9 B7 9C DD 04 CD C1 0C FD AD AA BD 01 F6 AD D4 90",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 21 FD 90 8B BF EC BA 8A   77 77 B7 AB 8F CB F3 85  !.......ww......
#           0010: 1F E1 57 EA 62 E4 53 B6   2A 61 80 14 6A 99 B8 7C  ..W.b.S.*a..j...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.764 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.764 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.771 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.772 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.773 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.774 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.784 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.785 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.786 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.793 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.793 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.793 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.793 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.793 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.794 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.794 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.795 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.795 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.795 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.799 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.800 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.800 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.800 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.810 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 22 A1 D9",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:43.000 UTC",
#       "not  after"         : "2024-01-10 11:37:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#           0010: 6A B1 B2 A8                                        j...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F 86 0D A6 00 7F 00 58   6F B5 D6 99 14 79 36 CD  .......Xo....y6.
#           0010: 06 DE 05 E0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.810 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.871 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 7C 1E AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 11:37:41.000 UTC",
#     "not  after"         : "2024-01-10 11:37:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#         0010: 34 D8 22 B9                                        4.".
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#         0010: 6A B1 B2 A8                                        j...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.874 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5D 3A F7 56 7F 15 C3 CF   6D C8 2D B5 4E B9 67 6B  ]:.V....m.-.N.gk
#     0010: 65 82 89 E8 C2 CD FD BC   43 8C 50 B1 07 17 BC AA  e.......C.P.....
#     0020: 39 8B 19 A4 0F 47 09 DA   11 18 C0 8D CB 4B 20 13  9....G.......K .
#     0030: 8F F2 48 FA 6B 3E 3C 5D   34 53 E0 D7 6F 6C CD 79  ..H.k><]4S..ol.y
#     0040: 64 A0 39 BC EC 9F 35 20   5C 25 33 36 13 AC 00 B6  d.9...5 \%36....
#     0050: FC 6E 65 C8 01 68 BE D8   F6 26 1F B5 7E A7 C4 A5  .ne..h...&......
#     0060: 42 97 A8 A5 E4 43 A1 D9   3A C4 A8 B6 8C BA 36 B1  B....C..:.....6.
#     0070: B9 3C A2 19 91 A0 6C 1E   BA AE 81 94 20 41 A1 B5  .<....l..... A..
#     0080: CB 12 4C 6C DC 50 39 D6   56 85 8D A3 A0 5A 57 42  ..Ll.P9.V....ZWB
#     0090: 84 D5 16 06 52 C5 18 C6   81 46 0A 41 94 8B 32 FC  ....R....F.A..2.
#     00A0: DD CA C2 C8 A7 46 C3 B1   BE F9 1D 83 E5 FC 53 66  .....F........Sf
#     00B0: 78 CA 4D CF EB AE 0F 9B   36 FE 32 D5 B7 81 EC 61  x.M.....6.2....a
#     00C0: 3E 60 51 FF 4D 54 A9 CF   51 8E EB C8 BF 07 9C 2C  >`Q.MT..Q......,
#     00D0: 65 18 0B B4 AF F8 1B C4   A5 DF 0A 25 AB E7 B6 17  e..........%....
#     00E0: B6 C0 55 88 B9 49 97 9E   C6 45 73 84 59 F7 E9 48  ..U..I...Es.Y..H
#     00F0: 9A 7B 23 23 39 CD 88 17   EB BA 1C C7 20 9D FE 10  ..##9....... ...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.875 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 31 E1 72 0C 83 26 4F 41   7F 77 9C 85 CB 78 9A 67  1.r..&OA.w...x.g
#     0010: A8 A8 9E 5A 00 05 F7 01   0F 8B 55 FA FF 8F 44 77  ...Z......U...Dw
#     0020: 44 5B A4 48 A6 B9 A5 92   8A 1F B1 6C D1 57 67 AF  D[.H.......l.Wg.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.877 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 11:38:06.878 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.878 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 11:38:06.878 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.878 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 11:38:06.878 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 11:38:06.878 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.878 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.880 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 93 6E 30",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:47.000 UTC",
#       "not  after"         : "2024-01-10 11:37:47.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#           0010: 6A B1 B2 A8                                        j...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9C F3 5B 76 2D FB CC 0F   28 0F DD 75 50 9B 91 25  ..[v-...(..uP..%
#           0010: F7 EA 8D 0B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 7C 1E AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:41.000 UTC",
#       "not  after"         : "2024-01-10 11:37:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#           0010: 34 D8 22 B9                                        4.".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#           0010: 6A B1 B2 A8                                        j...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.901 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F 01 8A E0 1B 3D 40 99   B4 F5 C7 9E F8 3C D4 5D  .....=@......<.]
#     0010: 1E 14 EC 3A 2A E8 15 63   78 DA A7 EC BC BB B6 86  ...:*..cx.......
#     0020: D5 F9 2B 2E 24 79 3D 80   62 B7 DD 7C 87 B5 99 5F  ..+.$y=.b......_
#     0030: 0D 3F F7 9F 02 97 1A 21   24 44 B7 E5 AB A5 12 74  .?.....!$D.....t
#     0040: 51 8E 34 6A 35 82 F2 D8   CA B8 F2 B2 37 8F 02 52  Q.4j5.......7..R
#     0050: 7B 98 65 47 B6 0A BA 29   33 BD AF 5F 52 8D 43 19  ..eG...)3.._R.C.
#     0060: C9 C6 9F 9D 82 39 FA E6   25 8A 3C A2 A2 57 B5 65  .....9..%.<..W.e
#     0070: EC 9B 8E BB 10 D8 1A E3   08 7D 5C 5E E8 C2 BB 85  ..........\^....
#     0080: F0 EB A9 61 A6 4C 02 BB   B0 16 F0 71 42 98 4C FB  ...a.L.....qB.L.
#     0090: 62 D5 51 26 6D D0 CE EE   57 CB C2 DC CF 16 0F 52  b.Q&m...W......R
#     00A0: AF 66 B9 63 55 04 98 44   E9 72 56 27 C3 DE 2A BC  .f.cU..D.rV'..*.
#     00B0: 62 B1 5E 79 5C 7F B2 2B   2E F4 60 81 7F F0 B7 E2  b.^y\..+..`.....
#     00C0: 48 44 13 A0 4D 37 4E 83   D6 2C EE E2 F5 0A 5B AF  HD..M7N..,....[.
#     00D0: 4B 45 49 55 32 1A 3D A0   0B 62 49 AB 96 08 F7 D8  KEIU2.=..bI.....
#     00E0: 68 78 AD D1 33 66 66 A3   9A 88 B9 89 6B 12 00 78  hx..3ff.....k..x
#     00F0: 88 AF 71 4C 9F 6E 2D E0   E1 CE 7D 73 73 B3 4A 9E  ..qL.n-....ss.J.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.902 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 19 97 2B 31 E6 43 54   08 C5 3B 50 EA CE 33 B9  ...+1.CT..;P..3.
#     0010: B5 34 1F F2 E5 8C 10 70   1E 36 11 F9 30 C4 8E 18  .4.....p.6..0...
#     0020: 73 5A B1 E4 6A 2D E5 55   30 9D 1F 34 C5 4D 84 C3  sZ..j-.U0..4.M..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:06.903 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:07.197 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D6 FD 37 79 38 9F 8E A1 F1 E6 B8 61 75 4C 1D 30 DA FB ED 41 F6 2B 2E 71 2E C1 3C 86 16 BA 8D 46",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 11:38:07.477 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 11:38:07.478 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-12 11:38:21.743; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:22.145 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 7C 1E AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:41.000 UTC",
#       "not  after"         : "2024-01-10 11:37:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#           0010: 34 D8 22 B9                                        4.".
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4D 03 D6 20 83 C7 61 9F   BE BB 5C A4 5B F0 29 CC  M.. ..a...\.[.).
#           0010: 6A B1 B2 A8                                        j...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "12 CE D1 5D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 11:37:39.000 UTC",
#       "not  after"         : "2024-01-10 11:37:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 C7 A7 70 DF E6 6D 2C   70 00 31 9A 3F 15 F3 5F  w..p..m,p.1.?.._
#           0010: 34 D8 22 B9                                        4.".
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 11:38:22.160 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:22.336 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:22.337 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:22.338 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 11:38:22.339 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:22.344 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:22.356 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:22.357 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:22.357 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 11:38:22.359 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "A2 F0 5C F0 54 BD B1 D0 79 06 86 65 78 F6 42 4C 56 A6 6C 92 57 0B 64 DF BA 36 94 16 BA 21 3F C1",
#     "session id"          : "EF DF 1F D5 2E 7B B8 2C 0D 35 C6 05 F2 F6 D6 B3 14 64 4F 25 00 1B 99 B4 7A 26 E9 1D E1 D8 DD D0",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E0 86 33 A2 97 15 AB 2B   91 16 D0 64 92 33 56 B2  ..3....+...d.3V.
#               0010: 0E 6B 5A 41 41 77 27 13   01 16 C1 76 68 26 68 5B  .kZAAw'....vh&h[
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.383 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "BB 2A 88 B6 8A C7 70 8F A9 57 E2 44 7C AE 98 F2 46 79 FB 5A 24 CF 8F 1A 86 3B 4D 05 4D 4D 99 9E",
#     "session id"          : "EF DF 1F D5 2E 7B B8 2C 0D 35 C6 05 F2 F6 D6 B3 14 64 4F 25 00 1B 99 B4 7A 26 E9 1D E1 D8 DD D0",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 98 D8 58 49 B0 DE A5 C9   55 C3 08 D7 41 D9 42 83  ..XI....U...A.B.
#             0010: 8E 04 9B AD 83 7B C1 F7   11 52 AF E3 D8 DF BE 2A  .........R.....*
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.384 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.384 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.384 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.385 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.385 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.387 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.387 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.387 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 11:38:22.388 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-

[...truncated too long message...]

 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 16223ms
ok 75 stop command for single port in 19054ms
not ok 76 status detects locally running solr in 2744ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7257ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 2481ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2804ms
ok 80 copying files around in 6270ms
ok 81 upconfig in 2524ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1218ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
not ok 84 Cleanup in 3525ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 54s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7a7emz2bkiagi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8164 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8164/

All tests passed

Build Log:
[...truncated 1286 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35497/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-12 09:11:51.605; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 09:11:51.609; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 11455ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 35497 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35497 (pid=1922643). Happy searching!
#
#     INFO  - 2023-10-12 09:11:59.523; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 09:11:59.527; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-12 09:12:03.032; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 09:12:03.037; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 18872ms
not ok 72 start solr with mTLS needed in 52138ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-dClO3g/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35497 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35497 (pid=1924410). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35498 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35498 (pid=1924538). Happy searching!
#
#     INFO  - 2023-10-12 09:12:48.834; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 09:12:48.848; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 09:12:49.586; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 09:12:49.588; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 09:12:49.589; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 09:12:49.625 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 64 E6 AB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:34.000 UTC",
#     "not  after"         : "2024-01-10 09:12:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C D0 44 3B CE BC F0 FB   61 A5 60 A3 DE 56 2D 5F  ..D;....a.`..V-_
#         0010: F5 68 30 D7                                        .h0.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 7A 8F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:27.000 UTC",
#     "not  after"         : "2024-01-10 09:12:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 09:12:49.629 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 82 A5 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:25.000 UTC",
#     "not  after"         : "2024-01-10 09:12:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 7A 8F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:27.000 UTC",
#     "not  after"         : "2024-01-10 09:12:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 09:12:49.644 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:12:50.024 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:50.025 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:12:50.034 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:12:50.037 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:50.049 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:50.080 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:50.080 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:50.080 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:50.082 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "57 D7 B8 EC AE AD D4 F8 DC 2F C1 4E 98 ED 3C E8 76 06 0F F8 18 D4 C3 90 44 FB 51 E8 1E 91 E6 51",
#   "session id"          : "E0 73 A8 1A 18 8E D8 42 1A D3 8F 3F A0 51 B2 18 1D 79 F8 99 D8 10 6E 05 23 57 4D BE 28 43 90 ED",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C F7 16 5E B2 A1 E8 99   87 EF D0 15 2C 1D 45 A3  ...^........,.E.
#             0010: 14 B0 D6 B1 6B 23 18 A4   83 31 72 15 78 D8 E3 0B  ....k#...1r.x...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.219 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B8 ED C9 02 AE 4A 11 9B A5 E2 62 DA 0F 54 C8 46 59 93 1E 45 11 3F 83 86 FC 68 09 0E B3 6E 19 A7",
#   "session id"          : "E0 73 A8 1A 18 8E D8 42 1A D3 8F 3F A0 51 B2 18 1D 79 F8 99 D8 10 6E 05 23 57 4D BE 28 43 90 ED",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B9 0F 5F 86 BD EE C3 5D   AF 76 3D 8E B7 A8 23 0C  .._....].v=...#.
#           0010: E7 AD 4A 0A 47 8C C4 4D   D8 FD B6 D5 1D 75 CB 1D  ..J.G..M.....u..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.220 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.220 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.220 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.221 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.221 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.223 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.226 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.226 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.227 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.228 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.228 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.228 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.228 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.237 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.244 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.245 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.248 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.248 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.248 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.253 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.253 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.253 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.253 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.254 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.254 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.255 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.255 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.255 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.256 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.256 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.257 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.257 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.264 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 4D DC AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:30.000 UTC",
#       "not  after"         : "2024-01-10 09:12:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#           0010: 84 33 09 CF                                        .3..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 29 0E 8B 8D DD 86 BC   C2 26 05 2A BF DF 6C F7  .).......&.*..l.
#           0010: 1B F7 17 0B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.264 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:50.544 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:50.544 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:50.545 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:50.545 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.638 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 7A 8F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:27.000 UTC",
#     "not  after"         : "2024-01-10 09:12:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.642 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 D8 91 15 D1 5E 45 4C   AB 42 46 5F 66 1B 37 86  W....^EL.BF_f.7.
#     0010: 7E 1C CC E4 1E 38 53 5D   B9 B1 F2 22 45 E4 E6 AD  .....8S]..."E...
#     0020: B0 C5 D0 35 CC 60 5F 9F   35 4E F2 59 74 74 7C 12  ...5.`_.5N.Ytt..
#     0030: 1C BD 9D EE 09 D6 56 25   4E F7 2A B1 4C 78 1C 7F  ......V%N.*.Lx..
#     0040: FE E3 A0 A7 DD 43 A0 5A   82 1E 24 64 1D 0C D2 0C  .....C.Z..$d....
#     0050: 25 B3 9B 16 9C 95 45 44   A8 B7 AB 02 1B 86 A5 76  %.....ED.......v
#     0060: 8F A2 8A A2 EB CD A0 CA   CC 9E 4C A0 7D E3 79 FB  ..........L...y.
#     0070: C0 05 0B F6 20 42 36 FA   47 87 22 30 0F 7A 97 52  .... B6.G."0.z.R
#     0080: 2B FC BB EE 12 B1 CA 79   9D 55 D0 84 33 A3 E1 3C  +......y.U..3..<
#     0090: 58 1E C8 BD 11 32 EB 4D   D6 5C 7F E5 E2 5B 3A 86  X....2.M.\...[:.
#     00A0: E6 DB C3 05 31 D8 35 54   A5 3F 5C 1D 41 A8 58 A5  ....1.5T.?\.A.X.
#     00B0: 5B 64 56 55 08 93 A4 1C   38 5A D7 F0 8D C1 C1 AB  [dVU....8Z......
#     00C0: 30 9B 28 D0 26 65 B5 E5   32 FD 29 35 FD 98 BF BC  0.(.&e..2.)5....
#     00D0: A1 98 D7 9D 87 20 28 28   6D 91 54 F3 D8 EB 6C 9F  ..... ((m.T...l.
#     00E0: 20 19 40 16 0F C6 A1 EF   24 F2 07 06 BA E5 7A DF   .@.....$.....z.
#     00F0: 1F C7 91 02 88 36 B2 16   52 F9 9A FA BB B2 74 4A  .....6..R.....tJ
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.644 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EE A1 C7 42 82 90 23 71   5C D8 BC 19 6E 54 48 D6  ...B..#q\...nTH.
#     0010: D2 91 6D 0C 6A 6A 92 4F   1E 1E 02 23 5F 92 58 45  ..m.jj.O...#_.XE
#     0020: 7C F0 3F B5 5B 87 C6 50   C7 4C 75 93 BF DE 1B 86  ..?.[..P.Lu.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.647 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 09:12:50.649 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.650 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 09:12:50.650 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.650 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 09:12:50.650 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:50.652 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.655 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.658 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 64 E6 AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:34.000 UTC",
#       "not  after"         : "2024-01-10 09:12:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#           0010: 84 33 09 CF                                        .3..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C D0 44 3B CE BC F0 FB   61 A5 60 A3 DE 56 2D 5F  ..D;....a.`..V-_
#           0010: F5 68 30 D7                                        .h0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 7A 8F 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:27.000 UTC",
#       "not  after"         : "2024-01-10 09:12:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#           0010: 52 EE 0D 46                                        R..F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#           0010: 84 33 09 CF                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.729 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 9E B1 7A 68 53 D8 51   74 EF 12 35 21 73 14 31  ...zhS.Qt..5!s.1
#     0010: E7 C2 A8 AB C8 6F 42 1E   DF 27 05 5B BB 6E 93 40  .....oB..'.[.n.@
#     0020: 2B 2C 91 C8 F7 5F 5E BA   F2 03 30 D9 DE 6B FE 71  +,..._^...0..k.q
#     0030: 67 0E 28 5B 61 55 27 35   34 E2 BD F6 62 91 1C 6A  g.([aU'54...b..j
#     0040: 21 89 08 4E 53 EB AD B7   40 F7 9D 12 2B 8E 5B 0B  !..NS...@...+.[.
#     0050: 91 2D 54 CE 40 0A 81 F0   DD F7 42 69 C5 C2 E9 43  .-T.@.....Bi...C
#     0060: 70 76 50 F8 A8 8B 19 37   A4 09 7F F0 D3 37 3A 8B  pvP....7.....7:.
#     0070: 10 30 49 9B BB 1D 5E 68   95 70 69 30 00 EA 87 30  .0I...^h.pi0...0
#     0080: 94 1F B2 1B BE 0B DD B1   EC F0 D1 94 6F 46 49 B0  ............oFI.
#     0090: 65 2B BC 47 25 BC 70 C4   59 FE ED CE BF 5E B5 75  e+.G%.p.Y....^.u
#     00A0: 88 C4 7E 2A 7A D7 6F 2B   D4 96 0B 9E 9D B8 33 AD  ...*z.o+......3.
#     00B0: C6 ED 14 78 5E FD 0F 43   9E 18 2F 36 55 3B 0F 2F  ...x^..C../6U;./
#     00C0: 6B 31 5D D9 29 91 10 98   E0 B9 1F B7 7D B5 E9 95  k1].)...........
#     00D0: B4 7C BC 22 AB 28 BF E2   DE DD AA 6E D3 81 BA 48  ...".(.....n...H
#     00E0: 7B 5D D0 18 92 FC E9 8B   73 35 C9 84 C8 7E 3D E7  .]......s5....=.
#     00F0: 1A A4 17 DE 3A 55 18 7B   7D 36 4D 5B 19 E2 D7 0E  ....:U...6M[....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.730 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9E 9F 65 DF FD 51 52 94   8A F5 ED 62 9E 75 C0 2F  ..e..QR....b.u./
#     0010: DF 15 41 E1 4F 2E 1F 1F   39 73 CB 32 BA AB 8C 97  ..A.O...9s.2....
#     0020: 22 05 4D 40 A8 1E B4 0D   10 0B BA 7C B7 DF FE 23  ".M@...........#
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.734 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:50.825 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D4 5C B0 9F FC BE FC 8B A8 44 2B 05 A1 90 7B 3D 9A 84 81 F3 F2 5D CA B6 4C 5E 04 04 56 37 38 6D",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-12 09:12:51.705 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 09:12:51.706 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-12 09:12:53.443; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-12 09:12:53.448; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-12 09:12:53.850; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 09:12:53.852; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-12 09:12:53.853; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(ca,h=[localhost],a=[],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-dClO3g/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-12 09:12:54.158 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "01 64 E6 AB",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:34.000 UTC",
#     "not  after"         : "2024-01-10 09:12:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0C D0 44 3B CE BC F0 FB   61 A5 60 A3 DE 56 2D 5F  ..D;....a.`..V-_
#         0010: F5 68 30 D7                                        .h0.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 7A 8F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:27.000 UTC",
#     "not  after"         : "2024-01-10 09:12:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 09:12:54.162 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1D 82 A5 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:25.000 UTC",
#     "not  after"         : "2024-01-10 09:12:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 7A 8F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:27.000 UTC",
#     "not  after"         : "2024-01-10 09:12:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-12 09:12:54.174 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:12:54.341 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:54.342 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:12:54.343 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:12:54.344 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:54.348 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:54.358 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:54.358 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:54.358 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:12:54.360 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BA 55 19 1B 63 DD 3B 83 38 02 A0 AD 73 E4 7C E2 6F 47 86 80 F3 08 66 C0 6F 56 57 2A 34 81 3F 41",
#   "session id"          : "54 18 A7 F4 4C ED E4 D0 86 88 33 47 C6 E1 E6 9E 1F CD 88 F1 CF 96 05 5C 51 75 11 2D 5E 6E FC 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 34 3E 86 F7 B7 3B 0D C2   FB 2C EC 59 8C C6 1B 6A  4>...;...,.Y...j
#             0010: B6 CB 89 66 73 A2 81 A8   5A 40 DF 9C E7 42 F7 6B  ...fs...Z@...B.k
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.476 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "6B E1 B0 D2 78 94 54 10 8B 48 B6 41 2A 0D 75 9A 3C A1 8E 7D 02 98 D0 B6 7F 6E 97 A4 CC 5E AC C6",
#   "session id"          : "54 18 A7 F4 4C ED E4 D0 86 88 33 47 C6 E1 E6 9E 1F CD 88 F1 CF 96 05 5C 51 75 11 2D 5E 6E FC 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3F 73 C3 99 63 6C A5 32   4C 46 D0 E7 12 0C 2C 79  ?s..cl.2LF....,y
#           0010: B7 53 1B 89 1D B9 61 39   D7 41 7E 95 EA 80 23 75  .S....a9.A....#u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.476 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.476 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.478 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.478 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.479 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.480 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.480 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.484 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.484 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.484 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.485 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.500 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.502 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.503 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.512 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.513 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.513 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.513 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.514 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.514 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.514 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.515 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.515 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.518 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.518 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.519 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.521 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.522 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.522 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.528 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 4D DC AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:30.000 UTC",
#       "not  after"         : "2024-01-10 09:12:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#           0010: 84 33 09 CF                                        .3..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 29 0E 8B 8D DD 86 BC   C2 26 05 2A BF DF 6C F7  .).......&.*..l.
#           0010: 1B F7 17 0B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.528 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.578 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "59 7A 8F 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-12 09:12:27.000 UTC",
#     "not  after"         : "2024-01-10 09:12:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#         0010: 52 EE 0D 46                                        R..F
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#         0010: 84 33 09 CF                                        .3..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.582 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D D9 20 94 0D E0 28 12   24 3C E1 7B 6E FC 3D 0B  .. ...(.$<..n.=.
#     0010: 9B FA 35 77 F8 E4 C2 74   62 F1 96 79 61 8F EF 3F  ..5w...tb..ya..?
#     0020: C9 25 85 F4 27 C5 26 6E   9A D6 58 B3 A0 4E 80 BC  .%..'.&n..X..N..
#     0030: 33 F0 20 2C B9 D4 3B 6E   5A 6C 11 4B B5 09 7A FC  3. ,..;nZl.K..z.
#     0040: A7 B6 7D 46 60 DE 44 06   B1 CF 99 28 9F 24 FA 40  ...F`.D....(.$.@
#     0050: 1F AA 17 B1 EA 8F AD 2B   B6 25 CF F4 98 15 F7 A9  .......+.%......
#     0060: 6A B6 CB F3 0F 48 3C 84   EE 14 49 14 4D 92 7F 13  j....H<...I.M...
#     0070: B6 5F 24 49 2F 94 1D 0A   5B 2E 89 45 7B 1F D6 AD  ._$I/...[..E....
#     0080: 00 08 48 B3 B9 A0 64 08   B8 30 CE CE 01 10 8A E2  ..H...d..0......
#     0090: EE 9A 83 A8 90 F9 E2 E7   5B FF 42 76 BD E1 0F 28  ........[.Bv...(
#     00A0: 83 57 18 22 9F 37 4B 64   B1 D5 03 AA E8 67 80 4F  .W.".7Kd.....g.O
#     00B0: 48 E2 F2 A8 E7 FA D3 84   4E 73 3D 0F 68 30 DD 28  H.......Ns=.h0.(
#     00C0: FF 66 50 31 C2 8C E7 CE   EE 0F 33 12 CC 81 1E DC  .fP1......3.....
#     00D0: 98 97 6B ED 91 67 F3 45   A7 82 72 28 6E 12 92 4C  ..k..g.E..r(n..L
#     00E0: 69 4C CD 07 2E C2 CD 88   78 97 EF 68 31 8E 25 EF  iL......x..h1.%.
#     00F0: D0 A1 68 30 F6 CA 31 4F   4B 2A 0A 93 01 69 F7 1B  ..h0..1OK*...i..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.583 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 86 C9 D7 6E 5C 1B 22 A5   50 3F C3 7F 2F 49 E7 D2  ...n\.".P?../I..
#     0010: 49 04 ED 78 7F 29 E6 D2   C5 C4 5F 1E 69 F8 64 A7  I..x.)...._.i.d.
#     0020: 10 38 EF 29 F9 45 69 F9   08 35 FD F6 E5 3F 6A 50  .8.).Ei..5...?jP
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.585 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 09:12:54.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 09:12:54.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-12 09:12:54.586 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-12 09:12:54.586 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.586 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.588 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "01 64 E6 AB",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:34.000 UTC",
#       "not  after"         : "2024-01-10 09:12:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#           0010: 84 33 09 CF                                        .3..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0C D0 44 3B CE BC F0 FB   61 A5 60 A3 DE 56 2D 5F  ..D;....a.`..V-_
#           0010: F5 68 30 D7                                        .h0.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 7A 8F 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:27.000 UTC",
#       "not  after"         : "2024-01-10 09:12:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#           0010: 52 EE 0D 46                                        R..F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#           0010: 84 33 09 CF                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.610 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 40 0F D2 BD 3D 6E BA   78 66 9B 37 86 42 99 0E  .@...=n.xf.7.B..
#     0010: 41 81 30 01 68 49 CE 05   6E F9 1C D2 5D 55 FC 0D  A.0.hI..n...]U..
#     0020: 8A 76 18 88 E3 01 37 82   B8 65 7D 85 0D C0 E1 69  .v....7..e.....i
#     0030: 45 1C 0B 0C 4B 07 44 56   92 46 23 FB 9F 60 B2 CC  E...K.DV.F#..`..
#     0040: B8 99 48 F8 79 33 DB EE   B7 A1 0A 35 EA 1B 7F 7F  ..H.y3.....5....
#     0050: 7B 04 DD C2 3E 1B B8 77   0B F1 93 D4 00 11 E2 9B  ....>..w........
#     0060: 61 31 99 9F 68 C6 D1 92   F1 7A FF 89 AB CF A9 A1  a1..h....z......
#     0070: 81 BE 68 CB AC 9A E2 C8   6B 1F FB D8 E1 21 E7 77  ..h.....k....!.w
#     0080: 9A B6 77 46 E2 A6 05 D4   29 A7 BE D5 61 F3 58 D0  ..wF....)...a.X.
#     0090: 93 5B B4 2A 09 B7 A9 C3   00 4E 07 DD 57 99 08 E9  .[.*.....N..W...
#     00A0: E0 77 57 8B 8F 78 11 D6   0B 1F 9E 4E D8 28 6A A7  .wW..x.....N.(j.
#     00B0: 9C 57 45 5D 95 64 E3 11   98 93 E4 78 5C 25 DF 62  .WE].d.....x\%.b
#     00C0: FF CE 63 EE DE 0E 70 FA   AD 98 92 B0 62 6D 59 65  ..c...p.....bmYe
#     00D0: 15 62 23 5C 41 73 8D 11   97 B2 81 2C 45 09 65 C0  .b#\As.....,E.e.
#     00E0: 51 91 E4 E1 5C 07 A1 EC   91 D9 3E D3 4D A8 54 F4  Q...\.....>.M.T.
#     00F0: F6 DE 03 BD DA 30 6D 93   9E 84 D2 8F D3 D4 E1 FC  .....0m.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.611 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E1 57 AF DF 16 61 FF 91   3D C7 C4 57 38 C3 15 3E  .W...a..=..W8..>
#     0010: C0 FC 38 50 64 0D B1 2F   16 44 0A FC DA 33 85 93  ..8Pd../.D...3..
#     0020: 8E 95 BA F0 D1 2E 6B 88   8F CD 44 76 02 2D 37 86  ......k...Dv.-7.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:12:54.612 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-12 09:12:54.663 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "36 B4 D4 27 3B 67 9D EF 52 A7 86 D1 24 18 F8 B4 E0 5E 9C 3D 8E D7 0E 6B 6E 32 2F 02 C7 CA A6 C5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:54.698 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:54.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:54.698 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:12:54.698 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-12 09:12:55.044 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-12 09:12:55.047 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-12 09:13:08.219; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-12 09:13:08.542 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1D 82 A5 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:25.000 UTC",
#       "not  after"         : "2024-01-10 09:12:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#           0010: 52 EE 0D 46                                        R..F
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "59 7A 8F 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-12 09:12:27.000 UTC",
#       "not  after"         : "2024-01-10 09:12:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 CB C9 55 D8 46 C0 0D   C7 6E 84 89 FD DD F5 2B  ...U.F...n.....+
#           0010: 52 EE 0D 46                                        R..F
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C B4 D4 FB 23 DE 2B E1   F5 F1 CB 4C 4F 16 6B A3  ....#.+....LO.k.
#           0010: 84 33 09 CF                                        .3..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-12 09:13:08.554 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:13:08.822 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:13:08.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:13:08.824 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-12 09:13:08.824 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:13:08.828 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:13:08.838 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:13:08.838 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:13:08.839 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-12 09:13:08.841 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "37 CF 78 0B DC EB 23 55 7B 4A 50 9F 76 12 08 89 50 DE 05 9A 81 B0 57 69 8D 35 58 D3 71 B6 60 A8",
#     "session id"          : "BA EE F2 F7 90 DD 8B B6 79 E8 43 AD 26 66 75 AB B3 9F D3 E5 13 53 02 06 56 48 38 81 99 11 82 56",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 5D CC B2 5A EC C7 A3 44   FC 11 5F 48 EF 4F C5 6C  ]..Z...D.._H.O.l
#               0010: 72 11 75 EC 19 71 CB B2   5D FD FD 8A A9 1A 7E 0D  r.u..q..].......
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.855 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CA D2 58 C3 99 8F EB BB 8D F5 A1 47 09 87 18 AA 7A 5A E4 40 AB 37 09 69 94 C7 71 65 EE 71 C1 7D",
#     "session id"          : "BA EE F2 F7 90 DD 8B B6 79 E8 43 AD 26 66 75 AB B3 9F D3 E5 13 53 02 06 56 48 38 81 99 11 82 56",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5A EE B6 46 63 8A E3 38   A2 9A 2D D7 83 6B E7 52  Z..Fc..8..-..k.R
#             0010: FC 0E 9F 21 5D 7B 7F 5F   96 89 2F D6 72 AF 91 76  ...!].._../.r..v
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.855 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.855 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.856 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.858 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.859 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-12 09:13:08.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12

[...truncated too long message...]

:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-12 09:14:18.643 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 14570ms
ok 75 stop command for single port in 17058ms
not ok 76 status detects locally running solr in 2508ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7254ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 2524ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3044ms
ok 80 copying files around in 6275ms
ok 81 upconfig in 2622ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1238ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1218ms
not ok 84 Cleanup in 3487ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (11 lines):
#
#   Found 2 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
#
#
#   Solr process 1723501 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 2 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
#
#
# Solr process 1723501 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 39s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ci724qd5xbzsc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8163 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8163/

1 tests failed.
FAILED:  org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget

Error Message:
java.lang.AssertionError: The non-source node '127.0.0.1:34737_solr' has the wrong number of replicas after the migration expected:<2> but was:<1>

Stack Trace:
java.lang.AssertionError: The non-source node '127.0.0.1:34737_solr' has the wrong number of replicas after the migration expected:<2> but was:<1>
	at __randomizedtesting.SeedInfo.seed([E249FAC2BCA314D9:CC222EF889C0C5AD]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget(MigrateReplicasTest.java:303)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 3812 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.MigrateReplicasTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=E249FAC2BCA314D9 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 9s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/lc3ihjeui3wtu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8162 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8162/

All tests passed

Build Log:
[...truncated 1486 lines...]
BUILD FAILED in 1h 3m 27s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/oi2wz3vqsr63a

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8161 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8161/

All tests passed

Build Log:
[...truncated 1280 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:33749/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-11 22:28:03.490; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 22:28:03.494; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:33749/solr] to [https://127.0.0.1:33749].
# WARN  - 2023-10-11 22:28:04.376; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 22:28:04.413; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17314ms
ok 71 start solr with client truststore and security manager in 19560ms
not ok 72 start solr with mTLS needed in 53813ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-bltXUB/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33749 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33749 (pid=558761). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33750 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33750 (pid=558872). Happy searching!
#
#     INFO  - 2023-10-11 22:29:07.630; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 22:29:07.653; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 22:29:08.653; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e16b8b5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 22:29:08.656; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 22:29:08.660; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(ca,h=[localhost],a=[],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:08.735 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 1E F9 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:52.000 UTC",
#     "not  after"         : "2024-01-09 22:28:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C E7 3A 56 AD F9 2D F1   6E EE A1 29 74 DA 1E F2  <.:V..-.n..)t...
#         0010: 7D 15 B5 E0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 DE AF 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:46.000 UTC",
#     "not  after"         : "2024-01-09 22:28:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:08.750 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 7D CB 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:44.000 UTC",
#     "not  after"         : "2024-01-09 22:28:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 DE AF 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:46.000 UTC",
#     "not  after"         : "2024-01-09 22:28:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:08.774 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:09.121 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:09.121 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:09.123 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:09.123 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:09.136 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:09.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:09.150 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:09.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:09.152 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 92 8B 85 A8 E0 73 62 AD 88 35 4C 59 6E E4 68 15 4E DE 0A 8C D7 7E B2 01 30 11 03 28 D6 98 74",
#   "session id"          : "65 E2 0C 60 99 73 5F 6D 3D 1F 49 98 E3 60 9D 81 38 B7 47 02 D7 4C F8 89 BA AB BE 12 91 5D C4 14",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 69 F0 A9 CA 33 D3 1A 64   2F BE 82 9B 3C EC A8 7A  i...3..d/...<..z
#             0010: EF D1 60 0D 8E 02 2B 31   F2 B4 75 53 15 3B A5 47  ..`...+1..uS.;.G
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.306 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0B 63 4B 49 3F FD 6A A8 81 EC 4D 2E F7 7C D3 E1 C7 51 2C E6 80 77 8C 5B C4 BB AB 55 D4 DB ED 62",
#   "session id"          : "65 E2 0C 60 99 73 5F 6D 3D 1F 49 98 E3 60 9D 81 38 B7 47 02 D7 4C F8 89 BA AB BE 12 91 5D C4 14",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 38 8A 51 6D 83 7E 1F 39   A8 31 B4 B7 E3 B6 FF D3  8.Qm...9.1......
#           0010: 26 76 84 94 AA 43 67 73   96 47 63 27 FC 15 ED 2B  &v...Cgs.Gc'...+
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.309 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.309 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.313 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.314 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.314 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.316 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.316 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.316 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.316 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.317 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.317 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.325 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.326 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.327 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.333 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.333 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.333 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.333 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.334 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.334 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.334 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.334 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.335 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.335 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.335 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.335 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.336 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.337 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.337 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.339 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C ED B8 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:49.000 UTC",
#       "not  after"         : "2024-01-09 22:28:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#           0010: D3 B6 2A 89                                        ..*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 8A B1 B5 C8 43 B9 2B   10 CA 40 84 F2 79 E3 1D  .....C.+..@..y..
#           0010: A0 F9 BC 0D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.340 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.520 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 DE AF 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:46.000 UTC",
#     "not  after"         : "2024-01-09 22:28:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.522 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 71 D8 F1 37 E3 9C C8 62   AD 84 17 43 B2 E9 E6 A8  q..7...b...C....
#     0010: 07 1E DA 1E 48 CB 97 DE   2E 4C 6F F9 5D 73 C6 34  ....H....Lo.]s.4
#     0020: BD B8 76 C0 09 66 BF 91   0B 1F 7F 27 1F 4F 71 E8  ..v..f.....'.Oq.
#     0030: FA E1 1C BA 88 A9 EE C6   9E A8 08 B4 BF DB 38 52  ..............8R
#     0040: BD E2 4C 7D 5A C8 BA FA   54 0D 46 A2 91 84 0A 03  ..L.Z...T.F.....
#     0050: 96 7A F7 6A EE E8 BC 6D   11 44 E6 38 54 ED A8 09  .z.j...m.D.8T...
#     0060: 43 91 D6 AF 98 57 FB 5A   D4 F7 67 9B E0 EA F1 C0  C....W.Z..g.....
#     0070: CF 98 87 B5 FA FA 12 C1   1D DD E4 1F FC AC E1 48  ...............H
#     0080: D1 AC CA BC A3 CE 96 84   13 91 80 1F A3 BD D3 36  ...............6
#     0090: 3C 63 32 C9 6D 5D BB 09   01 47 80 8D 90 3C 2F 4A  <c2.m]...G...</J
#     00A0: BF E4 A4 BD 27 F8 04 06   AA C1 8B DC F8 80 24 15  ....'.........$.
#     00B0: ED 7D 57 42 9E 55 23 0A   4E 1B 4E 9A 21 44 0D F9  ..WB.U#.N.N.!D..
#     00C0: 0B 75 10 D8 39 D3 E3 35   3D 7F 85 8A 68 3C E1 00  .u..9..5=...h<..
#     00D0: 51 77 AA AD 2B BF 35 49   7D 43 35 79 ED 89 4B 9C  Qw..+.5I.C5y..K.
#     00E0: A6 E1 71 E0 2F E3 1F 03   62 81 BC E3 07 ED D7 00  ..q./...b.......
#     00F0: E5 7B 80 FA EA D6 87 B4   C5 E1 DB 1B 86 74 D4 9A  .............t..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.524 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B0 5B 6C 88 A6 9C B6 52   41 99 8C 3A EF B6 47 23  .[l....RA..:..G#
#     0010: 4D DB E3 C9 2D A1 E0 B2   7C A4 5B 96 04 8A 9B C3  M...-.....[.....
#     0020: 57 BA 8B D4 49 08 B1 F3   E0 B6 70 49 E0 02 74 24  W...I.....pI..t$
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.527 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 22:29:09.528 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.528 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 22:29:09.528 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.528 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 22:29:09.528 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:09.528 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.529 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.530 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 1E F9 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:52.000 UTC",
#       "not  after"         : "2024-01-09 22:28:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#           0010: D3 B6 2A 89                                        ..*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C E7 3A 56 AD F9 2D F1   6E EE A1 29 74 DA 1E F2  <.:V..-.n..)t...
#           0010: 7D 15 B5 E0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 DE AF 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:46.000 UTC",
#       "not  after"         : "2024-01-09 22:28:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#           0010: C1 4A 21 E2                                        .J!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#           0010: D3 B6 2A 89                                        ..*.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.552 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 7B 24 BA DB 95 4E FD   E6 89 D0 D5 23 8F 36 8D  ..$...N.....#.6.
#     0010: FD 51 18 4B 52 E8 B9 52   4F 96 9C 0E F8 0E 88 A1  .Q.KR..RO.......
#     0020: 5F 3C BD 4F 67 42 14 2A   50 D4 48 B4 7C 72 04 21  _<.OgB.*P.H..r.!
#     0030: 1C 89 69 99 91 CE B1 76   B3 4A 01 EB 0B 47 E4 3E  ..i....v.J...G.>
#     0040: 7C 3B 81 A9 D9 45 D0 C2   C4 45 C7 85 57 70 F8 C8  .;...E...E..Wp..
#     0050: 7B BD BC 20 7C 22 44 B4   3E D1 15 ED B0 6A 58 15  ... ."D.>....jX.
#     0060: 18 26 D9 AF 72 A2 80 08   D0 90 4A 3B DB DB 9B E6  .&..r.....J;....
#     0070: 1C 90 05 26 B6 91 99 CD   8A 80 8E 5A BC 18 9A 47  ...&.......Z...G
#     0080: 3E 38 5A B8 59 37 27 57   21 86 C5 3F DE D2 65 BA  >8Z.Y7'W!..?..e.
#     0090: 4A 88 E8 BC 56 4A 9A 2C   8B D3 DB 99 7B 0A 8D 59  J...VJ.,.......Y
#     00A0: B6 E5 3E 3E 6F 36 F9 BD   48 D7 56 0C FA 76 2F 49  ..>>o6..H.V..v/I
#     00B0: 40 1A 72 D4 98 82 6D 41   ED 42 EE 77 68 34 B7 02  @.r...mA.B.wh4..
#     00C0: C9 0F E8 46 E5 C8 F5 2D   15 BF 02 53 61 A6 8C 5A  ...F...-...Sa..Z
#     00D0: 3B CD FE D3 D4 14 31 5A   83 5D 95 67 A4 E3 EC 16  ;.....1Z.].g....
#     00E0: B7 B7 6F 52 12 DF DC 3A   EC 39 3B F6 B9 06 B7 25  ..oR...:.9;....%
#     00F0: 19 82 40 9C 1C 51 FE 88   1A B9 5B 50 43 A8 86 53  ..@..Q....[PC..S
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.552 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C B6 4B BC 13 0E 84 A0   BC 63 C1 03 92 00 0B 8D  ,.K......c......
#     0010: 6E E3 EE 3E 44 36 3B 75   84 E1 81 B2 41 58 D6 DE  n..>D6;u....AX..
#     0020: 9F A0 A7 E2 98 A1 7B 5A   9D 44 00 74 41 9A 92 F3  .......Z.D.tA...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.553 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:09.765 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "63 F5 65 7F 45 47 B4 24 24 4C 40 EF 71 54 DB EE D8 7B D3 19 32 88 09 53 0D FA BB 6B 8D 83 41 D6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 22:29:10.031 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 22:29:10.031 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 22:29:10.031 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 22:29:10.031 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-11 22:29:10.034 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 22:29:10.035 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 22:29:11.163; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 22:29:11.166; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 22:29:11.495; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 22:29:11.497; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 22:29:11.498; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-bltXUB/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:11.528 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 1E F9 70",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:52.000 UTC",
#     "not  after"         : "2024-01-09 22:28:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3C E7 3A 56 AD F9 2D F1   6E EE A1 29 74 DA 1E F2  <.:V..-.n..)t...
#         0010: 7D 15 B5 E0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 DE AF 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:46.000 UTC",
#     "not  after"         : "2024-01-09 22:28:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:11.531 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 7D CB 2A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:44.000 UTC",
#     "not  after"         : "2024-01-09 22:28:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 DE AF 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:46.000 UTC",
#     "not  after"         : "2024-01-09 22:28:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:11.542 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:11.699 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:11.699 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:11.701 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:11.701 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:11.705 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:11.715 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:11.715 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:11.715 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:11.717 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "01 14 DB B6 05 4F F3 68 58 85 B3 5E 94 D0 E9 D3 CE 17 1D 72 76 12 BE 6F 1B 38 21 C9 EB 0C 30 D3",
#   "session id"          : "D1 9E 76 D3 02 9B 9A EF A9 78 34 B9 CE 35 C8 09 7E 40 46 6C F1 A8 6F 01 B8 56 9C BC 84 A2 01 44",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CF C3 D5 E0 40 94 65 43   A0 11 EE 31 0C 63 29 15  ....@.eC...1.c).
#             0010: 01 19 8D C7 B5 43 2B EF   D0 DF 3A AA 75 25 CB 34  .....C+...:.u%.4
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.822 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "61 AA 9A 4A 47 99 2F F8 3C 65 46 B9 2E 12 07 44 68 12 E0 4B B7 E6 94 74 95 F8 8E 48 2F D8 BA 65",
#   "session id"          : "D1 9E 76 D3 02 9B 9A EF A9 78 34 B9 CE 35 C8 09 7E 40 46 6C F1 A8 6F 01 B8 56 9C BC 84 A2 01 44",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C2 60 DD 2A AC F6 89 3A   70 BA 38 5D 7E 4F EB 62  .`.*...:p.8].O.b
#           0010: 7E B9 7B 96 D7 F5 19 CB   42 91 31 B2 4F 52 A7 65  ........B.1.OR.e
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.822 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.823 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.830 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.830 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.830 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.832 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.832 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.832 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.832 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.832 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.832 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.833 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:11.834 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:11.834 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.843 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.845 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.846 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.855 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.855 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.855 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.856 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.856 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.856 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.857 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:11.857 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:11.858 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.860 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.860 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.860 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.863 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.863 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:11.864 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:11.864 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.000 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C ED B8 9B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:49.000 UTC",
#       "not  after"         : "2024-01-09 22:28:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#           0010: D3 B6 2A 89                                        ..*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 8A B1 B5 C8 43 B9 2B   10 CA 40 84 F2 79 E3 1D  .....C.+..@..y..
#           0010: A0 F9 BC 0D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.000 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.266 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 DE AF 87",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 22:28:46.000 UTC",
#     "not  after"         : "2024-01-09 22:28:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#         0010: C1 4A 21 E2                                        .J!.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#         0010: D3 B6 2A 89                                        ..*.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.269 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 6E 73 1B 8C B6 07 F5   72 95 21 1F 42 7A 41 4A  Qns.....r.!.BzAJ
#     0010: 13 77 1B 5D 94 BC 1B DB   1A EF AD 05 A6 1D AC 72  .w.]...........r
#     0020: 12 7C 63 E4 7A ED 4C BB   5B 76 BC 07 34 EF 5A 75  ..c.z.L.[v..4.Zu
#     0030: 13 B1 C5 92 12 D0 AC B8   BD 4B CA C4 87 2B F2 C2  .........K...+..
#     0040: 68 B5 B1 26 E2 F3 DF 42   CE EC E2 05 3B E6 4C 1F  h..&...B....;.L.
#     0050: 00 2A 69 56 2B 94 A2 B0   FB 31 58 2B 5C 2A 01 A4  .*iV+....1X+\*..
#     0060: E5 69 13 12 AA 4E 24 0A   37 29 C4 75 5B 00 72 0F  .i...N$.7).u[.r.
#     0070: C1 12 1A BA BD CF 1A 56   34 6E 65 C0 41 D6 75 A0  .......V4ne.A.u.
#     0080: 76 CA A8 0B 79 73 DD 6E   62 FB 75 66 05 1E D0 96  v...ys.nb.uf....
#     0090: 58 02 C9 5A 78 EE 7E DF   9E F8 58 10 D2 17 D0 9F  X..Zx.....X.....
#     00A0: 4C 9E F8 F7 74 37 B1 BC   05 EA D1 AA 29 2C B1 3D  L...t7......),.=
#     00B0: 84 A4 30 A9 BE 9C 16 E4   B9 9D 0A D5 2F 02 DC 53  ..0........./..S
#     00C0: 35 17 50 CD 5B D1 29 A3   E0 12 1C ED 9C D1 F7 2D  5.P.[.)........-
#     00D0: C3 29 85 1B F6 FF 1D 5C   28 CD 2A C0 BF 40 4A 88  .).....\(.*..@J.
#     00E0: 51 DE 5E 54 37 39 5D CC   18 4E 16 75 5C EE 7F EE  Q.^T79]..N.u\...
#     00F0: 10 5E 2B EF 64 FD 81 A9   21 09 CB BA 2F 42 5A 35  .^+.d...!.../BZ5
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.271 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 32 6D 95 9C EF 2A 51 0B   66 2D 8E 2A 80 D8 9C CE  2m...*Q.f-.*....
#     0010: 23 79 2C 01 BC 96 6E D8   E9 B8 F0 58 17 77 33 A3  #y,...n....X.w3.
#     0020: 0E 7A 1E C1 A2 7C 11 25   55 C8 F4 C8 34 88 71 72  .z.....%U...4.qr
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.272 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 22:29:12.273 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:12.273 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 22:29:12.273 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:12.273 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 22:29:12.273 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:12.274 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.274 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.276 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 1E F9 70",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:52.000 UTC",
#       "not  after"         : "2024-01-09 22:28:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#           0010: D3 B6 2A 89                                        ..*.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3C E7 3A 56 AD F9 2D F1   6E EE A1 29 74 DA 1E F2  <.:V..-.n..)t...
#           0010: 7D 15 B5 E0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 DE AF 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:46.000 UTC",
#       "not  after"         : "2024-01-09 22:28:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#           0010: C1 4A 21 E2                                        .J!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#           0010: D3 B6 2A 89                                        ..*.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.297 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 24 97 22 CC 2D F0 30 7B   F8 99 79 B0 15 D2 0F 8B  $.".-.0...y.....
#     0010: 21 11 7D B8 D6 F9 3C AB   56 DB 24 BA AE 1B 47 9D  !.....<.V.$...G.
#     0020: 67 69 C3 9D BD 6D 98 DE   A7 05 C8 8F 9B A8 31 A0  gi...m........1.
#     0030: 41 21 04 53 97 E5 F9 CA   CD 63 27 AD 12 0F 95 57  A!.S.....c'....W
#     0040: E0 FA 8C 83 DF D6 5B 6B   AE 10 9E AF 61 5A 32 91  ......[k....aZ2.
#     0050: E5 2A 8B 84 34 3B B1 3A   8A 4A B8 A5 96 40 32 7E  .*..4;.:.J...@2.
#     0060: FC 11 4B 39 E0 3F 1A DE   76 FB B5 83 A2 25 2F 91  ..K9.?..v....%/.
#     0070: 89 FA 76 65 A7 C3 84 74   2F BF 66 C7 6D FD 55 29  ..ve...t/.f.m.U)
#     0080: 11 C9 EB 03 EF 75 9D 01   C9 27 78 55 71 2A 07 A9  .....u...'xUq*..
#     0090: D2 D9 01 ED DD F9 0E D1   C0 1F 3C 40 3E 54 18 38  ..........<@>T.8
#     00A0: 7E 64 38 87 58 14 B3 47   7F 9F 49 97 B8 B4 C0 36  .d8.X..G..I....6
#     00B0: C9 12 8F 5E 13 95 9B A3   AB A9 5E 71 85 6F 26 0D  ...^......^q.o&.
#     00C0: 40 7B 09 51 18 9D E7 48   2D 63 54 AA DC 46 BE 29  @..Q...H-cT..F.)
#     00D0: EA 2A 88 7B 51 38 5E 6D   CD 37 95 B6 FD 4E F1 6C  .*..Q8^m.7...N.l
#     00E0: D9 5F 77 93 79 DA F9 2F   6C 92 71 4B 55 31 50 BC  ._w.y../l.qKU1P.
#     00F0: 8C 18 1A 01 53 A2 6E 7F   D5 39 52 93 4F E8 C3 67  ....S.n..9R.O..g
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.298 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 07 12 21 8B 01 83 CB AF   6D FA 08 FE D8 F2 8C EE  ..!.....m.......
#     0010: 85 FF 86 71 03 73 CF 6C   E1 C2 1A D8 66 74 4F BB  ...q.s.l....ftO.
#     0020: 69 FB 47 64 97 1A 78 D0   17 D1 46 44 0B 28 F6 53  i.Gd..x...FD.(.S
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.298 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:12.348 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "32 BD A9 59 6B 12 73 91 4A E4 7A D6 52 F9 B0 7D E8 25 F2 B9 A7 45 B6 85 04 78 D6 97 03 15 D0 1B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 22:29:12.602 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 22:29:12.603 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-11 22:29:26.027; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:26.315 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 7D CB 2A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:44.000 UTC",
#       "not  after"         : "2024-01-09 22:28:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#           0010: C1 4A 21 E2                                        .J!.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 DE AF 87",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 22:28:46.000 UTC",
#       "not  after"         : "2024-01-09 22:28:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C0 5C 59 15 17 68 32 B0   A8 D9 05 A8 44 BB 0A 66  .\Y..h2.....D..f
#           0010: C1 4A 21 E2                                        .J!.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4E EA 77 87 E0 95 2A E7   AC F4 87 B1 AD 6B C7 F3  N.w...*......k..
#           0010: D3 B6 2A 89                                        ..*.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 22:29:26.328 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:26.486 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:26.486 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:26.487 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 22:29:26.488 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:26.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:26.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:26.503 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:26.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 22:29:26.505 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "21 9F EC 6F CF C4 6A 99 0F 87 0A 84 F0 21 2C F2 48 76 D7 5E 5B A6 8D ED 27 54 12 FC CC C3 A7 D3",
#     "session id"          : "96 4B B1 E2 AB 44 CF FE 7E 0A E9 13 21 37 90 31 58 77 DF D0 D1 B1 0B 8E 83 E9 EA 82 42 68 41 CA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 41 65 FE 8A 3B 21 9D D3   5F 43 11 DC 56 E9 D0 90  Ae..;!.._C..V...
#               0010: E1 BC 35 55 EB 03 F7 32   1B B1 52 A2 F5 AE 58 41  ..5U...2..R...XA
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.525 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "17 4D 5E D4 53 19 CE C8 9A 5A 52 6C 25 E5 E5 C3 A7 26 8E 47 4F C9 84 E0 36 DC 62 E2 63 10 CD 8A",
#     "session id"          : "96 4B B1 E2 AB 44 CF FE 7E 0A E9 13 21 37 90 31 58 77 DF D0 D1 B1 0B 8E 83 E9 EA 82 42 68 41 CA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D8 DB FC FE 18 82 80 A2   34 35 41 56 D8 E7 45 0A  ........45AV..E.
#             0010: 32 5D 0E D2 2E 62 F5 C4   7C 1E 34 90 BA 8D 18 25  2]...b....4....%
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.525 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.525 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.526 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.528 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.528 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.538 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.539 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.541 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.544 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.544 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.544 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.544 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.544 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:26.545 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:26.545 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.546 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.546 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.546 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.546 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.547 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.548 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 22:29:26.548 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 22:29:26.551 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "3C ED B8 9B",
#         "signature algorithm": "SHA256withRSA",
#         "issuer"             : "CN

[...truncated too long message...]

pl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14221ms
ok 75 stop command for single port in 17560ms
not ok 76 status detects locally running solr in 1410ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7256ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1420ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2854ms
ok 80 copying files around in 6318ms
ok 81 upconfig in 2559ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1232ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1250ms
not ok 84 Cleanup in 2416ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 4175232 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 4175232 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 59s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vnpwisd22hefk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8160 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8160/

All tests passed

Build Log:
[...truncated 1447 lines...]
BUILD FAILED in 1h 3m 23s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/35ofvztplymrw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8159 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8159/

All tests passed

Build Log:
[...truncated 1446 lines...]
BUILD FAILED in 1h 2m 14s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/unqkealzrdfi4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8158 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8158/

1 tests failed.
FAILED:  org.apache.solr.search.TestCoordinatorRole.testNRTRestart

Error Message:
org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: http://127.0.0.1:34055/solr

Stack Trace:
org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: http://127.0.0.1:34055/solr
	at __randomizedtesting.SeedInfo.seed([947FBCBC6F469356:64EB0C77CD5B4180]:0)
	at app//org.apache.solr.client.solrj.impl.HttpSolrClient.executeMethod(HttpSolrClient.java:750)
	at app//org.apache.solr.client.solrj.impl.HttpSolrClient.request(HttpSolrClient.java:254)
	at app//org.apache.solr.client.solrj.impl.HttpSolrClient.request(HttpSolrClient.java:235)
	at app//org.apache.solr.client.solrj.SolrRequest.process(SolrRequest.java:234)
	at app//org.apache.solr.client.solrj.SolrClient.commit(SolrClient.java:465)
	at app//org.apache.solr.client.solrj.SolrClient.commit(SolrClient.java:422)
	at app//org.apache.solr.search.TestCoordinatorRole.testNRTRestart(TestCoordinatorRole.java:316)
	at java.base@11.0.16.1/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base@11.0.16.1/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base@11.0.16.1/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base@11.0.16.1/java.lang.reflect.Method.invoke(Method.java:566)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at app//com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at app//org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at app//com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at app//com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at app//com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at app//org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at app//org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at app//org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at app//org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at app//com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at app//com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base@11.0.16.1/java.lang.Thread.run(Thread.java:829)
Caused by: org.apache.http.NoHttpResponseException: 127.0.0.1:34055 failed to respond
	at app//org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:141)
	at app//org.apache.http.impl.conn.DefaultHttpResponseParser.parseHead(DefaultHttpResponseParser.java:56)
	at app//org.apache.http.impl.io.AbstractMessageParser.parse(AbstractMessageParser.java:259)
	at app//org.apache.http.impl.DefaultBHttpClientConnection.receiveResponseHeader(DefaultBHttpClientConnection.java:163)
	at app//org.apache.http.impl.conn.CPoolProxy.receiveResponseHeader(CPoolProxy.java:157)
	at app//org.apache.http.protocol.HttpRequestExecutor.doReceiveResponse(HttpRequestExecutor.java:273)
	at app//org.apache.http.protocol.HttpRequestExecutor.execute(HttpRequestExecutor.java:125)
	at app//org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:272)
	at app//org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:186)
	at app//org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89)
	at app//org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110)
	at app//org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185)
	at app//org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83)
	at app//org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:56)
	at app//org.apache.solr.client.solrj.impl.HttpSolrClient.executeMethod(HttpSolrClient.java:594)
	... 52 more




Build Log:
[...truncated 9722 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestCoordinatorRole.testNRTRestart (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestCoordinatorRole.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestCoordinatorRole.testNRTRestart" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=947FBCBC6F469356 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 26s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5jabaz46f33ow

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8157 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8157/

All tests passed

Build Log:
[...truncated 1279 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:46477/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-11 04:39:36.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 04:39:36.247; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:46477/solr] to [https://127.0.0.1:46477].
# WARN  - 2023-10-11 04:39:37.044; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 04:39:37.079; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 16482ms
ok 71 start solr with client truststore and security manager in 19559ms
not ok 72 start solr with mTLS needed in 54990ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-iVNLWB/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 46477 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 46477 (pid=3962367). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 46478 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 46478 (pid=3962476). Happy searching!
#
#     INFO  - 2023-10-11 04:40:38.138; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 04:40:38.148; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 04:40:39.070; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 04:40:39.072; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 04:40:39.072; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:39.105 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 77 13 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:24.000 UTC",
#     "not  after"         : "2024-01-09 04:40:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 38 2E 67 C4 C9 6F 96   0F B0 3D 17 53 AD 54 88  .8.g..o...=.S.T.
#         0010: 53 3B 3A C8                                        S;:.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 CD DF 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:18.000 UTC",
#     "not  after"         : "2024-01-09 04:40:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:39.109 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F DF 62 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:16.000 UTC",
#     "not  after"         : "2024-01-09 04:40:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 CD DF 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:18.000 UTC",
#     "not  after"         : "2024-01-09 04:40:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:39.120 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:39.560 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:39.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:39.566 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:39.566 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:39.573 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:39.587 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:39.587 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:39.588 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:39.594 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "59 0F C8 CD 46 39 DE E0 11 39 90 BD AA CD A1 9B 40 3B 95 5E 9F 8A 85 3C 11 C4 E2 7C F0 0D 2A 2A",
#   "session id"          : "A6 F7 0F 9B FF 29 A7 AB 2F AA D3 BF 24 CF 87 C7 61 70 D4 A1 5E 7A A1 36 CB 9B 2D 8F A2 09 13 C8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 70 AA 61 4F E6 33 21 53   E2 23 6C AF E3 1C FF F1  p.aO.3!S.#l.....
#             0010: AD 2F 49 AB 65 92 0F 03   22 AE 2A 4C A0 35 22 72  ./I.e...".*L.5"r
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.714 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "86 7D CF 50 24 DC 69 27 85 27 E3 A7 20 C5 CC 53 1B 4D D4 74 DD 24 E5 CD A7 DC 7C 2D 48 06 A3 30",
#   "session id"          : "A6 F7 0F 9B FF 29 A7 AB 2F AA D3 BF 24 CF 87 C7 61 70 D4 A1 5E 7A A1 36 CB 9B 2D 8F A2 09 13 C8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4B 1D DE CD F8 59 E0 AD   0E 36 BC D4 E1 0A CC ED  K....Y...6......
#           0010: 67 BA 77 CC 2A 86 86 FC   83 F4 BA 87 89 3F 39 77  g.w.*........?9w
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.714 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.714 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.718 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.719 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.719 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.721 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.721 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.721 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.721 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.721 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.722 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.746 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.747 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.748 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:39.762 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:39.763 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.764 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.764 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.764 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.768 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.769 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.771 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:39.772 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.780 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 86 C3 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:20.000 UTC",
#       "not  after"         : "2024-01-09 04:40:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#           0010: D7 07 79 36                                        ..y6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 88 8D 5E 25 72 14 EB   7F 94 6F 15 BC 40 4F 2E  f..^%r....o..@O.
#           0010: D9 72 B5 93                                        .r..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:39.780 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 04:40:40.151 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 04:40:40.151 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 04:40:40.151 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-11 04:40:40.151 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.174 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 CD DF 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:18.000 UTC",
#     "not  after"         : "2024-01-09 04:40:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.186 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9A A0 1C 6A 21 89 42 D6   BB FA A7 14 15 A1 26 BE  ...j!.B.......&.
#     0010: 91 FF 6E BF FA 2F 70 15   B9 27 9F 73 A5 74 7F 4A  ..n../p..'.s.t.J
#     0020: B5 E7 05 3C AB DB 17 5C   6B AF 3E 54 B6 79 FE 4B  ...<...\k.>T.y.K
#     0030: 96 C9 D1 6B 15 D2 2E 97   1D 94 67 8A 51 D3 33 A6  ...k......g.Q.3.
#     0040: 0B BB E8 E3 2D 4A 15 3D   53 DA EA 0C 2D 49 A0 16  ....-J.=S...-I..
#     0050: 60 E1 6B 14 3B AB C7 1B   6A 0F 8F 70 D4 7D 6F C3  `.k.;...j..p..o.
#     0060: 62 0B E2 C2 3D DD D6 4C   83 14 89 EF 29 89 3E A4  b...=..L....).>.
#     0070: 07 E5 02 40 5E FD AA E0   65 5B 1B 7D 36 49 57 1B  ...@^...e[..6IW.
#     0080: 65 D6 77 94 FB 2C C3 6C   C4 11 DA 45 A7 03 EF 9F  e.w..,.l...E....
#     0090: 52 0B 96 AC 3A 8E F9 37   91 7B F4 12 5E 51 56 F5  R...:..7....^QV.
#     00A0: 9E 2A 0C 66 74 DB 13 08   C4 CB 8C 91 58 4F 8E 8F  .*.ft.......XO..
#     00B0: CC 92 C5 12 40 C5 C0 CD   BE 4D 57 6F 08 F8 DE AA  ....@....MWo....
#     00C0: FB 4C 22 17 4C 09 CA 91   D9 B1 C5 E1 8B 5A 21 DA  .L".L........Z!.
#     00D0: 85 9F 17 67 05 8B A0 12   75 3B A2 7B CC 1D 9C 78  ...g....u;.....x
#     00E0: C7 C1 78 3A DD 6E 10 5C   E1 D6 6C 71 87 38 15 8F  ..x:.n.\..lq.8..
#     00F0: C8 6E 44 5F 96 6D F3 45   9B FF C3 8F 73 1C E3 34  .nD_.m.E....s..4
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.187 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D2 86 EB 76 25 E1 19 E7   64 20 B0 34 54 30 36 9C  ...v%...d .4T06.
#     0010: 3F 6F E3 DF 66 1D 8B 32   F4 34 56 46 5B 6A 9A 30  ?o..f..2.4VF[j.0
#     0020: 68 FB B0 20 65 38 12 E5   AC 14 2E 81 CE 5E CC 8C  h.. e8.......^..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.190 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 04:40:40.191 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:40.192 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 04:40:40.192 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:40.192 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 04:40:40.194 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:40.194 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.195 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.202 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 77 13 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:24.000 UTC",
#       "not  after"         : "2024-01-09 04:40:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#           0010: D7 07 79 36                                        ..y6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 38 2E 67 C4 C9 6F 96   0F B0 3D 17 53 AD 54 88  .8.g..o...=.S.T.
#           0010: 53 3B 3A C8                                        S;:.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 CD DF 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:18.000 UTC",
#       "not  after"         : "2024-01-09 04:40:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#           0010: 80 56 26 D0                                        .V&.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#           0010: D7 07 79 36                                        ..y6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.301 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 EB 39 0E 59 D5 EC AD   0B 57 22 62 08 71 06 03  V.9.Y....W"b.q..
#     0010: 9D DA B8 25 4C A7 8E 18   1C 5E 59 B4 D6 EA DD FF  ...%L....^Y.....
#     0020: EE 27 85 42 AD 17 16 EB   BC 51 2C F6 69 8F AD 15  .'.B.....Q,.i...
#     0030: C6 0F 08 58 A0 4C B2 CD   C4 14 4B 64 A7 D7 1E D9  ...X.L....Kd....
#     0040: AD FB BA FC FA 21 4E E3   FA 92 6C 71 2B 6A 64 3F  .....!N...lq+jd?
#     0050: B9 BB 30 8B 78 B9 27 6C   48 71 A5 9E 4B B2 40 86  ..0.x.'lHq..K.@.
#     0060: 48 21 5C 04 55 70 BD EE   1E 70 EC AB 91 A1 F2 2B  H!\.Up...p.....+
#     0070: 44 B8 47 55 6E 6C 2F AB   0A B5 10 A0 95 13 54 8D  D.GUnl/.......T.
#     0080: 87 3C 32 D9 95 4B A8 8F   2A F1 40 5E E1 F8 A7 56  .<2..K..*.@^...V
#     0090: 93 CA 8D 41 2E E4 5D BC   33 D0 0A 31 07 5E BF 51  ...A..].3..1.^.Q
#     00A0: 2C 75 8F 80 C5 DE 51 53   30 7E F6 5E 9E F0 20 EA  ,u....QS0..^.. .
#     00B0: 77 69 8F 23 54 C7 43 A2   3B 26 70 B9 AF 29 A1 49  wi.#T.C.;&p..).I
#     00C0: 84 44 09 B2 F3 27 72 23   B6 6D 1F EB D5 A1 94 5A  .D...'r#.m.....Z
#     00D0: 67 83 B9 A8 35 18 96 6F   B2 0A 0F 88 3D 2E F1 A7  g...5..o....=...
#     00E0: 8C A6 DE 6C 51 8C FC 96   F4 53 BD D9 56 2A B3 52  ...lQ....S..V*.R
#     00F0: 7C D8 23 F0 FB 1B 18 CD   28 C4 C5 4C 57 72 60 73  ..#.....(..LWr`s
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.303 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C9 37 FA B6 F1 2D AA 2F   98 A4 E7 DA 81 FA F4 E6  .7...-./........
#     0010: 70 C1 FA 02 81 DA 52 26   95 D4 F5 0F 63 A0 29 72  p.....R&....c.)r
#     0020: 78 DD 3D F7 36 5C BE AD   BC A1 9F 00 03 CB 06 FA  x.=.6\..........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.306 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:40.416 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7E 3C 97 74 51 22 88 87 F7 04 BD 13 49 7A 95 E5 BF AA BF 57 F6 E7 90 C7 FA DA FF B1 D2 D5 C8 04",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 04:40:41.012 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 04:40:41.013 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-11 04:40:41.178 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-11 04:40:42.088; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 04:40:42.093; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 04:40:42.847; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 04:40:42.849; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 04:40:42.851; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(ca,h=[localhost],a=[],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-iVNLWB/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:42.897 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "51 77 13 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:24.000 UTC",
#     "not  after"         : "2024-01-09 04:40:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 98 38 2E 67 C4 C9 6F 96   0F B0 3D 17 53 AD 54 88  .8.g..o...=.S.T.
#         0010: 53 3B 3A C8                                        S;:.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 CD DF 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:18.000 UTC",
#     "not  after"         : "2024-01-09 04:40:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:42.900 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "6F DF 62 CE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:16.000 UTC",
#     "not  after"         : "2024-01-09 04:40:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 CD DF 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:18.000 UTC",
#     "not  after"         : "2024-01-09 04:40:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:42.912 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:43.092 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:43.092 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:43.094 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:43.094 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:43.098 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:43.109 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:43.109 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:43.109 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:43.111 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "85 F4 0D 5F 1E 63 C8 95 8E 88 C2 19 8B 40 4A 41 2E 8C 57 42 F2 1D C8 EC 14 96 70 12 31 A7 5A CC",
#   "session id"          : "0E B7 25 8D 01 70 4F 53 5D E7 6E 14 49 A6 FD A6 B3 56 00 97 EF F9 3F 01 B5 DA 35 0D FF EA 34 82",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7B 76 04 0A 0E 1A 57 FB   2C E6 7E 94 20 19 1B 55  .v....W.,... ..U
#             0010: 17 30 98 74 C0 CC E4 FB   CA 7D D8 9A FE 7E 07 77  .0.t...........w
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.190 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "03 5F E3 60 2A 23 CD 35 9C D1 49 1B 9D D1 49 A8 6F 29 04 88 BB E3 68 D6 E5 18 49 83 8F 9C 73 23",
#   "session id"          : "0E B7 25 8D 01 70 4F 53 5D E7 6E 14 49 A6 FD A6 B3 56 00 97 EF F9 3F 01 B5 DA 35 0D FF EA 34 82",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A4 AA 23 C7 99 4E 1C 20   C1 DF C8 9D 49 FD 40 39  ..#..N. ....I.@9
#           0010: DF D2 18 72 15 49 33 D9   E7 E6 48 0E 97 80 56 7B  ...r.I3...H...V.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.190 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.191 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.192 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.193 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.195 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.195 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.196 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.196 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.197 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.197 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.197 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.215 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.216 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.217 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.220 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.221 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.224 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.224 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.224 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.224 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.225 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.226 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.226 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.230 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3D 86 C3 45",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:20.000 UTC",
#       "not  after"         : "2024-01-09 04:40:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#           0010: D7 07 79 36                                        ..y6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 66 88 8D 5E 25 72 14 EB   7F 94 6F 15 BC 40 4F 2E  f..^%r....o..@O.
#           0010: D9 72 B5 93                                        .r..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.230 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.295 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 CD DF 97",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 04:40:18.000 UTC",
#     "not  after"         : "2024-01-09 04:40:18.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#         0010: 80 56 26 D0                                        .V&.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#         0010: D7 07 79 36                                        ..y6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.297 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A5 D6 1F FC 73 7E 9A 48   49 80 A3 59 DA D5 9B 8D  ....s..HI..Y....
#     0010: C6 47 57 56 4E 4E 5B 2E   5B B7 DD 0D 5A 43 08 0D  .GWVNN[.[...ZC..
#     0020: B4 A7 02 DB 13 37 45 5E   D4 01 31 FE AD 16 8E 78  .....7E^..1....x
#     0030: 93 5A DF 7C C6 9C 18 C6   C4 9A FB 1E 1E E2 B3 D7  .Z..............
#     0040: 7C E2 4B 72 80 4D 31 F0   29 1C 1A DB 9A 13 E4 FC  ..Kr.M1.).......
#     0050: 67 D9 D5 BE FF 8E 68 17   9E 0C 0C 75 FA A6 9F E6  g.....h....u....
#     0060: 26 FC 73 B9 27 4C D3 6A   5F 92 9E EB 3C 7D 5F AE  &.s.'L.j_...<._.
#     0070: 26 37 0A 5B B2 B7 94 BE   72 0F E9 EE 6D 8D 86 87  &7.[....r...m...
#     0080: 41 1C BB 0C E2 07 26 97   C0 AD 01 1C AA C0 62 37  A.....&.......b7
#     0090: 9C E5 1E AF E3 F5 69 53   8A 2C 26 98 5D 7C 25 DD  ......iS.,&.].%.
#     00A0: FF C1 1A 59 D2 03 5E F8   63 CE 49 8A 55 A2 CA 93  ...Y..^.c.I.U...
#     00B0: 9F 38 3F 01 4A E9 73 E3   E6 B6 7D 90 48 67 73 CB  .8?.J.s.....Hgs.
#     00C0: 11 53 CD CF 95 3B C0 A9   5A 9E 03 64 0F A4 8F A5  .S...;..Z..d....
#     00D0: B4 61 FC 34 18 72 14 19   03 A8 F2 68 B5 EF B3 A8  .a.4.r.....h....
#     00E0: 1C A6 02 3C 5B 6F 70 66   2A FA 26 43 F7 85 CD CB  ...<[opf*.&C....
#     00F0: EB 06 F6 78 67 56 00 20   11 AE 1E 29 55 7E 21 06  ...xgV. ...)U.!.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.299 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 11 B6 61 D8 16 D7 B4 38   EB 32 FB A9 CD D0 16 38  ..a....8.2.....8
#     0010: FA E9 38 21 47 94 93 68   0F 04 E2 C4 6D 37 7E 41  ..8!G..h....m7.A
#     0020: BF 88 4D 95 64 12 D7 39   11 E2 1D DA 86 57 DD 14  ..M.d..9.....W..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.300 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 04:40:43.301 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.301 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 04:40:43.301 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.302 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 04:40:43.302 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:43.302 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.302 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.304 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "51 77 13 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:24.000 UTC",
#       "not  after"         : "2024-01-09 04:40:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#           0010: D7 07 79 36                                        ..y6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 98 38 2E 67 C4 C9 6F 96   0F B0 3D 17 53 AD 54 88  .8.g..o...=.S.T.
#           0010: 53 3B 3A C8                                        S;:.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 CD DF 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:18.000 UTC",
#       "not  after"         : "2024-01-09 04:40:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#           0010: 80 56 26 D0                                        .V&.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#           0010: D7 07 79 36                                        ..y6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.327 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9F 5E C5 31 DF 9D 36 7B   41 A2 2D 0A 61 F0 EC 19  .^.1..6.A.-.a...
#     0010: 73 DE 92 6F B4 15 1F F6   1D A8 EB 6E 9F 40 48 E2  s..o.......n.@H.
#     0020: EC 48 4B F0 8A EE E8 36   81 AE 2E 1C DA C1 1D D3  .HK....6........
#     0030: 06 85 53 57 15 1C DC BD   24 8D A6 F9 B3 0A CB 95  ..SW....$.......
#     0040: E3 ED 38 29 5B 41 80 A2   C7 19 11 18 57 26 8D 30  ..8)[A......W&.0
#     0050: 90 E3 0F A2 A4 92 E6 F9   25 88 27 7A 78 5B F4 AF  ........%.'zx[..
#     0060: 3D 37 AE 7B 0E 2C A8 F2   A7 27 4D 9A 37 8D 58 AD  =7...,...'M.7.X.
#     0070: CD 81 B4 C2 86 E2 2F F8   13 57 56 39 09 DF 8D EB  ....../..WV9....
#     0080: FE B7 F4 75 CD E3 54 1E   16 5A BF A1 8D FD 7F A9  ...u..T..Z......
#     0090: B3 CC 27 91 31 43 70 72   80 32 83 AD 54 88 75 AC  ..'.1Cpr.2..T.u.
#     00A0: 2E 3D 34 1C E3 F5 21 85   12 B1 D9 49 29 6D 23 F1  .=4...!....I)m#.
#     00B0: E1 28 4F 34 48 55 9D B4   CE F6 92 46 95 10 B9 26  .(O4HU.....F...&
#     00C0: 39 3D 63 F9 91 7B 0A 50   12 7C E1 1B E6 A2 55 08  9=c....P......U.
#     00D0: A3 D6 4B 44 CF B3 08 04   AE BF C3 BB E6 CA 7C CF  ..KD............
#     00E0: 31 2C FF FF 85 C3 59 B9   87 C5 2A 3F C8 EB C0 5D  1,....Y...*?...]
#     00F0: CD 10 24 49 24 17 BC 00   A9 2A B9 3C 3C BB 23 DF  ..$I$....*.<<.#.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.328 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FA 0B BB 05 4F 2B 5B 49   13 4E E9 4B 19 69 44 A1  ....O+[I.N.K.iD.
#     0010: 5E D5 EC 1B 97 1E 86 26   97 03 79 83 9B 76 94 03  ^......&..y..v..
#     0020: 75 4E 2A A0 E6 8E A9 1E   07 3B 6A 9E 86 5D 9E D8  uN*......;j..]..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:43.329 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-11 04:40:43.391 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "49 40 00 66 6F 03 83 24 79 81 AB 09 4A 0F B0 E2 4B A5 B1 10 3A 83 2B 95 1D B8 C9 18 35 DF 16 83",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-11 04:40:43.671 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 04:40:43.671 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 04:40:43.671 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-11 04:40:57.075; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:57.395 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6F DF 62 CE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:16.000 UTC",
#       "not  after"         : "2024-01-09 04:40:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#           0010: 80 56 26 D0                                        .V&.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 CD DF 97",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 04:40:18.000 UTC",
#       "not  after"         : "2024-01-09 04:40:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B AB 4F F4 11 F5 F7 68   3F 0B 6C 59 C8 1F 5E A1  ..O....h?.lY..^.
#           0010: 80 56 26 D0                                        .V&.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7E 58 EB 52 3E D9 85 7D   66 85 0C 29 2A 92 85 BF  .X.R>...f..)*...
#           0010: D7 07 79 36                                        ..y6
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 04:40:57.422 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:57.984 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:57.984 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:57.988 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 04:40:57.989 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:57.993 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:58.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:58.008 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:58.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 04:40:58.010 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "52 2B 5F D0 E4 17 99 B1 61 BF B9 8D D0 66 06 E9 E4 CC F7 AD 0F A5 CC 82 79 9E 03 06 65 BC D9 8B",
#     "session id"          : "51 D1 AE DB 4E D6 21 D7 6D C4 D8 8C 90 31 3B 7C 58 AB BA 1E CF BB 97 5A A7 F9 B5 62 03 29 C3 D1",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E5 76 74 F5 6D D7 99 D3   A9 69 7F D9 3C 66 43 84  .vt.m....i..<fC.
#               0010: F2 0B F0 1E 0E BA F0 CB   F3 40 87 6B 14 7D 9B 4E  .........@.k...N
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.033 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8F C4 DE 23 CB DA 5A D2 C7 4B 7E CE 6C 56 D8 DA 0B F5 8F A0 D2 7E D4 70 FE DD 84 8C 57 12 87 CF",
#     "session id"          : "51 D1 AE DB 4E D6 21 D7 6D C4 D8 8C 90 31 3B 7C 58 AB BA 1E CF BB 97 5A A7 F9 B5 62 03 29 C3 D1",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4F 8B D5 49 01 C7 9B 34   F9 5C A4 15 B5 E4 44 2D  O..I...4.\....D-
#             0010: 05 B8 55 DD 36 E6 43 BE   B9 7A 2B 38 13 3C 95 21  ..U.6.C..z+8.<.!
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.034 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.034 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.035 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.035 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.037 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.037 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.037 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.038 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.044 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.045 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.046 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:58.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:58.055 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.056 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.056 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.056 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.056 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.057 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.057 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 04:40:58.057 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 04:40:58.061 

[...truncated too long message...]

LEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14283ms
ok 75 stop command for single port in 16922ms
not ok 76 status detects locally running solr in 1413ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7151ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1414ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2803ms
ok 80 copying files around in 6337ms
ok 81 upconfig in 2575ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1224ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1217ms
not ok 84 Cleanup in 2396ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 43s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/hwnkd4okb32a6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8156 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8156/

All tests passed

Build Log:
[...truncated 1278 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32949/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-11 01:30:27.058; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 01:30:27.063; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:32949/solr] to [https://127.0.0.1:32949].
# WARN  - 2023-10-11 01:30:27.794; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-11 01:30:27.828; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 16499ms
ok 71 start solr with client truststore and security manager in 19666ms
not ok 72 start solr with mTLS needed in 53557ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-QkKpxa/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 32949 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32949 (pid=3495768). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 32950 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 32950 (pid=3495883). Happy searching!
#
#     INFO  - 2023-10-11 01:31:29.039; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 01:31:29.045; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 01:31:29.822; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 01:31:29.826; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 01:31:29.828; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:29.876 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 79 F2 2E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:15.000 UTC",
#     "not  after"         : "2024-01-09 01:31:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 B8 50 AC E7 F2 DC 9C   30 1C DE B2 5C 20 3C C0  w.P.....0...\ <.
#         0010: BC 8C 6B 60                                        ..k`
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 AC 19 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:09.000 UTC",
#     "not  after"         : "2024-01-09 01:31:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:29.880 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 9C DB 53",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:07.000 UTC",
#     "not  after"         : "2024-01-09 01:31:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 AC 19 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:09.000 UTC",
#     "not  after"         : "2024-01-09 01:31:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:29.896 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:30.651 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:30.651 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:30.652 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:30.653 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:30.662 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:30.690 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:30.690 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:30.690 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:30.705 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0A EF 01 8B CE 58 20 1C 80 67 A4 02 EE 51 58 A5 6D DD 58 26 B0 9A 83 48 03 8E 79 F2 BE CA BF 1D",
#   "session id"          : "2A 26 7E BF DD 29 19 3F CC 56 79 C2 8D 16 3A BA A9 EC D1 B0 87 71 E7 27 D3 00 54 D1 76 E9 18 72",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 89 CC 2D A9 DD 69 B0 C3   AA 23 4B F6 CF 21 7B 26  ..-..i...#K..!.&
#             0010: D9 AB D3 9C 6B FF 88 8D   3C 28 63 31 38 DF 36 2F  ....k...<(c18.6/
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.169 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "C0 6B 89 CD EF AB 0C A4 9B F5 DA 97 A4 93 0D 72 B1 47 D7 75 44 A4 43 14 D1 48 8E 6A 7D 9F FB BE",
#   "session id"          : "2A 26 7E BF DD 29 19 3F CC 56 79 C2 8D 16 3A BA A9 EC D1 B0 87 71 E7 27 D3 00 54 D1 76 E9 18 72",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1A D8 40 33 2E F8 5A 96   5F AD 54 B2 CA C9 39 A9  ..@3..Z._.T...9.
#           0010: 2E B6 89 53 F3 66 8F 47   40 84 AC B7 F3 4E E0 45  ...S.f.G@....N.E
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.169 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.170 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.171 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.172 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.172 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.177 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.177 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.180 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.180 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.182 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.192 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.197 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.198 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.202 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.202 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.202 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.202 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.202 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.202 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.203 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.203 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.203 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.204 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.205 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.205 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.205 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.206 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.206 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.206 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.219 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 9D B8 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:11.000 UTC",
#       "not  after"         : "2024-01-09 01:31:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#           0010: 60 E6 94 11                                        `...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 92 41 7E E2 B8 AA 92   8C 36 A5 2F FF 06 49 CB  $.A......6./..I.
#           0010: A6 1B 10 6E                                        ...n
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.219 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.680 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 AC 19 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:09.000 UTC",
#     "not  after"         : "2024-01-09 01:31:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.687 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 99 13 A1 52 25 4C AC C8   E2 D6 F0 F3 DC 4D 07 D0  ...R%L.......M..
#     0010: 93 FC 21 B5 7F 6D 8D 0F   FB CA E1 41 9C D3 34 2D  ..!..m.....A..4-
#     0020: 56 DB 5B 80 CE F8 A2 EF   01 CF 18 16 FD BA CB 69  V.[............i
#     0030: 57 B6 61 E3 B2 43 33 24   9F 5C AE 92 55 5B 9D D9  W.a..C3$.\..U[..
#     0040: 61 48 59 70 B7 DB 08 E9   A5 B8 4D 55 E3 9C D8 CB  aHYp......MU....
#     0050: 55 24 D2 B0 CB DE 48 AF   EA 6E 6A 36 03 1A E8 77  U$....H..nj6...w
#     0060: 75 B4 97 91 DC 7C 7B 15   B8 14 C8 12 E9 E4 0F 85  u...............
#     0070: 3F 46 0C BC 61 03 CC 68   D4 C2 92 6B D1 CE 87 3E  ?F..a..h...k...>
#     0080: 2A 08 53 46 9D D7 4E C5   0E F6 4D 07 7C 3F 8D 5B  *.SF..N...M..?.[
#     0090: 96 14 4E 8B 52 CB 52 E6   25 C4 1A 38 EA BD 6E 1D  ..N.R.R.%..8..n.
#     00A0: 50 BE 41 DC A8 D6 1A 92   57 E4 8B 4D 4D F9 B4 A4  P.A.....W..MM...
#     00B0: 7F 96 A1 5D 80 2F BE 9F   F1 2B 77 84 F1 08 CF 04  ...]./...+w.....
#     00C0: 92 84 7D 7B B6 19 AF 9B   04 E6 42 92 9B 1B 81 8F  ..........B.....
#     00D0: 01 7F C6 4D 52 9D 45 A1   BC E1 C9 A6 6E 66 94 30  ...MR.E.....nf.0
#     00E0: 16 B7 F1 1F FF C5 78 52   38 90 47 4F 5F 29 1F 96  ......xR8.GO_)..
#     00F0: 9A A5 1B AD DE 47 1F 7E   B4 36 8D 21 DE 3D FF 0D  .....G...6.!.=..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.688 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 42 7A 91 A0 CE 3C 4A A2   E8 14 CC 97 CB 37 7E 57  Bz...<J......7.W
#     0010: 03 40 24 84 CC C0 3A 19   B3 D6 20 A6 24 11 8C D6  .@$...:... .$...
#     0020: A1 E5 4C 6E E4 E7 9B 8E   29 11 5B 4F 88 86 B0 C6  ..Ln....).[O....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.696 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 01:31:31.696 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.697 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 01:31:31.697 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.697 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 01:31:31.697 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:31.697 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.697 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.703 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 79 F2 2E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:15.000 UTC",
#       "not  after"         : "2024-01-09 01:31:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#           0010: 60 E6 94 11                                        `...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 B8 50 AC E7 F2 DC 9C   30 1C DE B2 5C 20 3C C0  w.P.....0...\ <.
#           0010: BC 8C 6B 60                                        ..k`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 AC 19 DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:09.000 UTC",
#       "not  after"         : "2024-01-09 01:31:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#           0010: 57 9F 74 16                                        W.t.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#           0010: 60 E6 94 11                                        `...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.747 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2D EA 5C 9A 25 AF 9F C6   15 5A 4D 0E 72 1D 70 DD  -.\.%....ZM.r.p.
#     0010: 35 48 8F 5A 8C 0A 3C C9   F5 20 F1 B4 A8 AF F0 8D  5H.Z..<.. ......
#     0020: 46 AF 7E 55 53 CD 21 B3   0B AD 32 34 40 44 80 1E  F..US.!...24@D..
#     0030: 8A DB DC F0 AB 90 DD 3D   24 6B 2C A7 3C 3F 2B 71  .......=$k,.<?+q
#     0040: A3 24 5C 7D F2 7A 0F CA   EA A8 47 C1 12 28 71 1A  .$\..z....G..(q.
#     0050: 2D A2 7D 9D 2B EF 9F B0   81 7E 41 E5 AC 07 C1 A4  -...+.....A.....
#     0060: 14 D3 65 41 8F 32 E8 3A   49 BA 68 F4 FA 9F 20 46  ..eA.2.:I.h... F
#     0070: BE 17 0E 11 C7 A5 1A EC   A3 41 2C 45 AE 37 10 44  .........A,E.7.D
#     0080: 0B 26 F1 80 11 63 93 4D   24 A1 87 E6 25 3C F9 41  .&...c.M$...%<.A
#     0090: 77 3C 45 2C A4 1F 75 60   7C B3 31 DA 48 37 15 37  w<E,..u`..1.H7.7
#     00A0: 9D 2A 02 F0 67 B6 0D CC   7C 76 09 72 C1 D9 5B 07  .*..g....v.r..[.
#     00B0: 3E BF 45 91 5C B6 CB E8   E5 DB 5B F5 DC 95 E2 9B  >.E.\.....[.....
#     00C0: 9E 60 77 E5 30 4F 2E 1C   BF 62 FB 81 FB F6 2E 8A  .`w.0O...b......
#     00D0: 43 A7 D3 31 2C 7A 01 CC   5C 78 CE CF D9 97 6D FD  C..1,z..\x....m.
#     00E0: 50 B1 B3 87 01 6F 54 19   8E 7E 3A 68 B5 0E FF B0  P....oT...:h....
#     00F0: 43 AF 94 1E C3 01 19 BF   3D BE AB 06 FF 3E D3 16  C.......=....>..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.748 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 86 BE 4D 85 5E 4C BD 87   91 85 46 DE CF 80 26 50  ..M.^L....F...&P
#     0010: 03 21 6D 11 56 49 F5 39   33 33 A1 71 30 ED 70 1B  .!m.VI.933.q0.p.
#     0020: AB D0 70 2C 21 A4 83 8B   D7 1D 27 9B EB 9D 6F 69  ..p,!.....'...oi
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.749 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:31.849 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0B 40 CD C6 A7 8D E6 2A 9A E2 2A 92 0E 35 18 73 E3 ED 5E 7C 27 C9 77 68 13 D5 5D 8B 42 07 36 DF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 01:31:32.746 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 01:31:32.747 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-11 01:31:33.738; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-11 01:31:33.742; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-11 01:31:34.207; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 01:31:34.209; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-11 01:31:34.210; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-QkKpxa/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:34.341 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0B 79 F2 2E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:15.000 UTC",
#     "not  after"         : "2024-01-09 01:31:15.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 B8 50 AC E7 F2 DC 9C   30 1C DE B2 5C 20 3C C0  w.P.....0...\ <.
#         0010: BC 8C 6B 60                                        ..k`
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 AC 19 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:09.000 UTC",
#     "not  after"         : "2024-01-09 01:31:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:34.345 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 9C DB 53",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:07.000 UTC",
#     "not  after"         : "2024-01-09 01:31:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 AC 19 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:09.000 UTC",
#     "not  after"         : "2024-01-09 01:31:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:34.356 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:34.507 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:34.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:34.509 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:34.509 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:34.513 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:34.523 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:34.523 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:34.524 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:34.525 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7C E0 FF CD FE 45 FF 0D B6 CC 4E 2D 19 9E 0E 20 9F 8D 12 C6 49 EC E4 31 DC D8 E3 1C 17 32 D7 21",
#   "session id"          : "43 F7 B2 2C 53 E6 24 64 B3 27 4F E4 D4 B8 8D 1F DE D1 25 15 7E A8 85 FD A9 77 36 6D 3B 7D 93 FE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D5 0F BB 43 18 3E 11 28   42 CC 23 9B EF DC B7 AB  ...C.>.(B.#.....
#             0010: 4B 5C 37 C6 60 74 5E A8   A1 C8 AE B8 7C 1B 01 7E  K\7.`t^.........
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.617 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 F2 BB 21 69 1C 04 EA 1D 1D 2C CA 65 D1 22 21 99 70 97 34 71 9D 08 CA B8 5D A3 AE 86 82 9E 6F",
#   "session id"          : "43 F7 B2 2C 53 E6 24 64 B3 27 4F E4 D4 B8 8D 1F DE D1 25 15 7E A8 85 FD A9 77 36 6D 3B 7D 93 FE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7B 8C FD C4 E2 9B C9 72   0B 09 74 04 8A 7F 90 CB  .......r..t.....
#           0010: 0F 05 08 06 38 B0 90 55   F8 72 34 EC 52 7F E8 17  ....8..U.r4.R...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.617 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.617 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.620 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.624 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.627 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.628 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.638 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.640 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.641 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.649 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.650 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.650 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.651 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.651 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.651 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.654 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.654 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.654 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.655 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.656 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.656 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.656 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.659 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6C 9D B8 D6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:11.000 UTC",
#       "not  after"         : "2024-01-09 01:31:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#           0010: 60 E6 94 11                                        `...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 24 92 41 7E E2 B8 AA 92   8C 36 A5 2F FF 06 49 CB  $.A......6./..I.
#           0010: A6 1B 10 6E                                        ...n
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.660 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.730 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 AC 19 DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-11 01:31:09.000 UTC",
#     "not  after"         : "2024-01-09 01:31:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#         0010: 57 9F 74 16                                        W.t.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#         0010: 60 E6 94 11                                        `...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.733 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 71 BD 84 40 C8 8A D5 8D   EF 61 B4 3F AE 38 35 E3  q..@.....a.?.85.
#     0010: 55 73 CF 4C 3C F6 B9 EF   7D 99 81 FA 34 2F 8C 4E  Us.L<.......4/.N
#     0020: 75 83 15 96 59 1E 9A DB   96 C3 AF DA 09 EB E0 B2  u...Y...........
#     0030: 73 99 76 E9 BA 52 A1 E6   38 D7 52 11 51 5B DB 33  s.v..R..8.R.Q[.3
#     0040: 24 58 8E 13 53 89 06 E2   9C DE D2 35 D5 69 B0 FE  $X..S......5.i..
#     0050: 5B 88 B9 3A FD 69 DC E6   31 EF A2 A2 F7 8F C6 B8  [..:.i..1.......
#     0060: 14 7F 29 5F 4B 1F 50 9E   54 02 B9 BA 76 B6 B0 2D  ..)_K.P.T...v..-
#     0070: 4B 6E 9C 95 4A 86 1F 1C   0B 9B 37 CF 29 41 66 F9  Kn..J.....7.)Af.
#     0080: BC C3 A5 D8 2D 6D 24 B1   59 DB E2 D2 5D 59 2A 60  ....-m$.Y...]Y*`
#     0090: D3 B7 02 85 EE F4 C6 4E   87 76 04 EE E8 28 79 07  .......N.v...(y.
#     00A0: 9A 6B EA 9E 82 D4 35 30   6F F3 83 A9 3A 79 63 3B  .k....50o...:yc;
#     00B0: DC 54 24 74 DD 6F 63 1B   31 2A 32 68 9F A8 10 6F  .T$t.oc.1*2h...o
#     00C0: 1A 44 C2 F1 D3 00 74 BF   C0 F8 41 49 66 C8 93 4A  .D....t...AIf..J
#     00D0: DA 8E 2A 7D C5 95 18 78   F7 25 7E BF 59 6A 42 2D  ..*....x.%..YjB-
#     00E0: FE 5B 27 EB 83 43 AA 6D   7E D5 B1 7D C5 AF 0B D1  .['..C.m........
#     00F0: 66 CF 63 64 C3 33 A0 9E   65 66 42 8B E2 22 98 2C  f.cd.3..efB..".,
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.734 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EA FB 75 14 E2 98 29 03   64 AB 5B AE 1D C6 6B AF  ..u...).d.[...k.
#     0010: F2 C1 EF FA E8 44 55 46   98 DD DD D8 D3 73 9A 16  .....DUF.....s..
#     0020: 5C DD 66 77 3A 51 3A 02   AB E9 E9 6B B6 72 A8 AF  \.fw:Q:....k.r..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.822 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 01:31:34.823 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.823 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 01:31:34.823 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.823 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-11 01:31:34.823 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:34.823 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.824 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.848 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0B 79 F2 2E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:15.000 UTC",
#       "not  after"         : "2024-01-09 01:31:15.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#           0010: 60 E6 94 11                                        `...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 B8 50 AC E7 F2 DC 9C   30 1C DE B2 5C 20 3C C0  w.P.....0...\ <.
#           0010: BC 8C 6B 60                                        ..k`
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 AC 19 DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:09.000 UTC",
#       "not  after"         : "2024-01-09 01:31:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#           0010: 57 9F 74 16                                        W.t.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#           0010: 60 E6 94 11                                        `...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.870 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 69 6C 21 65 B1 E5 F5 EB   B7 99 E6 2D 8D E8 9F 6C  il!e.......-...l
#     0010: 16 89 AE 04 F0 97 F4 50   A0 06 5B 28 85 BB 12 C2  .......P..[(....
#     0020: 54 D3 B5 08 2B 1D 84 34   73 2A 79 A3 56 04 74 2D  T...+..4s*y.V.t-
#     0030: 4D 7D 34 8F 3C 18 90 05   84 F7 62 E0 76 F7 5E 22  M.4.<.....b.v.^"
#     0040: 54 67 A0 37 0C 78 C2 33   00 42 C1 62 A2 9B D7 9D  Tg.7.x.3.B.b....
#     0050: 1F 1A 95 82 53 5A 24 DE   89 58 42 F0 50 DC B3 ED  ....SZ$..XB.P...
#     0060: BE 6C E7 DB 3E 6F 18 71   94 84 38 2F 78 8B 85 07  .l..>o.q..8/x...
#     0070: 41 2B 44 64 63 7A F1 55   B3 8A 85 62 59 0A 28 6D  A+Ddcz.U...bY.(m
#     0080: C5 15 A1 1E 4B 8C E1 07   37 92 B2 AF CC 95 21 19  ....K...7.....!.
#     0090: 6F 2A CB C6 67 B7 D4 BD   B1 04 0C C2 BC E5 6E 26  o*..g.........n&
#     00A0: 3C 59 3C B9 3E 3F 6D 09   94 DA F9 E8 0C D3 C8 41  <Y<.>?m........A
#     00B0: D6 3B 6B 53 93 66 B1 F4   DD B6 70 16 DA 96 B5 F8  .;kS.f....p.....
#     00C0: 6A 83 62 AA 44 AC 90 02   08 FB 86 16 89 39 7B 7A  j.b.D........9.z
#     00D0: 73 EF 88 F6 B8 1A 00 7F   63 31 3C 29 1D 2E 4A E8  s.......c1<)..J.
#     00E0: 13 F2 6F C6 04 4D D2 4A   9D 79 2C 14 07 23 CC 86  ..o..M.J.y,..#..
#     00F0: D7 81 12 9D 76 8E FC 68   39 C8 89 63 1C 8E 6B 02  ....v..h9..c..k.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.871 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C9 48 8C 35 79 FF 25 C0   7E AD 1A 05 8D FF B8 D6  .H.5y.%.........
#     0010: B8 5E 36 A2 03 19 8F 77   8D 57 55 17 51 CD 2D 46  .^6....w.WU.Q.-F
#     0020: 34 CC EF 85 43 61 31 A4   3D 82 34 8D 58 98 4C DB  4...Ca1.=.4.X.L.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.872 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:34.928 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DD 7F 6B 9B 60 11 FD 98 B9 34 E7 45 D1 08 23 38 B2 16 70 23 79 EB 0A A5 C8 8F 93 73 18 72 ED CA",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-11 01:31:35.202 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-11 01:31:35.203 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-11 01:31:48.211; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:48.556 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 9C DB 53",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:07.000 UTC",
#       "not  after"         : "2024-01-09 01:31:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#           0010: 57 9F 74 16                                        W.t.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 AC 19 DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-11 01:31:09.000 UTC",
#       "not  after"         : "2024-01-09 01:31:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 78 80 4E 30 E9 85 D4 99   BE F7 02 EF 73 6C 28 33  x.N0........sl(3
#           0010: 57 9F 74 16                                        W.t.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A 7A A8 40 5D 7D A2 D7   20 6C 3C 39 93 E5 ED 27  *z.@]... l<9...'
#           0010: 60 E6 94 11                                        `...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-11 01:31:48.569 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:48.872 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:48.872 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:48.874 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-11 01:31:48.874 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:48.879 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:48.890 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:48.891 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:48.891 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-11 01:31:48.893 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "AF 07 55 8E 92 DC 4D 51 B1 B4 39 8D B1 E4 09 9C 52 70 C5 17 7D 39 07 5A 63 35 EC DF DD 10 3F 93",
#     "session id"          : "5B A0 AA F8 06 A6 F0 D6 A5 A7 D0 A6 CE 04 A3 B8 8E 7A D4 A9 5F 6A F0 1D 98 E6 17 9D 3F 90 D9 49",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7D 59 7F 97 F7 8D 38 DE   FF 2B E4 B5 7F 8A 2F 1C  .Y....8..+..../.
#               0010: EA 6D D6 77 A8 11 A9 48   A5 B3 00 A4 F3 D1 98 12  .m.w...H........
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.919 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "1B D2 66 72 7E 7C 8F 82 AF B8 3C D8 A0 48 6C B8 9C 88 BA 6E F9 B9 3B 52 B0 6D 3E 1C 8A E9 9A B9",
#     "session id"          : "5B A0 AA F8 06 A6 F0 D6 A5 A7 D0 A6 CE 04 A3 B8 8E 7A D4 A9 5F 6A F0 1D 98 E6 17 9D 3F 90 D9 49",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 3F AC 26 0F F7 F2 26 E1   9C 22 24 16 8A 75 7B 70  ?.&...&.."$..u.p
#             0010: 71 F8 1B 6F 0A D2 0C 22   41 DD 09 41 35 E1 A2 58  q..o..."A..A5..X
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.920 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.920 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.921 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.922 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.923 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.923 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.928 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.929 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.929 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:48.930 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:48.930 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.936 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.937 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.942 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.946 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.946 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.946 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.947 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.947 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.949 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.949 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:48.949 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:48.949 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.951 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.953 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.954 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.955 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-11 01:31:48.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-11 01:31:48.960 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "6C 9D B8 D6",
#         "signature algorithm": "SHA256withRSA",
#         "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#         "not before"         : "2023-10-11 01:31:11.000 UTC",
#         "not  after"         : "2024-01-09 01:31:11.000 UTC",
#         "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#         "subject public key" : "RSA",
#         "extensions"         : [
#           {
#             ObjectId: 2.5.29.35 Criticality=false

[...truncated too long message...]

gineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14132ms
ok 75 stop command for single port in 17230ms
not ok 76 status detects locally running solr in 1502ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7466ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1474ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2728ms
ok 80 copying files around in 6508ms
ok 81 upconfig in 2658ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1232ms
not ok 84 Cleanup in 2490ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 4m 13s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/pub4375fnhaag

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8155 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8155/

All tests passed

Build Log:
[...truncated 1401 lines...]
BUILD FAILED in 1h 2m 4s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7m2gb55owultg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8154 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8154/

All tests passed

Build Log:
[...truncated 1447 lines...]
BUILD FAILED in 1h 3m 39s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/wtefvecjd7ht2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8153 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8153/

All tests passed

Build Log:
[...truncated 1445 lines...]
BUILD FAILED in 1h 3m 16s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/tzw5abkdapjvc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8152 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8152/

All tests passed

Build Log:
[...truncated 1443 lines...]
BUILD FAILED in 1h 3m 10s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/qw3vacve7ee4w

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8151 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8151/

All tests passed

Build Log:
[...truncated 1278 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:44255/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-10 08:37:05.326; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 08:37:05.330; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10461ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 44255 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44255 (pid=2030042). Happy searching!
#
#     INFO  - 2023-10-10 08:37:12.487; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 08:37:12.492; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-10 08:37:15.528; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 08:37:15.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 18171ms
not ok 72 start solr with mTLS needed in 54820ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-PkugTG/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 44255 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44255 (pid=2031784). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 44256 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 44256 (pid=2031909). Happy searching!
#
#     INFO  - 2023-10-10 08:37:59.120; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 08:37:59.359; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 08:37:59.993; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 08:37:59.995; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 08:37:59.995; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:00.026 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F2 82 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:45.000 UTC",
#     "not  after"         : "2024-01-08 08:37:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 75 6C CB 58 CA F5 4B   BE DD 7B C9 24 3C 00 8C  .ul.X..K....$<..
#         0010: 4B 7D 8A 5C                                        K..\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 59 F9 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:39.000 UTC",
#     "not  after"         : "2024-01-08 08:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:00.031 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 19 23 C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:37.000 UTC",
#     "not  after"         : "2024-01-08 08:37:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 59 F9 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:39.000 UTC",
#     "not  after"         : "2024-01-08 08:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:00.441 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:00.692 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:00.692 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:00.695 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:00.695 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:00.706 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:00.722 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:00.723 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:00.723 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:00.730 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "14 F0 70 BA 53 3A A0 AA AA A7 44 15 49 46 53 2B 3B 66 D9 62 EE 59 3D A9 45 6B AD D2 DD A6 E9 98",
#   "session id"          : "DA E5 E7 3E BA 4E 10 25 D9 EC 9C 82 48 42 B5 38 CC 08 11 F0 C4 0F C2 9A 86 29 CB E6 C7 DC 79 49",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CE 09 CC A3 12 8C 30 F8   D4 F2 4E 80 BC 2C 4F B5  ......0...N..,O.
#             0010: E9 61 09 F1 43 91 D0 4F   3E 5E CB AE D5 E7 50 2B  .a..C..O>^....P+
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.865 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CA 93 C2 9D 3B 2A 51 E2 D7 45 07 7B F9 0F 51 77 51 49 96 FE 1E B7 56 8C BA 39 BE 04 A1 F1 9D 9E",
#   "session id"          : "DA E5 E7 3E BA 4E 10 25 D9 EC 9C 82 48 42 B5 38 CC 08 11 F0 C4 0F C2 9A 86 29 CB E6 C7 DC 79 49",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5F BE 69 33 78 CF 16 3F   2C EF EF 04 10 F1 DD BA  _.i3x..?,.......
#           0010: 8B 19 05 EF 98 64 B5 5C   F2 97 B5 9D 2A 03 89 09  .....d.\....*...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.866 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.866 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.867 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.868 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.869 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.869 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.869 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.870 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:00.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:00.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.887 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.888 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.889 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.892 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.892 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.892 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.892 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.892 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.892 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.893 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:00.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:00.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:00.910 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.116 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.129 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.129 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.130 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.130 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:01.131 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.142 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 44 0C B4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:41.000 UTC",
#       "not  after"         : "2024-01-08 08:37:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#           0010: 6D 27 88 BC                                        m'..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 57 91 73 B4 F0 F1 43   D9 64 94 4F F4 37 A9 CD  .W.s...C.d.O.7..
#           0010: 88 8D AC 32                                        ...2
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.142 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 08:38:01.254 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 08:38:01.257 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 08:38:01.258 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-10 08:38:01.258 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.271 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 59 F9 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:39.000 UTC",
#     "not  after"         : "2024-01-08 08:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.302 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 C6 F7 5C 19 63 F7 7C   BD 7F A5 49 6C 58 42 D7  V..\.c.....IlXB.
#     0010: DB AD 48 E2 ED 3A 1D B0   0B 79 6D D9 F7 34 FC B6  ..H..:...ym..4..
#     0020: 8C CE 7B 54 80 FF 2E 37   B6 A0 94 43 A5 24 27 16  ...T...7...C.$'.
#     0030: 37 21 01 38 5C 64 AC 8D   4C F8 87 F2 8C 4B FB 37  7!.8\d..L....K.7
#     0040: CD 12 9B DB DB A0 62 B6   01 64 84 02 E2 FD 08 FB  ......b..d......
#     0050: 16 FA EB 6F 4E 08 75 85   B8 C0 3A C5 11 F0 7A CE  ...oN.u...:...z.
#     0060: 64 07 61 03 90 21 07 0A   55 FF FA CE 44 F9 5F 28  d.a..!..U...D._(
#     0070: 3C FD FA 22 CB 9E 1E BD   32 BB E3 20 D5 F6 E6 CD  <.."....2.. ....
#     0080: 3A 40 02 09 46 5B E6 E6   B3 A1 A6 C2 81 AB 24 E3  :@..F[........$.
#     0090: D0 1E B9 10 D8 AD 04 65   99 A1 1E F6 C2 8B 21 F8  .......e......!.
#     00A0: B5 33 7C 06 29 91 65 63   2D 98 A9 68 2B E1 E8 3C  .3..).ec-..h+..<
#     00B0: AC DC 22 ED 90 B0 31 95   57 47 7B 7A A2 B6 F1 1C  .."...1.WG.z....
#     00C0: F4 9D 57 96 A0 A5 C6 CB   23 51 C0 49 3E 9C 50 9A  ..W.....#Q.I>.P.
#     00D0: C0 7D F3 48 5A 58 EC AF   E6 55 5F 74 98 6E A9 93  ...HZX...U_t.n..
#     00E0: 5B 1C A3 07 34 49 69 FB   10 E2 13 63 C0 15 DC EC  [...4Ii....c....
#     00F0: 46 1F FF 06 50 BA 29 48   10 A7 DC 8E BD D5 44 A6  F...P.)H......D.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.303 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 77 DD 4D 68 72 3B 82 A6   0C 92 5D B1 35 EC 52 34  w.Mhr;....].5.R4
#     0010: 47 73 58 85 7A 64 9C 6E   B1 AB 17 19 A4 A4 5D CE  GsX.zd.n......].
#     0020: F7 5E B5 30 61 2E 08 30   24 7D 84 B2 11 16 A5 52  .^.0a..0$......R
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.316 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-10 08:38:01.317 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:01.317 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-10 08:38:01.317 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:01.317 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-10 08:38:01.318 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:01.318 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.318 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.319 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 F2 82 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:45.000 UTC",
#       "not  after"         : "2024-01-08 08:37:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#           0010: 6D 27 88 BC                                        m'..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 75 6C CB 58 CA F5 4B   BE DD 7B C9 24 3C 00 8C  .ul.X..K....$<..
#           0010: 4B 7D 8A 5C                                        K..\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 59 F9 E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:39.000 UTC",
#       "not  after"         : "2024-01-08 08:37:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#           0010: 37 61 7C 96                                        7a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#           0010: 6D 27 88 BC                                        m'..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.382 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 50 9A CD 91 48 4D 13 46   00 6A 34 CC 1B 30 B0 BF  P...HM.F.j4..0..
#     0010: 09 BF D3 6B 11 2E 30 19   70 91 34 62 81 7C B7 A7  ...k..0.p.4b....
#     0020: 1F 22 58 B9 6C CF 83 B8   59 EF 04 A1 F6 B2 F9 7D  ."X.l...Y.......
#     0030: 41 61 CA 76 1D C1 3E 37   04 A0 9B 7E 3D D2 2C 3C  Aa.v..>7....=.,<
#     0040: 0E 66 E9 35 CA 1D 84 29   6C 1D 12 62 F0 BB 50 D1  .f.5...)l..b..P.
#     0050: C6 38 05 B1 C4 BF 63 3B   59 58 D9 16 AD CA 00 8F  .8....c;YX......
#     0060: 63 9E 68 4B 0C 48 D7 31   18 29 94 59 C4 D0 D7 00  c.hK.H.1.).Y....
#     0070: 5C D5 68 82 8A 25 EF 1A   0C 62 FD F3 4B 1B BA 27  \.h..%...b..K..'
#     0080: F6 1D 57 B2 2C 5A 29 36   D0 4F E7 51 BE 8C 0B 5E  ..W.,Z)6.O.Q...^
#     0090: 78 D8 C9 E0 49 42 7C 2D   39 9E 1C C8 75 0B 0E D5  x...IB.-9...u...
#     00A0: 24 EE 23 F3 DA 7F FE 33   2E AE A9 95 FE 8E 0A 89  $.#....3........
#     00B0: 46 54 96 F4 EF 16 23 42   E8 F0 2D F8 B0 2B 0E 57  FT....#B..-..+.W
#     00C0: 8B 69 E8 28 E0 38 B2 DE   00 22 9D 6D 46 7A 4E 73  .i.(.8...".mFzNs
#     00D0: 99 82 40 FB 1F DA A5 36   44 74 CC AA E5 97 81 2B  ..@....6Dt.....+
#     00E0: D2 EB 51 62 97 23 D2 BA   46 82 61 CE AC 2B 82 1D  ..Qb.#..F.a..+..
#     00F0: CE 6E C1 A5 CF DE 43 47   98 1D 80 77 80 EE 42 A3  .n....CG...w..B.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.387 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AB BC 8B BC 07 BA 6C 3D   C2 BD E2 78 94 95 B4 38  ......l=...x...8
#     0010: DF 81 AE 7E E1 C3 B9 4F   3D 34 3C 0B 78 D6 D0 25  .......O=4<.x..%
#     0020: 5C D8 76 76 08 9C 67 6A   22 CB 9D 65 2A C8 BC 10  \.vv..gj"..e*...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.396 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:01.495 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "48 8C A8 CA D7 26 80 08 CA DC 8D 9C 89 C5 43 9F B9 EA AC BD AD DD 43 82 6F 22 71 C3 83 8C 12 45",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 08:38:02.133 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 08:38:02.135 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-10 08:38:03.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-10 08:38:03.857; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-10 08:38:04.196; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1536602f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 08:38:04.198; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-10 08:38:04.199; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(ca,h=[localhost],a=[],w=[]) for Client@649725e3[provider=null,keyStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-PkugTG/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:04.230 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 F2 82 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:45.000 UTC",
#     "not  after"         : "2024-01-08 08:37:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: F2 75 6C CB 58 CA F5 4B   BE DD 7B C9 24 3C 00 8C  .ul.X..K....$<..
#         0010: 4B 7D 8A 5C                                        K..\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 59 F9 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:39.000 UTC",
#     "not  after"         : "2024-01-08 08:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:04.234 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "34 19 23 C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:37.000 UTC",
#     "not  after"         : "2024-01-08 08:37:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 59 F9 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:39.000 UTC",
#     "not  after"         : "2024-01-08 08:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:04.645 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:04.784 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:04.784 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:04.786 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:04.786 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:04.790 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:04.800 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:04.800 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:04.800 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:04.802 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "CF 4D 81 E7 93 FC 68 37 43 5C F6 25 09 90 86 C6 2F E4 59 A0 20 83 27 FF 89 0F 8E DC C6 B8 6E D1",
#   "session id"          : "83 D5 C0 1F 7C 0A 80 C9 00 7C D4 D5 A8 94 8B 70 93 B5 FE C4 71 B6 61 15 F7 AA 81 7F C0 1D 03 2A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 51 66 39 EB 43 FE 6D   90 89 65 BA 54 F4 D8 16  YQf9.C.m..e.T...
#             0010: 95 3C 64 6E B6 B0 AA 82   17 5D 60 6A FE DB 19 50  .<dn.....]`j...P
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.885 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "31 BD 64 13 50 9A CC 9D A4 A7 EC 1A 49 B4 9B F4 74 D1 9D 90 17 CA 4A 47 6E 8A F0 6E D7 C6 42 11",
#   "session id"          : "83 D5 C0 1F 7C 0A 80 C9 00 7C D4 D5 A8 94 8B 70 93 B5 FE C4 71 B6 61 15 F7 AA 81 7F C0 1D 03 2A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C5 5F 83 E9 CE 72 50 46   BE BF B8 1B A8 37 26 F1  ._...rPF.....7&.
#           0010: 35 95 4E 59 F0 CA 14 E7   8B 4D 68 ED DD 8F D8 43  5.NY.....Mh....C
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.885 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.885 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.886 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.887 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.887 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.889 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.894 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.894 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.894 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.895 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.895 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.896 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.903 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.913 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.915 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.919 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.919 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.919 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.921 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.922 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.922 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.922 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.923 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.923 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.924 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.924 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.924 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.925 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.925 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.926 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.926 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.928 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 44 0C B4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:41.000 UTC",
#       "not  after"         : "2024-01-08 08:37:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#           0010: 6D 27 88 BC                                        m'..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 01 57 91 73 B4 F0 F1 43   D9 64 94 4F F4 37 A9 CD  .W.s...C.d.O.7..
#           0010: 88 8D AC 32                                        ...2
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.928 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.983 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4D 59 F9 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-10 08:37:39.000 UTC",
#     "not  after"         : "2024-01-08 08:37:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#         0010: 37 61 7C 96                                        7a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#         0010: 6D 27 88 BC                                        m'..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.986 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7E 66 47 03 5A 25 9B BB   C9 9C CB 32 4C 6C B0 FB  .fG.Z%.....2Ll..
#     0010: B8 53 0A 29 B2 90 CF 11   0B C1 4C B5 47 0D C5 31  .S.)......L.G..1
#     0020: 1B A8 E1 D1 FB 2F EE 6F   F1 01 79 4D 2D DC F2 9E  ...../.o..yM-...
#     0030: 03 87 27 87 0F 79 E4 37   0B A7 26 E8 AA 96 9B 4A  ..'..y.7..&....J
#     0040: 6B 25 6E 79 6A D0 0D 87   88 AE 68 E4 81 F0 FB 2C  k%nyj.....h....,
#     0050: A6 81 BF 11 8F EC DE 46   DC C3 36 F9 2A 54 2E 56  .......F..6.*T.V
#     0060: F8 A4 70 5F 0A 3B 44 52   B4 4C D9 AF BF 55 37 7C  ..p_.;DR.L...U7.
#     0070: 6D 2B EA 0E 5E DD EA 20   C7 AB 94 8E 4E 46 FD 64  m+..^.. ....NF.d
#     0080: 72 D1 73 B9 ED A6 12 16   CE 73 EF 3E DE 60 45 7F  r.s......s.>.`E.
#     0090: 5E 94 03 6A 1F 36 28 D4   23 63 13 D4 AD D7 EC 90  ^..j.6(.#c......
#     00A0: 7B 11 BC 53 C1 28 70 03   BB BB 12 2A 7E 40 A8 A9  ...S.(p....*.@..
#     00B0: F8 AF B0 08 E9 82 BA 48   3E 18 D3 CD 0A D2 C4 8E  .......H>.......
#     00C0: EB 4C 1C 0F F2 27 B4 F5   08 1B EC 48 60 34 D1 C6  .L...'.....H`4..
#     00D0: 2D AB 47 4B 57 28 EC BD   DB 3B 90 C3 F6 37 BD BE  -.GKW(...;...7..
#     00E0: 73 20 FA 79 2F 99 DB BF   73 82 AD A0 18 56 9F F3  s .y/...s....V..
#     00F0: 82 BD CD 3D EB EB 72 0C   C4 07 18 97 17 B4 28 CF  ...=..r.......(.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.987 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6D 27 DA 01 01 62 CA 0C   5B 0D B4 A5 D2 CA 9F 48  m'...b..[......H
#     0010: 5A 71 87 E5 0D 55 10 36   A5 A0 BE 6B 47 AB D4 77  Zq...U.6...kG..w
#     0020: 9E 36 E3 79 A9 7F 39 C4   1A B7 93 CB B0 E3 F6 BD  .6.y..9.........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.989 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-10 08:38:04.989 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.989 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-10 08:38:04.990 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.990 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-10 08:38:04.990 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-10 08:38:04.990 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.990 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:04.992 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 F2 82 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:45.000 UTC",
#       "not  after"         : "2024-01-08 08:37:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#           0010: 6D 27 88 BC                                        m'..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F2 75 6C CB 58 CA F5 4B   BE DD 7B C9 24 3C 00 8C  .ul.X..K....$<..
#           0010: 4B 7D 8A 5C                                        K..\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 59 F9 E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:39.000 UTC",
#       "not  after"         : "2024-01-08 08:37:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#           0010: 37 61 7C 96                                        7a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#           0010: 6D 27 88 BC                                        m'..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:05.013 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 9C 5D 53 01 DF 9E 74   48 9A 57 70 A4 24 C5 B7  2.]S...tH.Wp.$..
#     0010: E6 8F 11 52 AB F6 1C 22   E5 20 4C 7D 36 1D 9C E3  ...R...". L.6...
#     0020: 4E 43 E2 C8 00 CE C0 5E   55 D2 A7 CB 1C C1 14 3D  NC.....^U......=
#     0030: 84 8B 7A 1B 22 23 8F 2E   FD 68 F8 B4 17 71 E6 79  ..z."#...h...q.y
#     0040: 93 45 B6 BE C5 4E 48 9E   96 84 D8 5F EC E3 10 52  .E...NH...._...R
#     0050: B1 A8 DB CA B4 C3 73 EB   D1 CD C6 5B 7F E8 5C 06  ......s....[..\.
#     0060: 1A 41 64 91 48 40 68 3C   46 D4 0C 13 6E CF DA 03  .Ad.H@h<F...n...
#     0070: 98 BC 76 1A A0 C3 79 D7   B0 20 57 62 86 E3 14 94  ..v...y.. Wb....
#     0080: B0 DD FB 01 E8 48 65 81   96 9A B6 6D 54 75 C4 C4  .....He....mTu..
#     0090: 7F 29 90 91 E7 69 22 5B   2C B5 EE 33 25 6A 49 14  .)...i"[,..3%jI.
#     00A0: 64 E5 F3 0C DD B5 07 0B   66 37 B5 E2 1D B3 7E 4B  d.......f7.....K
#     00B0: 22 2F 8D B6 45 C4 AD 1F   68 C8 65 A0 AB 22 0C F4  "/..E...h.e.."..
#     00C0: 21 69 0D 7E 2E C1 F4 54   23 FB 15 D6 FF 85 D8 09  !i.....T#.......
#     00D0: FA 56 36 E5 73 14 2F 9E   D3 B9 2E BA D7 B6 86 21  .V6.s./........!
#     00E0: 2A A3 49 AC 75 27 9B 80   F2 A0 98 6C 1A 48 5B 73  *.I.u'.....l.H[s
#     00F0: 63 60 72 AD 14 6E A3 D7   F5 A8 E4 88 FA 04 5D 1B  c`r..n........].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:05.014 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 55 81 4B C6 B4 3A E0 85   97 DE 47 28 D8 22 FF 59  U.K..:....G(.".Y
#     0010: DF 3F 86 34 C0 99 82 E5   67 9A B4 47 03 B9 F9 8F  .?.4....g..G....
#     0020: 8F 58 46 DD 36 C2 49 69   8B 3F 07 1D A3 B3 83 62  .XF.6.Ii.?.....b
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:05.014 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:05.068 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "AE 58 95 36 DC 9E 8E AE 23 D7 63 0D 9D 71 54 3D 00 B7 03 7D 6E AC 40 E4 2C 20 81 7C B5 C6 FC EF",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-10 08:38:05.330 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-10 08:38:05.332 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-10 08:38:18.885; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:19.553 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 19 23 C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:37.000 UTC",
#       "not  after"         : "2024-01-08 08:37:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#           0010: 37 61 7C 96                                        7a..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4D 59 F9 E4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-10 08:37:39.000 UTC",
#       "not  after"         : "2024-01-08 08:37:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 38 D9 83 5D 01 5A 96 9E   7D 95 41 6E 54 ED 68 0E  8..].Z....AnT.h.
#           0010: 37 61 7C 96                                        7a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A0 89 9A D3 D3 72 D6 E9   10 BC 9B F9 A2 24 97 7E  .....r.......$..
#           0010: 6D 27 88 BC                                        m'..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-10 08:38:19.565 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:19.715 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:19.715 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:19.717 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-10 08:38:19.717 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:19.721 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:19.731 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:19.731 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:19.732 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-10 08:38:19.734 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "52 16 AC 4B 9B 21 81 D9 5E D2 D6 71 C0 CB 73 AE 14 19 B5 C8 2F 4A 33 6F 4A E7 96 56 72 40 A3 AC",
#     "session id"          : "FD 8F B2 6A A7 79 41 32 E7 A9 F5 EB 89 6F 62 70 02 4E 73 10 35 08 BE 92 60 26 F7 20 FE 47 83 FD",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 82 57 B2 FC A5 79 49 9C   3E 7D A9 AD 28 C8 85 69  .W...yI.>...(..i
#               0010: 8B 61 A2 B2 D9 28 10 6B   04 BA 86 36 A7 06 2A 15  .a...(.k...6..*.
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.761 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B4 A9 0D 32 19 AA 99 0B 6B F9 14 BE CD CD 44 CC A1 8D 26 30 A0 78 9C 21 7C 91 DC 7D 1F 2B 22 79",
#     "session id"          : "FD 8F B2 6A A7 79 41 32 E7 A9 F5 EB 89 6F 62 70 02 4E 73 10 35 08 BE 92 60 26 F7 20 FE 47 83 FD",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D6 43 30 F1 90 7D EB 15   8B 37 C0 F1 2A A9 28 AB  .C0......7..*.(.
#             0010: 5D D3 B3 44 FA 02 CD 10   2C F1 12 B7 E6 43 9D 0F  ]..D....,....C..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.762 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.762 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.763 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.764 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.764 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.764 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.770 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.770 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.771 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.772 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.772 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.772 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-10 08:38:19.772 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-

[...truncated too long message...]

 : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:545)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:552)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 13794ms
ok 75 stop command for single port in 17121ms
not ok 76 status detects locally running solr in 1315ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 6908ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1330ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2562ms
ok 80 copying files around in 6094ms
ok 81 upconfig in 2476ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1211ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
not ok 84 Cleanup in 2286ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 31s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uc7oz265v4x4w

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8150 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8150/

2 tests failed.
FAILED:  org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod

Error Message:
java.util.concurrent.TimeoutException: Timed out waiting for all collections to be fully removed.

Stack Trace:
java.util.concurrent.TimeoutException: Timed out waiting for all collections to be fully removed.
	at __randomizedtesting.SeedInfo.seed([D7EDAD17B7C83134]:0)
	at org.apache.solr.cloud.MiniSolrCloudCluster.deleteAllCollections(MiniSolrCloudCluster.java:619)
	at org.apache.solr.handler.designer.TestSchemaDesignerAPI.tearDownCluster(TestSchemaDesignerAPI.java:81)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:909)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod

Error Message:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=14157, name=coreCloseExecutor-9963-thread-1, state=RUNNABLE, group=TGRP-TestSchemaDesignerAPI]

Stack Trace:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=14157, name=coreCloseExecutor-9963-thread-1, state=RUNNABLE, group=TGRP-TestSchemaDesignerAPI]
Caused by: java.lang.AssertionError: Too many closes on SolrCore
	at __randomizedtesting.SeedInfo.seed([D7EDAD17B7C83134]:0)
	at org.apache.solr.core.SolrCore.close(SolrCore.java:1753)
	at org.apache.solr.core.SolrCores.lambda$close$0(SolrCores.java:128)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 6996 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.designer.TestSchemaDesignerAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D7EDAD17B7C83134 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8

  - org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.handler.designer.TestSchemaDesignerAPI.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.handler.designer.TestSchemaDesignerAPI.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D7EDAD17B7C83134 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 44s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/6uxrbwf5r7bcq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8149 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8149/

All tests passed

Build Log:
[...truncated 1486 lines...]
BUILD FAILED in 1h 1m 46s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/gc6jef4frylgy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8148 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8148/

All tests passed

Build Log:
[...truncated 1280 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:42461/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-09 21:58:56.947; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 21:58:56.951; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:42461/solr] to [https://127.0.0.1:42461].
# WARN  - 2023-10-09 21:58:57.932; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-09 21:58:57.962; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 16166ms
ok 71 start solr with client truststore and security manager in 19349ms
not ok 72 start solr with mTLS needed in 53284ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rzcoSe/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 42461 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42461 (pid=816771). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42462 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 42462 (pid=816897). Happy searching!
#
#     INFO  - 2023-10-09 21:59:59.616; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 21:59:59.626; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 22:00:00.385; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 22:00:00.387; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 22:00:00.388; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:00.441 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 91 1A 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:45.000 UTC",
#     "not  after"         : "2024-01-07 21:59:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 04 6F C8 16 29 63 6A   D6 4A E4 CC 5A D7 0A 26  ..o..)cj.J..Z..&
#         0010: F9 2D E5 54                                        .-.T
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E D7 05 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:38.000 UTC",
#     "not  after"         : "2024-01-07 21:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:00.445 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E D7 05 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:38.000 UTC",
#     "not  after"         : "2024-01-07 21:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 00 EC 24",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:36.000 UTC",
#     "not  after"         : "2024-01-07 21:59:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:00.475 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:01.201 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:01.201 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:01.203 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:01.203 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:01.211 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:01.226 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:01.226 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:01.227 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:01.232 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "AF 0A 9A 54 26 31 3B 37 06 F4 52 31 CC A1 DB 1E 50 8C 5F FB 21 CC 08 45 1C 49 F5 11 76 B9 56 F6",
#   "session id"          : "60 D7 64 F7 0A A4 65 E3 6D 39 CF 5B 86 CB A9 E7 5C 89 F1 6F DD 60 BF B4 C9 E0 C8 0E 30 63 59 3C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 53 A1 21 6D 48 C1 95 7A   DF 89 E6 83 B6 F8 4E DE  S.!mH..z......N.
#             0010: 29 AA 29 9A 56 CA C0 4B   ED 06 FF 20 69 A0 5F 68  ).).V..K... i._h
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.440 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "3C C9 67 2B B8 69 98 A1 CE C0 51 E1 EA 12 86 2F 3F E1 96 55 40 1E 3F 5C 02 36 59 D0 EF C4 EB AE",
#   "session id"          : "60 D7 64 F7 0A A4 65 E3 6D 39 CF 5B 86 CB A9 E7 5C 89 F1 6F DD 60 BF B4 C9 E0 C8 0E 30 63 59 3C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B5 4E 2A 4E 00 6A EC 1C   7A 41 78 02 8A B8 8E 69  .N*N.j..zAx....i
#           0010: 3D 16 1A 15 BB AF 17 A9   EB BA 3E 93 CA B0 DB 67  =.........>....g
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.441 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.441 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.445 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.446 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.447 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.453 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.453 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.467 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.477 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.478 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.478 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.479 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.502 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.525 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.526 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.527 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.553 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.554 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.555 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.556 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.556 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.556 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.557 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.557 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.557 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.560 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C B8 6A AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:41.000 UTC",
#       "not  after"         : "2024-01-07 21:59:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#           0010: 5D C1 BB 12                                        ]...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 50 AA 00 6F A6 0E 2E BB   6E 7F 47 70 86 E2 AF C9  P..o....n.Gp....
#           0010: A0 80 C5 C6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.560 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:01.608 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:01.608 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:01.608 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:01.609 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.816 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E D7 05 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:38.000 UTC",
#     "not  after"         : "2024-01-07 21:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.819 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 00 B1 08 82 83 4C 8F 0E   50 BD DB 7C 9D 71 54 0F  .....L..P....qT.
#     0010: 28 58 A0 64 B8 69 6B 60   10 2B EE 91 43 9D F6 AA  (X.d.ik`.+..C...
#     0020: 8C 34 A5 C0 30 C0 F9 2D   14 0D 80 5D 76 1A 7F 3E  .4..0..-...]v..>
#     0030: 8C D3 FB 9F E6 D6 38 33   BF 81 31 E9 FC A4 DA 71  ......83..1....q
#     0040: 41 78 BB AC 11 E8 4F D8   1E DB 3B BB BF 4C E8 B4  Ax....O...;..L..
#     0050: 7F C1 FA 70 45 91 22 E7   AD F0 8D D8 BB AF 83 08  ...pE.".........
#     0060: CC 20 74 1D 18 C9 BE 04   B2 7F 2F 63 3D A0 0A 6F  . t......./c=..o
#     0070: 86 2D 50 51 22 5C A1 1E   EF 96 14 B2 60 AD C6 2B  .-PQ"\......`..+
#     0080: B8 B9 EA D4 7A 75 7F A1   8B 48 38 53 7A B0 19 1F  ....zu...H8Sz...
#     0090: 8B 60 2A 84 84 90 A7 52   9A 60 8A 22 D7 D6 70 5F  .`*....R.`."..p_
#     00A0: 08 A2 BC E4 15 28 D2 F9   98 03 1B 86 6E FD 53 E7  .....(......n.S.
#     00B0: 80 54 73 87 BF 65 4B 5E   6D 62 8D 06 C6 3E 76 15  .Ts..eK^mb...>v.
#     00C0: 55 31 DE 3A 72 FA 29 17   14 20 C6 91 1C 6A C7 27  U1.:r.).. ...j.'
#     00D0: 54 52 BD 02 05 E2 97 A2   36 67 B8 8E 67 5E 34 A5  TR......6g..g^4.
#     00E0: 84 D2 CC 45 F6 23 E4 71   96 AA 56 1B 57 FF E0 11  ...E.#.q..V.W...
#     00F0: C5 23 CC 74 91 0B 5C F2   9C 7D 8B 91 74 8A 1F 81  .#.t..\.....t...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.821 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 5F ED 95 03 1E E4 4B 5C   52 B7 5A F7 F5 DC 0D F1  _.....K\R.Z.....
#     0010: BD 3D BD C1 87 47 09 03   14 38 D6 00 06 EB 09 DD  .=...G...8......
#     0020: 93 61 95 CE E4 DA 8C E5   D2 5B 39 57 EE 91 32 73  .a.......[9W..2s
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.823 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-09 22:00:01.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.824 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-09 22:00:01.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.824 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-09 22:00:01.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:01.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.825 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.840 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 91 1A 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:45.000 UTC",
#       "not  after"         : "2024-01-07 21:59:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#           0010: 5D C1 BB 12                                        ]...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 04 6F C8 16 29 63 6A   D6 4A E4 CC 5A D7 0A 26  ..o..)cj.J..Z..&
#           0010: F9 2D E5 54                                        .-.T
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E D7 05 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:38.000 UTC",
#       "not  after"         : "2024-01-07 21:59:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#           0010: 85 61 B2 D1                                        .a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#           0010: 5D C1 BB 12                                        ]...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.915 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 29 51 7B 76 5D F4 68   7D 5E 4D CF A2 DD 57 42  w)Q.v].h.^M...WB
#     0010: AF DD 18 75 FE F6 E5 C2   B1 88 EC 14 71 49 88 D6  ...u........qI..
#     0020: 2D A7 EF 74 19 92 B1 CD   97 C4 6F 93 F0 06 97 F8  -..t......o.....
#     0030: D3 28 AE E6 59 04 3C 28   7D 69 3D 86 BC C1 FB 83  .(..Y.<(.i=.....
#     0040: 25 F2 59 35 73 FA 87 2B   7F 69 BC AC 0D 27 15 34  %.Y5s..+.i...'.4
#     0050: A8 E3 CF 6F 05 F3 FC 7F   66 4A 6B 0E 34 06 07 53  ...o....fJk.4..S
#     0060: 52 30 8C 46 A9 BB 63 EC   03 5D D4 43 6B BF 37 5F  R0.F..c..].Ck.7_
#     0070: DE 0A 15 AB DB 12 AC B9   94 E5 25 42 1B 30 08 58  ..........%B.0.X
#     0080: E6 A3 6F 8A CA 81 86 91   00 2C AB 9B 93 39 24 DC  ..o......,...9$.
#     0090: 02 AB 49 F9 7F 7A 3E C4   CB 7E F6 E9 13 44 BD CF  ..I..z>......D..
#     00A0: C6 9F 90 D6 67 25 D4 F2   2D 59 BD AD DE A7 4F 94  ....g%..-Y....O.
#     00B0: 98 41 D4 8F 61 F7 02 75   A6 29 77 70 DA 99 55 FA  .A..a..u.)wp..U.
#     00C0: 92 8E A8 5F 1C D6 F9 64   FC 1D 43 55 CD 1B 79 36  ..._...d..CU..y6
#     00D0: A3 9C 26 8B C7 F7 1E 47   E5 5A C4 90 18 5D 0E CF  ..&....G.Z...]..
#     00E0: F9 F0 E2 30 E6 52 F9 61   01 13 93 44 EA 00 51 B4  ...0.R.a...D..Q.
#     00F0: AB 05 33 C6 3F E1 8C D5   3D 3E 93 09 04 C3 48 DA  ..3.?...=>....H.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.917 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7E 21 39 93 55 1F E7 4D   9E 24 9C 48 1C F3 85 3F  .!9.U..M.$.H...?
#     0010: A9 08 51 53 5E 00 73 9B   34 60 E7 68 F9 A2 9F 4C  ..QS^.s.4`.h...L
#     0020: C0 75 5A D0 9E C5 50 69   C0 5A 2F 18 25 EE 59 7F  .uZ...Pi.Z/.%.Y.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:01.925 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-09 22:00:01.987 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 98 24 F9 7B 7B 2A FB A6 44 8A 1A 46 93 9F F1 62 32 F1 09 32 36 54 1E F9 EA B6 9A A0 3A B5 EE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 22:00:03.181 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 22:00:03.182 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-09 22:00:04.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-09 22:00:04.580; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-09 22:00:05.081; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 22:00:05.083; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-09 22:00:05.083; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rzcoSe/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:05.127 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 91 1A 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:45.000 UTC",
#     "not  after"         : "2024-01-07 21:59:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 04 6F C8 16 29 63 6A   D6 4A E4 CC 5A D7 0A 26  ..o..)cj.J..Z..&
#         0010: F9 2D E5 54                                        .-.T
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E D7 05 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:38.000 UTC",
#     "not  after"         : "2024-01-07 21:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:05.130 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E D7 05 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:38.000 UTC",
#     "not  after"         : "2024-01-07 21:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 00 EC 24",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:36.000 UTC",
#     "not  after"         : "2024-01-07 21:59:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:05.141 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:05.708 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:05.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:05.711 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:05.711 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:05.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:05.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:05.735 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:05.736 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:05.740 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "9F 6F FD 36 F2 B3 79 C9 36 D4 3D 4B 5E 7B 58 C2 C2 13 F7 A4 CC DC C5 FF EF E8 01 7E BE 7D C1 FA",
#   "session id"          : "D1 2B B8 5B E3 21 18 8C 74 19 19 16 C0 2B F1 0E 75 BB DD 3B 94 9A 55 B0 66 95 3D DC 4B 11 52 84",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CF 78 F7 FE D2 73 2D DC   E4 BA E6 68 31 79 4C 5B  .x...s-....h1yL[
#             0010: CB 93 CF 26 93 20 CF B0   0E 8A 9F 46 EF 24 79 47  ...&. .....F.$yG
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.826 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "48 6D 38 1F DE 0E E4 D3 5D 7B A5 25 29 28 E5 87 13 A4 83 EA A8 15 9F 7B F6 5A 06 12 95 67 74 48",
#   "session id"          : "D1 2B B8 5B E3 21 18 8C 74 19 19 16 C0 2B F1 0E 75 BB DD 3B 94 9A 55 B0 66 95 3D DC 4B 11 52 84",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5A 01 30 02 98 24 5D BF   7E 81 54 40 74 E7 AB 32  Z.0..$]...T@t..2
#           0010: 10 8D FC 73 9B F0 23 E7   59 EA CE 53 49 0F 8E 19  ...s..#.Y..SI...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.826 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.826 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.828 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.828 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.829 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.834 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.834 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.834 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.834 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.855 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.856 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.857 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.867 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.869 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.869 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.870 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.870 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.870 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.872 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C B8 6A AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:41.000 UTC",
#       "not  after"         : "2024-01-07 21:59:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#           0010: 5D C1 BB 12                                        ]...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 50 AA 00 6F A6 0E 2E BB   6E 7F 47 70 86 E2 AF C9  P..o....n.Gp....
#           0010: A0 80 C5 C6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.873 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:05.960 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:05.961 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:05.961 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:05.961 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.969 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1E D7 05 3D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-09 21:59:38.000 UTC",
#     "not  after"         : "2024-01-07 21:59:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#         0010: 85 61 B2 D1                                        .a..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#         0010: 5D C1 BB 12                                        ]...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.978 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 9E 8B DE 02 C8 87 0F DF   CE 7B DE 91 76 BF B8 76  ............v..v
#     0010: 9B A3 1A CA 3A 48 37 9C   6C 9B CE 7A 16 BC 88 20  ....:H7.l..z...
#     0020: 5D B9 09 D8 B5 4F A6 34   1A D2 C4 83 E5 16 C5 02  ]....O.4........
#     0030: A8 7D 25 A6 62 FF 28 FF   FA 62 5C E4 3A 1C 28 E1  ..%.b.(..b\.:.(.
#     0040: 52 E7 73 49 87 20 2A 34   AB 25 AA 7A CC 62 BF 35  R.sI. *4.%.z.b.5
#     0050: 8C 02 E7 3B 0C 6E 87 33   8E 95 6C 4C 8F 46 CC 46  ...;.n.3..lL.F.F
#     0060: 5B A6 EC C4 53 2F 12 A8   A2 13 DF 69 E3 11 06 FC  [...S/.....i....
#     0070: FB 61 9A 0A 7B 40 98 BA   28 40 04 9C 0D 98 3B 56  .a...@..(@....;V
#     0080: 64 E9 96 69 3F 66 E5 98   EE 3D 34 1C 3B 38 BC 08  d..i?f...=4.;8..
#     0090: 56 A4 6B C5 CD B1 6C 38   C6 E5 B8 92 3C 10 7E F6  V.k...l8....<...
#     00A0: 16 6D 8E BC 4A 2C 55 12   26 29 7C BD C6 09 94 0A  .m..J,U.&)......
#     00B0: 48 46 84 EB 2F 1C 4D 78   8B 00 FA 6C 4F B1 EA 3E  HF../.Mx...lO..>
#     00C0: 46 CB 05 BA BD 66 BD AB   42 9D 63 7F BA 15 60 57  F....f..B.c...`W
#     00D0: 0F DA F5 0E 9D AA 55 79   E2 2B 24 33 EC D1 21 71  ......Uy.+$3..!q
#     00E0: DF 81 43 F9 D3 7C 8D AB   42 70 E6 C6 E9 03 BE 95  ..C.....Bp......
#     00F0: 69 43 8F CC 44 D7 0A 09   4A 71 BF C8 12 DF 62 B9  iC..D...Jq....b.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.986 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FF 79 AE 25 1E 43 52 E6   3E CA C5 98 DA B7 D2 96  .y.%.CR.>.......
#     0010: FB B8 8B B3 71 F6 EA 6B   4F 81 7B CA 65 86 4E 76  ....q..kO...e.Nv
#     0020: 9E B1 9A A0 E6 56 BD D8   DD 1A 9D 87 96 20 35 67  .....V....... 5g
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.990 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-09 22:00:05.993 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.993 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-09 22:00:05.993 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.993 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-09 22:00:05.994 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:05.996 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.996 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:05.999 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 91 1A 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:45.000 UTC",
#       "not  after"         : "2024-01-07 21:59:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#           0010: 5D C1 BB 12                                        ]...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 04 6F C8 16 29 63 6A   D6 4A E4 CC 5A D7 0A 26  ..o..)cj.J..Z..&
#           0010: F9 2D E5 54                                        .-.T
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E D7 05 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:38.000 UTC",
#       "not  after"         : "2024-01-07 21:59:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#           0010: 85 61 B2 D1                                        .a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#           0010: 5D C1 BB 12                                        ]...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:06.033 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D AC 32 93 C0 E6 4D 5B   4E 0B 97 71 2D FF E5 99  ..2...M[N..q-...
#     0010: 14 98 7A 7B 0C 69 EB 6A   16 DA 31 25 15 DB 5A F2  ..z..i.j..1%..Z.
#     0020: E2 A1 C5 3A B1 BB 2D D6   4B B3 7B 6C 33 5B 8E 90  ...:..-.K..l3[..
#     0030: CC 69 1F F9 62 F0 DD C2   EC 93 E7 55 D8 96 03 27  .i..b......U...'
#     0040: 97 1C 45 98 5B 5D 93 05   C5 C3 FF 68 01 C7 04 29  ..E.[].....h...)
#     0050: D7 54 E3 E3 83 27 44 20   70 10 5F DB 90 C3 31 5E  .T...'D p._...1^
#     0060: 3C DA 93 04 16 14 B6 C3   8C 59 BE B5 69 C7 AA 5F  <........Y..i.._
#     0070: 5A E4 12 20 89 53 BC 2C   56 03 AC D7 AB 2C 77 3F  Z.. .S.,V....,w?
#     0080: 47 42 25 34 7C 66 82 36   50 17 91 1A E3 B0 3D B4  GB%4.f.6P.....=.
#     0090: 50 36 99 E4 C5 25 88 09   93 9A 6E 9C 92 BD 41 15  P6...%....n...A.
#     00A0: 37 4B DB A8 02 CC 0C 3C   5F AE C5 7E 7F A8 F1 09  7K.....<_.......
#     00B0: 6F 40 01 46 D9 E0 F6 F3   69 E8 92 2A AC 44 9B 43  o@.F....i..*.D.C
#     00C0: DB F0 4C E3 BB D4 E2 D9   EB F5 43 C7 B6 53 B5 E7  ..L.......C..S..
#     00D0: 8E 7D BC 71 4D AC AC 0F   37 2A A9 B9 AD C8 47 B0  ...qM...7*....G.
#     00E0: 87 F9 02 17 88 12 AC C9   EF 1E 85 FC F2 DD CC D0  ................
#     00F0: 5A E3 03 57 72 C3 B2 A2   6E D8 CA 20 C0 5C 30 5C  Z..Wr...n.. .\0\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:06.034 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D1 85 65 97 1B 84 E5 A1   F9 B6 E1 7D 17 2F 28 DC  ..e........../(.
#     0010: 29 EF A2 02 7F 1D EB 42   D2 BD CD 70 04 79 3F 84  )......B...p.y?.
#     0020: F3 48 B4 84 4D 58 3A E2   B2 B1 9E 11 87 98 12 2E  .H..MX:.........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:06.038 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:06.107 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A5 A6 28 08 5D 3A 8F D4 58 5E 63 3C E2 7F 26 8E 40 2B 7A 14 AE B7 17 AD 33 80 B7 AA E2 67 57 4F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-09 22:00:06.797 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-09 22:00:06.798 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-09 22:00:20.968; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:21.283 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E D7 05 3D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:38.000 UTC",
#       "not  after"         : "2024-01-07 21:59:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#           0010: 85 61 B2 D1                                        .a..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B7 C0 F8 6D 42 E9 EE BF   BF A2 0A 53 AB D3 22 EF  ...mB......S..".
#           0010: 5D C1 BB 12                                        ]...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 00 EC 24",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-09 21:59:36.000 UTC",
#       "not  after"         : "2024-01-07 21:59:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EB 5B 5C 9A 21 27 36 73   91 B2 60 23 F2 B3 83 15  .[\.!'6s..`#....
#           0010: 85 61 B2 D1                                        .a..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-09 22:00:21.295 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:21.455 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:21.455 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:21.455 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-09 22:00:21.455 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:21.563 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:21.563 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:21.565 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-09 22:00:21.565 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:21.569 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:21.578 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:21.578 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:21.578 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-09 22:00:21.580 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C8 00 73 3D A7 7D 0B DC 04 02 56 5E 72 EE 97 40 3E 4B F5 F0 0C 1E 2D 29 AC 55 13 F5 34 33 4E E4",
#     "session id"          : "16 34 23 10 8C 65 C1 81 68 86 F4 E1 37 15 F0 4B 71 FE D7 FC A6 8C EF E0 6F D0 9F 54 24 85 13 E1",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 64 64 A4 8A D2 D8 24 C2   1C 2B A2 FC 9C EA AB 0B  dd....$..+......
#               0010: FA 44 53 F7 68 6D 14 1B   6E 42 37 42 4B E1 C3 73  .DS.hm..nB7BK..s
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.598 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8A 34 F6 61 41 53 AB AB 69 B4 B1 A0 E3 16 E2 24 DD D0 0E 4D 4A 78 FD 7C 4D 8F 45 11 EF E2 93 1B",
#     "session id"          : "16 34 23 10 8C 65 C1 81 68 86 F4 E1 37 15 F0 4B 71 FE D7 FC A6 8C EF E0 6F D0 9F 54 24 85 13 E1",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: FD D8 8A 4D C1 E0 44 4B   AD E3 1E AF EC 59 B7 4F  ...M..DK.....Y.O
#             0010: 2A 29 FA 5C FB BB CD FF   BD 11 DB F7 E4 FE 27 39  *).\..........'9
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.599 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.599 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.599 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.599 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.599 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.599 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.599 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.600 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.601 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.601 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.602 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.613 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.614 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.617 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.617 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.617 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.617 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.617 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.617 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.617 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:21.618 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-09 22:00:21.618 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.619 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.619 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.619 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-09 22:00:21.619 UTC|SSLExtensions.java:192|Con

[...truncated too long message...]

gineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14081ms
ok 75 stop command for single port in 17617ms
not ok 76 status detects locally running solr in 1343ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7504ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1360ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2590ms
ok 80 copying files around in 6269ms
ok 81 upconfig in 2601ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1206ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1205ms
not ok 84 Cleanup in 2347ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 309312 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 309312 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 2m 12s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/p57avetfm4jnu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8147 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8147/

All tests passed

Build Log:
[...truncated 1447 lines...]
BUILD FAILED in 1h 1m 52s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jt2jmh4y2s4ew

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any