You are viewing a plain text version of this content. The canonical link for it is here.
Posted to builds@solr.apache.org by Apache Jenkins Server <je...@builds.apache.org> on 2023/10/19 08:35:31 UTC

[JENKINS] Solr » Solr-Check-main - Build # 8219 - Still Failing!

Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8219/

All tests passed

Build Log:
[...truncated 1262 lines...]
# ERROR: Error from server at http://localhost:33215/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16444ms
ok 60 Check help command in 4752ms
ok 61 basic post with a type specified in 5992ms
ok 62 basic post WITHOUT a type specified in 12080ms
ok 63 crawling a directory in 4636ms
ok 64 crawling a web site in 5628ms
ok 65 commit and optimize and delete in 3898ms
ok 66 args mode in 6475ms
ok 67 stdin mode in 3489ms
ok 68 post solr log into solr via script in 12293ms
ok 69 post solr log into solr via cli in 7737ms
ok 70 allowPaths - backup in 17387ms
ok 71 start solr with ssl in 19031ms
not ok 72 use different hostname when not checking peer-name in 20639ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 33215 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33215 (pid=4180863). Happy searching!
#
#     INFO  - 2023-10-19 08:31:11.406; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:31:11.411; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:31:11.844; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@423e4cbb(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 08:31:11.924; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 08:31:11.925; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 08:31:22.013; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 08:31:22.017; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 08:31:22.421; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:33215/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 08:31:23.807; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:31:23.811; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:33215/solr] to [https://127.0.0.1:33215].
# WARN  - 2023-10-19 08:31:24.618; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 08:31:24.668; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17730ms
ok 74 start solr with client truststore and security manager in 19795ms
not ok 75 start solr with mTLS needed in 53864ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-nXfFIr/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33215 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33215 (pid=4183549). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33216 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33216 (pid=4183719). Happy searching!
#
#     INFO  - 2023-10-19 08:32:27.933; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:32:27.942; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:32:28.497; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:28.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:28.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(ca,h=[localhost],a=[],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.565 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B CA 2C 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:14.000 UTC",
#     "not  after"         : "2024-01-17 08:32:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#         0010: 4B EA B1 C5                                        K...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.568 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 F7 25 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:05.000 UTC",
#     "not  after"         : "2024-01-17 08:32:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.582 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.962 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.083 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.085 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.085 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.104 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.104 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.107 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.114 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 B0 A0 F2 CA 10 49 66 2A CD 9E 18 0E 10 33 AC 11 A7 FB 16 95 4F FB 11 AA 25 5A 3A 6F 9B 75 90",
#   "session id"          : "CD 7B 54 91 26 26 67 B7 E3 64 A4 C1 8C 3F 00 CA CD 51 88 5A C9 C2 BD 65 2A 9E 2D BE 3E 31 9D 92",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 83 FE AF 82 E3 1E 32 CB   32 C5 AD 9A 11 28 F2 FD  ......2.2....(..
#             0010: BF 3A 10 4F C8 03 FF CA   B7 B4 83 78 CC 01 BC 43  .:.O.......x...C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.673 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F5 58 CD 02 C8 84 A5 D8 D1 4B 23 F9 58 01 27 73 9E DD F2 5D 93 34 B7 EE C3 BD FD E6 96 D0 DA E0",
#   "session id"          : "CD 7B 54 91 26 26 67 B7 E3 64 A4 C1 8C 3F 00 CA CD 51 88 5A C9 C2 BD 65 2A 9E 2D BE 3E 31 9D 92",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CE 57 EB 41 0D 69 B1 7F   06 E4 B4 A5 3D 9A A3 20  .W.A.i......=..
#           0010: 8D A2 9B F5 5E 7F DC C1   CF 0F D4 CC 5E 43 E5 6F  ....^.......^C.o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.673 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.674 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.682 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.682 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.708 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.710 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.725 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.730 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.730 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.733 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.734 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.736 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E E5 0A 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:10.000 UTC",
#       "not  after"         : "2024-01-17 08:32:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 25 62 26 72 C1 22 BD   4E D0 9B 3A 1B 24 9B 36  A%b&r.".N..:.$.6
#           0010: A6 39 ED 37                                        .9.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.736 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.823 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.827 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 4A 37 16 19 D5 17 0B   0D 38 C7 A4 CD A5 86 C3  .J7......8......
#     0010: 2B 64 29 E3 32 3B C4 5B   A3 67 3B 92 1B 56 B1 AA  +d).2;.[.g;..V..
#     0020: 30 86 4F B3 B6 BB F8 07   25 C6 13 57 16 99 92 38  0.O.....%..W...8
#     0030: E5 55 BC 6C 71 CD 84 28   9F AA 03 DE B9 14 4E 87  .U.lq..(......N.
#     0040: A9 45 E4 61 A9 8E C5 6C   06 D5 19 47 4C 9E FD B5  .E.a...l...GL...
#     0050: 81 BA 2B 9C EF 15 58 D9   77 45 47 2E F2 D8 B1 10  ..+...X.wEG.....
#     0060: 31 69 21 45 36 AA CA 63   F8 01 D9 7D 31 A1 D9 D5  1i!E6..c....1...
#     0070: 58 A0 54 00 DD 45 BD 3A   DB CF D5 A0 A0 9E 68 31  X.T..E.:......h1
#     0080: 4A 95 5D 87 68 25 3E 71   D9 2B AF 07 26 F7 C4 7C  J.].h%>q.+..&...
#     0090: 0D 8F 0C 9C 6D 78 78 CF   03 1B A1 79 3F FE AE CD  ....mxx....y?...
#     00A0: E5 45 6C 9D 96 5C 2C 71   82 E3 3A 39 10 AA 64 88  .El..\,q..:9..d.
#     00B0: CA BB C2 5B 2E 7A ED AC   77 79 95 AB D7 DA 22 0D  ...[.z..wy....".
#     00C0: 66 48 09 9B E7 5E B6 E8   6F FA 58 EF B7 A6 70 B2  fH...^..o.X...p.
#     00D0: C9 33 AC 61 1A 28 DF DE   9E D4 5C 9C BA 26 B1 BC  .3.a.(....\..&..
#     00E0: EB C6 8D FA F6 3C 1C 3F   F1 19 F6 15 11 B5 41 5B  .....<.?......A[
#     00F0: 96 7C 3D 57 18 F6 0D 16   96 23 C5 5E 92 82 4F 7B  ..=W.....#.^..O.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.834 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 98 19 F8 50 CF 66 DC   BF DE ED E7 F9 90 9F 1B  ....P.f.........
#     0010: 0A 59 5F F6 9F EC AD A3   D0 5B FB C2 94 1E 71 C2  .Y_......[....q.
#     0020: 10 61 AD C1 64 0F 8E B0   38 7C F5 65 C7 03 FC BC  .a..d...8..e....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.837 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.240 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B CA 2C 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:14.000 UTC",
#       "not  after"         : "2024-01-17 08:32:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#           0010: 4B EA B1 C5                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.308 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 34 EE 65 C9 02 88 CE   44 EB 6C 90 66 89 A9 D7  x4.e....D.l.f...
#     0010: AA A0 64 95 7B 16 8A A5   D3 E1 25 16 F4 A7 4A 69  ..d.......%...Ji
#     0020: DC A5 9C 25 E2 A8 B3 A1   FF 63 5F 33 F6 F9 32 DB  ...%.....c_3..2.
#     0030: FA 4A 8E D6 BF 47 34 0F   9A E4 76 49 79 4F CF D2  .J...G4...vIyO..
#     0040: 3B B2 5C E1 08 3B 72 2F   9B FA 01 F0 EC 96 1E F4  ;.\..;r/........
#     0050: 24 7C B5 60 FF 19 6B C9   93 23 78 DD 94 64 AD 31  $..`..k..#x..d.1
#     0060: 1F AE A0 58 56 8D 72 BB   84 A3 2F C0 A4 A9 09 C4  ...XV.r.../.....
#     0070: 4E 85 38 0F 07 C4 CC 34   70 C4 9E 29 17 F9 1E DB  N.8....4p..)....
#     0080: 38 B3 A5 FC DA 8D F4 BA   DF 06 EF 3C C0 F7 F7 00  8..........<....
#     0090: 95 21 0A 84 99 74 92 72   C6 E9 42 A9 46 6F 85 61  .!...t.r..B.Fo.a
#     00A0: B3 1F 3A 6C C7 06 C8 E4   01 EF 84 F2 36 71 1F F3  ..:l........6q..
#     00B0: 44 67 9B F3 A9 BF 7D F2   A1 D4 0F 1E 13 E7 0C 71  Dg.............q
#     00C0: E8 70 47 6B CF 55 02 DE   76 60 A8 0E 38 B3 77 83  .pGk.U..v`..8.w.
#     00D0: EB F2 4B DD 5E 57 FA 75   18 E8 9C DD 53 CF 0B 66  ..K.^W.u....S..f
#     00E0: 92 58 A4 24 C7 85 D7 53   F3 CB 9B AE 6B EA EA E4  .X.$...S....k...
#     00F0: 2E 3F A7 0D FE 4E A5 4C   4E 6E AE 7C 08 50 3F B0  .?...N.LNn...P?.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.310 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 C3 8A B0 28 45 CD 84   4E 85 BA 32 FF 4F 21 0F  ....(E..N..2.O!.
#     0010: 06 2A F2 E9 43 1A 72 B9   44 50 54 D1 53 DE 83 0B  .*..C.r.DPT.S...
#     0020: CB 78 28 28 9B 53 8C 31   7E C1 4D 54 80 E7 52 0F  .x((.S.1..MT..R.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.314 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.394 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9C 35 B1 B8 8A 5D 5D 5A 81 A0 C0 DC 56 70 3E 48 F9 3E C3 57 CA 2F 7D 8D 10 14 A5 BB 8E 95 A5 07",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 08:32:30.800 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 08:32:30.801 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 08:32:32.373; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:32:32.379; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:32:32.956; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:32.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:32.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:32.990 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B CA 2C 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:14.000 UTC",
#     "not  after"         : "2024-01-17 08:32:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#         0010: 4B EA B1 C5                                        K...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:32.994 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 F7 25 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:05.000 UTC",
#     "not  after"         : "2024-01-17 08:32:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:33.006 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.175 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.175 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.176 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.176 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.181 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.191 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.191 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.194 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD 2A C8 21 1E AA 92 25 B5 8F 78 C2 47 47 96 41 51 0E 9C F2 C2 E3 3F 39 32 2A 09 F0 D5 6E 30 B6",
#   "session id"          : "E2 DC C3 B4 2D 2A F0 2F 8F C2 01 C0 F9 5C DE C4 BD 48 CE 35 36 A8 D6 ED 88 BB F4 1D 8C B5 10 69",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 7B F7 D6 4E 23 25 F8   16 C1 52 2F 5A D0 0C 01  ....N#%...R/Z...
#             0010: EB 9D 8D 52 5E 16 A6 B1   1B DD 2D 9B 71 68 64 6A  ...R^.....-.qhdj
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.343 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4B 59 DE 59 26 E0 93 A8 AB 29 B3 5B FA 1B 4C 11 4D FE CB 49 FD F0 48 B5 96 A9 37 7A 2A 26 47 3F",
#   "session id"          : "E2 DC C3 B4 2D 2A F0 2F 8F C2 01 C0 F9 5C DE C4 BD 48 CE 35 36 A8 D6 ED 88 BB F4 1D 8C B5 10 69",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 53 73 EB BC 68 11 F8 C6   06 2F 2F ED A3 02 85 86  Ss..h....//.....
#           0010: 01 53 CC 3E AF 33 E3 5D   21 0F EB 41 49 33 5C 3E  .S.>.3.]!..AI3\>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.344 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.344 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.351 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.371 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.376 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.376 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.393 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.395 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.402 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.405 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.412 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.412 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.413 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.415 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.416 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.416 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.417 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.420 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E E5 0A 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:10.000 UTC",
#       "not  after"         : "2024-01-17 08:32:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 25 62 26 72 C1 22 BD   4E D0 9B 3A 1B 24 9B 36  A%b&r.".N..:.$.6
#           0010: A6 39 ED 37                                        .9.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.478 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 3D 75 F4 CA EC 13 BF   49 B1 79 BE 77 5F 79 95  /=u.....I.y.w_y.
#     0010: C6 4E D2 ED 13 85 66 DD   4E ED 6B FC FB C2 24 A4  .N....f.N.k...$.
#     0020: 20 5D 5E 52 08 BD F9 D6   05 26 F1 B3 31 04 F0 AA   ]^R.....&..1...
#     0030: C5 8D BA 35 B7 4B CE 46   EB 98 A8 10 68 1B E7 9B  ...5.K.F....h...
#     0040: DF 25 7A B4 93 98 74 56   78 07 A7 A6 92 E5 92 C4  .%z...tVx.......
#     0050: 99 BD 5F EC 9B 12 B8 C3   A6 F9 1F 56 9C A3 DB ED  .._........V....
#     0060: 3D A3 33 B8 30 04 AC D5   9A 2E 9B 28 5D 88 2A 58  =.3.0......(].*X
#     0070: B9 7F F4 F5 34 BF 00 CD   7F 71 7C A6 3A 95 8A 36  ....4....q..:..6
#     0080: 5A CF 07 CA 09 31 A2 1F   DC F3 C0 13 DA 96 AE 0C  Z....1..........
#     0090: CA 96 E6 80 71 1E B8 D5   AE E3 92 02 27 CD 12 9B  ....q.......'...
#     00A0: C8 A9 28 43 24 37 AE 05   93 BD B2 40 93 FD F6 30  ..(C$7.....@...0
#     00B0: DC A3 16 92 FB 47 DB E5   6F 22 E6 0B 81 36 50 AB  .....G..o"...6P.
#     00C0: 16 59 51 5E BF 8E 5C B4   3D EC 93 44 A1 19 B7 64  .YQ^..\.=..D...d
#     00D0: F2 8E 7E 9D CE B2 4E 44   07 F5 BF DA 76 42 27 99  ......ND....vB'.
#     00E0: E3 22 BC 1E 63 B5 61 46   0F 78 4F 42 1D 62 CF 94  ."..c.aF.xOB.b..
#     00F0: 7F 9C BC 05 7F D7 58 D8   96 DE 28 BD F0 C1 53 3E  ......X...(...S>
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.480 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C8 ED 85 7B 7D 0F 2E 8F   46 45 FE 6A 4D CE C2 DC  ........FE.jM...
#     0010: B2 9F B6 5D 53 B6 6A 84   4E A7 83 4F F9 23 BA EE  ...]S.j.N..O.#..
#     0020: B5 DD 08 A9 77 29 A2 DC   8F BE F7 9E 62 82 82 33  ....w)......b..3
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.481 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.485 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B CA 2C 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:14.000 UTC",
#       "not  after"         : "2024-01-17 08:32:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#           0010: 4B EA B1 C5                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.508 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 FF AD B0 28 EE 57 EA   AB DA A9 55 7C 45 B7 8F  ....(.W....U.E..
#     0010: C4 15 E9 78 AA 19 11 AB   40 A3 77 A5 E5 E0 7A 90  ...x....@.w...z.
#     0020: 5E F2 2B BD 76 D8 10 8E   AA BD 6A 7A 5F 20 58 76  ^.+.v.....jz_ Xv
#     0030: BC 3F 66 2D 3C AF 14 76   95 B6 87 0B B0 C7 E6 CD  .?f-<..v........
#     0040: 1E 50 3B 22 5C 89 05 B2   0B 3A 76 18 B9 B2 6A A2  .P;"\....:v...j.
#     0050: 0A F3 22 AA 93 D2 32 8D   F7 36 7B 7D 4E 22 20 12  .."...2..6..N" .
#     0060: 49 92 DF B3 7E BC 85 EE   52 A4 03 C2 2B F8 19 F5  I.......R...+...
#     0070: 94 2F 73 65 7C 43 17 85   49 61 DE 13 16 17 BD 7E  ./se.C..Ia......
#     0080: C9 18 F6 7F CA D3 81 6F   3C 63 07 21 2E 2A F2 83  .......o<c.!.*..
#     0090: 63 E6 4E EA 78 3A FB 76   F4 2B F7 E2 33 DA A7 01  c.N.x:.v.+..3...
#     00A0: C7 38 B5 CF 3E 31 40 1F   B2 AC F9 C9 C0 36 26 34  .8..>1@......6&4
#     00B0: D5 A7 64 A3 30 F9 0E F5   5D 6C 81 B5 C5 86 50 4D  ..d.0...]l....PM
#     00C0: 2B C8 C5 E0 F0 E9 04 04   AC CA B7 79 11 40 F2 85  +..........y.@..
#     00D0: D6 0A A8 CC F3 B0 89 AF   86 A4 0C 3E 6A 96 EB 92  ...........>j...
#     00E0: 10 5F 38 C3 73 A0 66 48   4E D2 4C 32 9C 8F E8 70  ._8.s.fHN.L2...p
#     00F0: CC A9 E6 BA 47 BC 3D 02   34 7B 62 DF 07 6C 29 B0  ....G.=.4.b..l).
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.509 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 70 9E 04 02 95 89 DD 4A   1A 68 8E C3 62 69 33 C5  p......J.h..bi3.
#     0010: 9A A3 EC 13 9B 8A 44 3C   CD 4A 96 E9 11 73 38 B2  ......D<.J...s8.
#     0020: 66 8A 64 6B 7C 9A B0 AB   BA 9B D2 D1 6E 17 C7 02  f.dk........n...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.510 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.576 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CF F6 45 0A EF 72 FD 84 EC 61 1B 88 40 ED 2B 0F 5D BA 76 59 E7 83 B8 C7 6F DF 70 45 B7 5F 94 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 08:32:34.087 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 08:32:34.087 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 08:32:46.779; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:47.116 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 F7 25 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:05.000 UTC",
#       "not  after"         : "2024-01-17 08:32:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:47.131 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.554 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.556 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.556 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.572 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.573 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.573 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.575 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "13 D1 28 09 5E 2F 6C 99 89 A3 87 B6 ED 47 4A 09 A2 EF E5 AE EB 59 51 8B 9A 8B 54 C7 E1 07 F4 BD",
#     "session id"          : "56 63 C4 02 ED 02 14 FC 15 B7 1D 09 E2 6A 2B E1 F4 16 16 17 82 26 04 8C 6A 8A 37 B6 79 19 AA 4E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4E B8 C2 D3 77 30 85 AA   DC 6B 8E FE 06 D7 76 C8  N...w0...k....v.
#               0010: A9 59 3D E3 96 72 FB C5   E2 B3 A3 10 C3 42 42 78  .Y=..r.......BBx
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.594 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CE 53 60 B2 F9 D8 2B 76 12 3C B1 F6 F3 EE B0 BE 27 5E B4 EB 7B 99 53 6F DB 68 63 C3 A4 97 22 58",
#     "session id"          : "56 63 C4 02 ED 02 14 FC 15 B7 1D 09 E2 6A 2B E1 F4 16 16 17 82 26 04 8C 6A 8A 37 B6 79 19 AA 4E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0F 72 2E CB 48 14 68 3E   96 1E 2A FD 15 57 34 5E  .r..H.h>..*..W4^
#             0010: 7E 56 E3 2E 78 63 CC A9   B2 5A 5D 42 D0 98 9D 01  .V..xc...Z]B....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.609 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.610 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.612 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14579ms
ok 78 stop command for single port in 18703ms
not ok 79 status detects locally running solr in 1570ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 8170ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1553ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2603ms
ok 83 copying files around in 7163ms
ok 84 upconfig in 2934ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1250ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 87 Cleanup in 2579ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 59s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5ak4q6jaqh5xg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8261 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8261/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([B6E24DF639530F76:8179B9E8019FD2D2]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.renewDelegationToken(TestSolrCloudWithDelegationTokens.java:136)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.verifyDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:346)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:365)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1767 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41465/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 22:22:06.621; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:22:06.625; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41465/solr] to [https://127.0.0.1:41465].
# WARN  - 2023-10-27 22:22:07.620; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 22:22:07.653; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16608ms
ok 74 start solr with client truststore and security manager in 18844ms
not ok 75 start solr with mTLS needed in 53756ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-c3D6Ur/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41465 [|]   [/]   [-]   [\]
# Started Solr server on port 41465 (pid=897824). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41466 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 41466 (pid=897989). Happy searching!
#
#     INFO  - 2023-10-27 22:23:08.282; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:23:08.291; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 22:23:08.979; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:08.981; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:08.981; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.038 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 43 FA 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:54.000 UTC",
#     "not  after"         : "2024-01-25 22:22:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#         0010: B9 73 B9 04                                        .s..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.042 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 DD 85 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:46.000 UTC",
#     "not  after"         : "2024-01-25 22:22:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.055 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.985 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:09.985 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.991 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.991 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:09.995 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.025 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 05 FF 3C 9D 91 D9 68 1C 0E 41 97 CF 52 03 F3 BB D9 42 49 EA B0 99 64 E0 A8 07 2D 7A D2 A7 A8",
#   "session id"          : "33 38 DB 26 EA DD 2F 06 42 AC CE 72 BD DC BE 36 04 54 97 23 29 BA 01 A7 C9 EF 22 41 9F AE 17 66",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E6 AE F3 2D D1 A1 77 AD   F4 81 A6 AB DC 12 64 27  ...-..w.......d'
#             0010: 8A 75 49 16 CB 84 EC 36   0C D2 70 FE 7C F5 D7 51  .uI....6..p....Q
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.185 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A4 F8 4D 5A 9E 13 AA F7 30 D7 D5 6C 2E 02 1E 56 B7 0A E0 4F E4 4E 10 A8 DA DF 5C CE 6C 9F 30 91",
#   "session id"          : "33 38 DB 26 EA DD 2F 06 42 AC CE 72 BD DC BE 36 04 54 97 23 29 BA 01 A7 C9 EF 22 41 9F AE 17 66",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5B B9 22 41 E3 C6 21 CD   D6 3A 18 BE 35 69 7B D5  [."A..!..:..5i..
#           0010: C6 AC 45 D7 51 4D C2 28   A5 6C 8A 35 9A C4 12 0D  ..E.QM.(.l.5....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.186 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.186 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.189 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.210 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.213 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.232 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.233 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.234 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.243 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.243 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.250 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.251 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.251 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.252 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.252 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.267 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 0D 01 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:50.000 UTC",
#       "not  after"         : "2024-01-25 22:22:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 18 C4 7A 39 0C 7A 85   E2 07 FD E5 81 7C E4 D8  ...z9.z.........
#           0010: 35 BE 12 33                                        5..3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.267 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.323 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.326 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 22 A4 D7 0B 9B FC 4A   6F 43 5F 8B 54 1C FD 0D  ,".....JoC_.T...
#     0010: 40 8B ED 1C C1 CF 42 64   A5 C4 D0 D8 82 DB 91 1C  @.....Bd........
#     0020: 81 97 1D F3 3D EE 2F 25   4A F6 EA 72 C8 C7 DE 86  ....=./%J..r....
#     0030: B7 4E 04 02 A9 FA 64 77   4B 28 A0 DE 0B 4A 46 53  .N....dwK(...JFS
#     0040: F3 EC E5 53 1C 4A A3 40   B1 8A 87 08 D4 DC 27 2E  ...S.J.@......'.
#     0050: 7A 47 EE 9A A6 5E 26 19   95 E2 86 75 A2 90 4A 45  zG...^&....u..JE
#     0060: 25 69 ED F6 5B B4 C0 65   7F 27 79 EC 93 DD 52 D9  %i..[..e.'y...R.
#     0070: 5B 51 EE 08 24 41 CF C3   7B 86 4C EE 49 24 03 88  [Q..$A....L.I$..
#     0080: BE 8B 9B DF 3E 96 E6 D6   F4 50 86 01 D2 4E A4 CE  ....>....P...N..
#     0090: EC 6A 1E E6 99 E7 74 BD   97 9A A9 88 27 56 6D 82  .j....t.....'Vm.
#     00A0: 12 F8 49 66 B4 EB 32 94   91 44 BC AD B6 E2 7A FA  ..If..2..D....z.
#     00B0: 9C 15 76 E8 12 05 6F 55   CB 1B 24 EE 6E 49 A3 DA  ..v...oU..$.nI..
#     00C0: 5E 5E 4F 90 6A 0B 20 44   42 09 95 D0 88 B7 52 11  ^^O.j. DB.....R.
#     00D0: 9D DC 99 43 9A 86 51 19   E3 F3 88 95 40 12 18 C8  ...C..Q.....@...
#     00E0: 3E 9D 55 27 9B F9 10 74   0D FB D1 85 FA 7C 45 CD  >.U'...t......E.
#     00F0: 78 C4 F3 0E 70 EF 7C 39   BF 06 16 DA F0 48 16 CB  x...p..9.....H..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.327 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 A5 D4 C9 DA 92 40 12   91 8B D8 8B 28 15 CE 2D  ......@.....(..-
#     0010: 11 76 6A 08 3D B6 54 AD   CD 60 2B 5B CA 4A 3C DD  .vj.=.T..`+[.J<.
#     0020: 36 AF 6B 1A 6A 67 CB 16   71 7A 92 61 F9 BC 6B BB  6.k.jg..qz.a..k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.336 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.337 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.349 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 43 FA 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:54.000 UTC",
#       "not  after"         : "2024-01-25 22:22:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#           0010: B9 73 B9 04                                        .s..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.410 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 66 8E 9E 7E B5 73 15   07 2B 46 73 3F A6 54 72  Uf....s..+Fs?.Tr
#     0010: 4D 13 FE 08 0C 2B 6E A0   0E A6 92 1A BC F9 99 B8  M....+n.........
#     0020: 8D 15 5C 2F 9F 54 B1 82   F1 BD 8A 16 A5 E8 3F 57  ..\/.T........?W
#     0030: 11 00 D0 DB 5A 07 E7 29   97 62 7D EA DB F5 95 00  ....Z..).b......
#     0040: BC 66 C9 39 8F 4E AE E0   45 CE 5D 51 42 D4 73 E7  .f.9.N..E.]QB.s.
#     0050: 58 B9 5E 15 3A E8 9E EF   23 36 7C 73 31 09 87 66  X.^.:...#6.s1..f
#     0060: 82 6D CB 44 59 69 02 8D   3E C8 E9 BB 33 FD 4A 2C  .m.DYi..>...3.J,
#     0070: 45 E0 72 07 C6 3E 83 CA   CA 46 10 FC D9 8E BC 2E  E.r..>...F......
#     0080: BE 67 B8 66 BD BA 81 B9   AF E8 D5 2A 6D 7C AA 50  .g.f.......*m..P
#     0090: E1 09 56 A7 C3 7C D7 DC   5A 10 DC 52 4F 5F 5C 54  ..V.....Z..RO_\T
#     00A0: D0 5D 5C DF FA 63 D7 75   C2 07 D0 20 B7 3B EE BF  .]\..c.u... .;..
#     00B0: 40 58 11 89 31 D3 D0 ED   BF 15 D6 79 2E E2 BC E7  @X..1......y....
#     00C0: 60 79 BF A9 E1 32 46 97   7F 53 91 95 A2 22 9F E7  `y...2F..S..."..
#     00D0: CC 29 FA 14 06 1B C0 62   7F 3F 79 32 C6 B6 01 97  .).....b.?y2....
#     00E0: 54 F6 69 45 13 02 D9 A2   75 F0 20 74 D6 23 12 98  T.iE....u. t.#..
#     00F0: A6 80 B1 84 4D 5C 93 35   40 F0 85 59 28 74 6B D7  ....M\.5@..Y(tk.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.411 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 1A FD D7 B4 96 49 4F   9F 27 09 8C 82 35 5D 9F  ......IO.'...5].
#     0010: 8C 8E A4 8A 87 61 26 D5   59 98 DE 06 BB 0C 2B 21  .....a&.Y.....+!
#     0020: 95 CA E3 7B F6 B6 6A 73   26 B8 FA 9C 85 E9 11 ED  ......js&.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.414 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.517 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A7 7F 32 B0 86 04 DC 17 8B E0 57 D4 B2 C3 49 00 B8 4D 5E A1 EF B9 E9 C5 E3 B5 E9 1B 5D 19 0B D5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 22:23:11.273 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 22:23:11.273 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 22:23:12.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:23:12.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 22:23:12.881; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:12.882; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:12.883; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.912 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 43 FA 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:54.000 UTC",
#     "not  after"         : "2024-01-25 22:22:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#         0010: B9 73 B9 04                                        .s..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.915 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 DD 85 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:46.000 UTC",
#     "not  after"         : "2024-01-25 22:22:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.926 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.240 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.241 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.242 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.242 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.246 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.255 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.255 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.256 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.257 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D6 4C C1 91 8A 04 85 65 85 87 35 36 05 B8 36 E0 EF 10 A9 08 6E 79 8A A0 CB 73 87 05 4D 7C 3D C8",
#   "session id"          : "A1 F6 2F 90 AB A8 F7 F6 E1 0C 02 14 CF 1B 46 9E 68 86 C5 03 79 14 D8 2B B4 15 98 84 E1 5F AE EC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2C F6 81 56 A9 0D 41 5D   05 62 5C 1C EF A8 17 E8  ,..V..A].b\.....
#             0010: 5F F4 04 32 23 61 7B 67   C3 29 23 22 5F A4 D8 08  _..2#a.g.)#"_...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E4 CC 45 75 1B BA 89 81 18 F1 78 2C EC 7C 41 D0 80 05 6A AC F1 44 8A B5 1E B8 27 4C 00 37 3E 03",
#   "session id"          : "A1 F6 2F 90 AB A8 F7 F6 E1 0C 02 14 CF 1B 46 9E 68 86 C5 03 79 14 D8 2B B4 15 98 84 E1 5F AE EC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E6 4C C9 0A 1F 64 91 A6   1C D2 B5 D7 70 EC D4 4B  .L...d......p..K
#           0010: 29 6E A1 2A 6C 7E 8C 58   85 BB 90 0B E1 4B 1B 35  )n.*l..X.....K.5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.376 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.377 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.383 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.389 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.389 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.390 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.403 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 0D 01 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:50.000 UTC",
#       "not  after"         : "2024-01-25 22:22:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 18 C4 7A 39 0C 7A 85   E2 07 FD E5 81 7C E4 D8  ...z9.z.........
#           0010: 35 BE 12 33                                        5..3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.403 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.477 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 CD 20 9F A9 E5 A6 55   B8 6E D0 36 B2 41 95 21  V. ....U.n.6.A.!
#     0010: 8E BF 94 54 75 2F 98 8D   B4 E6 0F D2 DA 9E AD 91  ...Tu/..........
#     0020: CB 02 FE 6A 58 94 7A 50   51 99 6B 24 CC FE F2 C5  ...jX.zPQ.k$....
#     0030: 0D 50 BF D0 96 49 EF 4C   2D B6 96 20 8D 91 5B F4  .P...I.L-.. ..[.
#     0040: 35 62 68 3F 29 39 FE FB   70 CA 2B FC F6 D8 E8 76  5bh?)9..p.+....v
#     0050: 37 82 54 B2 7E F9 E9 2F   8C 84 8D F4 90 E9 49 25  7.T..../......I%
#     0060: 93 93 EC 1C C0 49 AB 30   38 86 75 D8 F0 4C 81 7A  .....I.08.u..L.z
#     0070: D0 69 05 4E F2 FD 4B 56   92 46 5B F8 B7 48 B3 0C  .i.N..KV.F[..H..
#     0080: 37 2A B9 6B CD B9 67 05   A8 B5 B4 1B 62 CE 40 74  7*.k..g.....b.@t
#     0090: C7 55 CE B8 C2 DE F5 04   C5 F3 8A 89 20 7F B5 D4  .U.......... ...
#     00A0: 81 73 43 97 B9 B1 FA 1F   78 64 90 68 B4 2D 9A B6  .sC.....xd.h.-..
#     00B0: BE A1 67 E3 F1 07 DB 90   AA 2E F1 ED C5 B2 CB 2B  ..g............+
#     00C0: DF EA 46 D9 48 79 E0 96   5A 8A FB F4 0A B3 20 C9  ..F.Hy..Z..... .
#     00D0: 1B 6A 57 D0 83 EA 2D 1E   D6 A6 BF C3 F8 4A C4 D2  .jW...-......J..
#     00E0: 89 DE DA 48 A8 1F B8 A5   16 39 25 B6 D5 D3 0E B0  ...H.....9%.....
#     00F0: 18 A0 04 AE A9 A0 B1 25   18 A6 8B C3 CB 13 56 6A  .......%......Vj
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.478 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 81 F2 8D 24 BA 66 3F FF   B9 A2 3A 7D EC 1E FE 00  ...$.f?...:.....
#     0010: E4 D7 BF C9 09 18 1B 82   78 5E A1 BB 76 15 6D FB  ........x^..v.m.
#     0020: 15 98 CA F8 41 1F B0 98   F5 83 1A 30 7F 3D 31 18  ....A......0.=1.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.480 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.480 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.483 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 43 FA 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:54.000 UTC",
#       "not  after"         : "2024-01-25 22:22:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#           0010: B9 73 B9 04                                        .s..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.505 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 2D B9 EA F1 F4 79 90   03 D1 E4 B8 30 A9 99 91  5-....y.....0...
#     0010: F6 A8 67 81 5F 89 FE EA   32 3B 18 4C FE 6C F4 DA  ..g._...2;.L.l..
#     0020: E6 A9 A9 8F 3A 30 2A 7B   EF 01 CF 14 2D BB B0 22  ....:0*.....-.."
#     0030: 0B 0E AE 56 D1 2F F0 49   AD 3E 77 4E 78 BC B8 50  ...V./.I.>wNx..P
#     0040: 32 1D 47 CD 5F 0E 1E 8B   A2 9C CC 27 3B B8 EC DB  2.G._......';...
#     0050: 2B 68 C7 95 45 D9 2F A6   68 4A 65 DE 11 45 3F AF  +h..E./.hJe..E?.
#     0060: 11 1E BF F4 33 41 CD ED   8E EE 28 99 48 92 91 3A  ....3A....(.H..:
#     0070: FF 4D 14 27 09 2A E4 5A   70 ED 8A C8 4C FB 98 A2  .M.'.*.Zp...L...
#     0080: D8 26 31 18 FA 18 A2 DA   EB 0D 06 63 B1 9A 9B CD  .&1........c....
#     0090: EC 73 24 CF 36 DA DC F6   32 3A 13 2C 77 6D 4F DC  .s$.6...2:.,wmO.
#     00A0: 48 A0 B1 28 77 86 20 DD   CA AE 98 11 57 CF 53 8E  H..(w. .....W.S.
#     00B0: A6 08 B7 B2 10 6F 0E FA   EC 08 AE 4C 3B 1F 1A FC  .....o.....L;...
#     00C0: 49 98 23 8E 9B D1 A7 FA   29 9B 52 FB 19 8C 34 AC  I.#.....).R...4.
#     00D0: 47 F6 1A 09 CA 99 3E 41   C0 BC 03 88 C6 A6 F3 EA  G.....>A........
#     00E0: B7 FF 91 25 07 9C 7A 30   FC A3 5A 6C AB 6B 80 5F  ...%..z0..Zl.k._
#     00F0: 64 6F ED E7 11 85 2D BA   56 0E B2 98 46 B0 D6 77  do....-.V...F..w
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.506 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 01 CE 90 94 2C 6D 8A 97   50 8B D3 99 9F 04 97 EF  ....,m..P.......
#     0010: 16 0F E3 9C 46 74 FC 57   CE B3 6B 14 0D 10 93 1A  ....Ft.W..k.....
#     0020: 61 46 CA 48 DF 9F E0 74   61 38 25 61 DF 5A BA 69  aF.H...ta8%a.Z.i
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.506 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.965 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5B 48 5A 27 C2 A8 81 C6 E4 71 C5 28 9F 4E DA 60 6E 64 B9 08 F6 02 96 9F A6 C6 07 D3 95 F8 B0 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 22:23:14.225 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 22:23:14.226 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 22:23:26.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:27.294 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 DD 85 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:46.000 UTC",
#       "not  after"         : "2024-01-25 22:22:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:27.317 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.482 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.483 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.483 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.498 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B5 38 18 05 1D E2 01 65 E6 B1 64 2E E5 8C B4 0A 17 98 A9 EE 68 6B 8B AE 5B 6E CA E9 C8 C0 38 AC",
#     "session id"          : "E6 97 F9 83 93 12 CE E7 E0 62 2C 35 0E B4 04 0D 27 82 D7 6B 87 97 71 7B 01 84 98 B9 1C 86 13 F6",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 0A 1B 02 FE 66 1F FE 81   B7 43 49 C0 F5 79 BA 9A  ....f....CI..y..
#               0010: CC 79 06 A4 BF 11 82 7C   12 F5 AF 7D 91 EC C9 25  .y.............%
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.510 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D5 C9 CB 69 CE 33 BD 9B 8D B5 67 41 9A F6 6D 4E 9D 0D FB EB 4D B3 A2 00 23 CA BE 76 3C 86 09 8C",
#     "session id"          : "E6 97 F9 83 93 12 CE E7 E0 62 2C 35 0E B4 04 0D 27 82 D7 6B 87 97 71 7B 01 84 98 B9 1C 86 13 F6",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 71 5E EA 65 AD B4 E5 91   31 41 A6 1B 09 85 80 F4  q^.e....1A......
#             0010: EE A9 54 C4 6B 8E 29 63   73 3E C9 57 A5 33 F8 03  ..T.k.)cs>.W.3..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.511 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.511 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thr

[...truncated too long message...]

n.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:24:53.252 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.282 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41466/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 13602ms
ok 78 stop command for single port in 17342ms
ok 79 status detects locally running solr in 9246ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 6895ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 990ms
ok 82 listing out files in 2591ms
ok 83 copying files around in 6089ms
ok 84 upconfig in 2523ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1210ms
ok 87 Cleanup in 1951ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=B6E24DF639530F76 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 43s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/lopy3vznfho62

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8260 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8260/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43611/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 16:27:40.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:27:40.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43611/solr] to [https://127.0.0.1:43611].
# WARN  - 2023-10-27 16:27:41.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 16:27:41.882; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16772ms
ok 74 start solr with client truststore and security manager in 19312ms
not ok 75 start solr with mTLS needed in 54010ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-hupojE/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43611 [|]   [/]   [-]   [\]
# Started Solr server on port 43611 (pid=262829). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43612 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43612 (pid=262935). Happy searching!
#
#     INFO  - 2023-10-27 16:28:44.742; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:28:44.747; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 16:28:45.745; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:45.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:45.755; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.840 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 30 C6 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:29.000 UTC",
#     "not  after"         : "2024-01-25 16:28:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#         0010: 1E AF A5 1D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.848 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 A7 B3 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:21.000 UTC",
#     "not  after"         : "2024-01-25 16:28:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.875 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.294 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.294 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.296 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.296 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.325 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "03 5B AB CA 87 32 4D 5D E7 F4 86 97 7A 16 29 D8 92 A5 B2 7F B7 92 54 C1 D8 EE 24 7A AF F0 8D CD",
#   "session id"          : "04 38 C6 60 B4 52 1E 67 7C C8 45 CD 49 9D 0B 35 53 68 68 27 BA 14 4B 6F 01 19 CB DF 35 85 3B 1A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 8D 65 AF 3A 15 BA 80   69 E9 80 B2 5A 1B 4D 9B  ..e.:...i...Z.M.
#             0010: 80 E1 8A 10 CC 99 3D 73   5E 5E E6 F3 80 42 29 21  ......=s^^...B)!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.687 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B6 55 AF AA 58 7E E9 4B 01 13 6E AF B0 27 A2 22 54 0A 98 C5 89 52 28 72 8B F0 29 9E 70 62 AE 0A",
#   "session id"          : "04 38 C6 60 B4 52 1E 67 7C C8 45 CD 49 9D 0B 35 53 68 68 27 BA 14 4B 6F 01 19 CB DF 35 85 3B 1A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 80 59 5C 04 CC CF 12   88 97 89 8A F0 0F 88 36  ..Y\...........6
#           0010: 3E 17 1C 8F C9 53 0D B9   7E 7C F2 9A 94 5E BC 12  >....S.......^..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.688 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.688 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.710 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.711 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.712 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.715 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.715 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.718 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.718 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.719 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.719 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.731 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 C7 1C FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:25.000 UTC",
#       "not  after"         : "2024-01-25 16:28:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 97 B8 08 36 A9 28 90   84 D2 03 85 1C F2 12 CC  Y...6.(.........
#           0010: D0 33 94 12                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.731 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.788 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.788 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.789 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.789 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.815 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.817 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 83 81 DE 65 29 72 3A   FD BD 9F AB C8 FB 74 47  D...e)r:......tG
#     0010: 82 97 E3 96 96 E5 D5 C5   53 63 A1 CB 2C 2C 2F 18  ........Sc..,,/.
#     0020: ED 1F AE 21 03 30 C8 68   2A 67 90 1C BA ED 54 14  ...!.0.h*g....T.
#     0030: 20 CE FD A9 7F 11 53 7E   C8 D4 A7 2C DB E5 3F 45   .....S....,..?E
#     0040: 4C 14 F4 D2 A5 5D D4 93   A0 64 7E 33 1D 00 77 74  L....]...d.3..wt
#     0050: 56 E2 7E 00 CD 21 ED A3   4D 93 B3 3A 73 B0 B8 19  V....!..M..:s...
#     0060: 54 96 FC 27 C6 BC 2F 2D   4D 8F B2 9F 4D 6D 77 D3  T..'../-M...Mmw.
#     0070: 16 E7 B4 AD 56 0E 8F 4D   27 69 2D 82 38 13 79 ED  ....V..M'i-.8.y.
#     0080: 6A F1 F8 E4 ED F9 C4 3B   AC 5E 5C 35 7A 10 48 FD  j......;.^\5z.H.
#     0090: 04 40 C1 A4 5C BC 56 CD   2A 2C 72 CB 0F 3C C2 6C  .@..\.V.*,r..<.l
#     00A0: 64 9C 88 48 BE C4 3D 66   EA 17 B2 D3 C5 BE CD A5  d..H..=f........
#     00B0: E8 5C C6 36 30 CE A5 0A   C7 1A B4 5F 38 A9 E5 FA  .\.60......_8...
#     00C0: 77 30 0F 97 0A 30 76 52   E0 6F 1E A1 E4 2C 2B E6  w0...0vR.o...,+.
#     00D0: 79 6E 3B 10 CA 82 B3 D4   D5 D6 AC 42 F1 38 EE 20  yn;........B.8.
#     00E0: 74 A1 EE 23 8A CD 92 7D   8E C0 5C 09 EC 1F D5 AF  t..#......\.....
#     00F0: AD 81 10 B8 8C E7 48 F7   1B 18 2D 3B AD AE 55 E2  ......H...-;..U.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.818 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 75 F2 1B FD 6D A8 AA   63 04 78 1A 0B EA 60 A9  9u...m..c.x...`.
#     0010: 2A A2 ED 33 6C 80 66 78   84 2A E8 A0 3F 9E 3F C5  *..3l.fx.*..?.?.
#     0020: 85 09 DE DC 9D EA 6F D4   F4 6F B4 6F F1 FA AC 52  ......o..o.o...R
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.820 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.823 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 30 C6 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:29.000 UTC",
#       "not  after"         : "2024-01-25 16:28:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#           0010: 1E AF A5 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.844 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 3D FA 39 AF E0 35 A6   7A DC 3F 2C 45 7C 58 3A  2=.9..5.z.?,E.X:
#     0010: 83 8D 10 CF C0 03 BF 02   07 D2 7F 21 05 AF 99 77  ...........!...w
#     0020: 9A 11 65 96 8C F9 2A B3   2F 89 37 F2 B2 02 61 CA  ..e...*./.7...a.
#     0030: 21 81 C3 0E CA A2 95 0F   D3 B6 BF 33 12 C6 57 30  !..........3..W0
#     0040: 7C 18 1F D2 61 B7 40 74   BD 94 2E F7 20 2B 03 F2  ....a.@t.... +..
#     0050: C2 1B 75 88 39 51 AD 77   86 69 5B 9D 01 F8 B9 8D  ..u.9Q.w.i[.....
#     0060: 87 40 2E 81 BA 58 B6 95   4D E4 3D 10 EA 20 DF E0  .@...X..M.=.. ..
#     0070: 68 39 42 BC 1B 98 4C 82   B9 6E 53 27 1E E5 D3 BA  h9B...L..nS'....
#     0080: 43 02 73 91 FF E3 CA 3F   30 1C 54 2D F6 1C C4 AE  C.s....?0.T-....
#     0090: 74 5B 7F D3 38 93 AB D0   A2 FD 3E 8C A1 D8 F6 2C  t[..8.....>....,
#     00A0: 7F 36 EC A3 B5 20 BA A4   DC FB 25 EF CB 1B D1 D4  .6... ....%.....
#     00B0: E1 FD AC AD 6E 4E D2 39   16 7F C6 D1 FC 2D B2 8A  ....nN.9.....-..
#     00C0: 16 44 A8 B8 C6 F8 A6 AE   5D 62 BA C1 25 53 5A E0  .D......]b..%SZ.
#     00D0: 65 1D 29 2D D3 EF 34 10   21 0A 5D B4 CA 90 EF 2C  e.)-..4.!.]....,
#     00E0: F1 16 87 6F D3 E1 90 24   08 A0 40 DD CF 34 76 4B  ...o...$..@..4vK
#     00F0: 85 78 FF CF 2C C6 96 3B   64 80 25 31 79 68 84 A0  .x..,..;d.%1yh..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.845 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B D7 9B 90 38 3F D6 0B   91 F6 15 B7 BE 01 54 14  ....8?........T.
#     0010: 27 42 A1 37 FE E1 EB 9C   D7 F8 76 9F 02 12 5C 9B  'B.7......v...\.
#     0020: F1 65 98 F9 CD BF 1F 3F   45 EC 85 0D 55 8C 44 3D  .e.....?E...U.D=
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.846 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.911 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DD 65 DA D7 C3 05 D3 A7 50 3A 88 8B 24 D8 D8 5E EA E5 F7 45 A7 B2 7F 37 98 E8 D9 53 49 47 5C 45",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 16:28:47.152 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 16:28:47.153 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 16:28:48.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:28:48.277; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 16:28:48.588; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:48.590; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:48.591; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(ca,h=[localhost],a=[],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.626 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 30 C6 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:29.000 UTC",
#     "not  after"         : "2024-01-25 16:28:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#         0010: 1E AF A5 1D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.629 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 A7 B3 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:21.000 UTC",
#     "not  after"         : "2024-01-25 16:28:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.640 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.802 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.802 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.804 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.804 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.821 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E6 67 62 5E 94 49 FB 50 80 6E A2 2B 21 5A B7 BE 2B C6 F3 8C 45 5B 52 16 E8 D6 47 8A 02 00 BD 64",
#   "session id"          : "35 56 D2 B0 AF 0A 64 D3 EB 9C 11 C0 E3 E6 BD 74 3A CA 4D A6 C5 B8 6D 66 0B F7 D3 88 26 EB 37 6E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F7 3F 75 33 81 79 FF 70   BA 2E 4E 9D 00 9D 52 15  .?u3.y.p..N...R.
#             0010: 42 38 51 8E DD 62 34 8C   F8 46 E9 09 19 64 C5 15  B8Q..b4..F...d..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "91 D6 01 80 02 3A 8A 62 02 15 0F F9 67 F2 FF 8A 30 96 F1 40 95 11 6D 4D 12 50 A2 E3 D0 4F D8 F1",
#   "session id"          : "35 56 D2 B0 AF 0A 64 D3 EB 9C 11 C0 E3 E6 BD 74 3A CA 4D A6 C5 B8 6D 66 0B F7 D3 88 26 EB 37 6E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 93 BF F6 22 AD B9 B3 C1   00 0D 11 A3 F3 CF E5 90  ..."............
#           0010: D5 4E 33 1A 3B CA 8A AF   56 62 95 68 87 A0 75 65  .N3.;...Vb.h..ue
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.940 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.941 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.943 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.954 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.955 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.957 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 C7 1C FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:25.000 UTC",
#       "not  after"         : "2024-01-25 16:28:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 97 B8 08 36 A9 28 90   84 D2 03 85 1C F2 12 CC  Y...6.(.........
#           0010: D0 33 94 12                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.957 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.499 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.502 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 6C DD A4 E8 13 57 C3   C7 EC 84 DD 27 B2 7E 06  vl....W.....'...
#     0010: 5C DF 6C 93 90 51 1F 6A   2B EE 0D 89 86 87 BE 3F  \.l..Q.j+......?
#     0020: 17 1C 47 25 42 2D 84 73   DE 9D 78 D0 15 F6 9E 72  ..G%B-.s..x....r
#     0030: 20 AC F7 9B 55 2A 22 B7   F6 06 2E 67 0C A9 43 B8   ...U*"....g..C.
#     0040: F6 34 A2 70 B7 3C E8 37   82 04 09 3E 6E 06 64 67  .4.p.<.7...>n.dg
#     0050: B7 5F 92 38 59 98 08 7D   B8 C6 E7 E1 D5 D8 02 ED  ._.8Y...........
#     0060: A7 08 54 C5 77 82 81 01   FA 76 16 FC B3 36 65 15  ..T.w....v...6e.
#     0070: D4 08 F9 49 DA 74 6D DE   BD FB 77 E8 A7 2A BD 65  ...I.tm...w..*.e
#     0080: DF F5 60 2A 9E 45 E4 7C   8C 56 16 FB 47 67 F3 E9  ..`*.E...V..Gg..
#     0090: 48 92 42 F2 29 5C 06 0B   C3 8F 82 94 03 6B CB 7E  H.B.)\.......k..
#     00A0: 62 51 67 47 F2 8F 6C 1A   9E BD EF AC 4E C9 66 98  bQgG..l.....N.f.
#     00B0: 42 9F 81 FF E5 0B 17 37   1A 91 C0 69 4D 73 22 6F  B......7...iMs"o
#     00C0: FC 00 C3 AB 73 50 9D B3   56 EF C6 C8 34 83 BF 47  ....sP..V...4..G
#     00D0: D7 64 DB 5C 3A BB 49 77   35 77 30 3B 1D 91 27 2E  .d.\:.Iw5w0;..'.
#     00E0: 5C DF 9D EA 03 6B 0D 26   56 FA C6 BC DE 9E 87 A6  \....k.&V.......
#     00F0: 96 E5 73 B0 CF 20 18 24   3B FB 39 1F 52 4B D4 FB  ..s.. .$;.9.RK..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.504 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B6 07 93 7F 3C D8 9F 37   31 E8 0F 40 83 32 50 80  ....<..71..@.2P.
#     0010: 27 24 CE 80 EA F6 A2 D7   0C AB 2E CB 6A B0 3C E8  '$..........j.<.
#     0020: D2 83 F4 96 10 6C 04 D1   B9 E5 8D 9F 62 CF 6B CB  .....l......b.k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.505 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.507 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.510 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 30 C6 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:29.000 UTC",
#       "not  after"         : "2024-01-25 16:28:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#           0010: 1E AF A5 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.531 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 42 C5 BC A0 C6 B0 EF   73 3A D2 9A 73 72 C9 7D  xB......s:..sr..
#     0010: 70 EF 92 45 AE 7C 5B 6C   92 5F 2F 7F 44 6F 69 15  p..E..[l._/.Doi.
#     0020: 7D 84 92 81 82 E9 9E 80   43 FF 31 62 04 1E 71 5F  ........C.1b..q_
#     0030: 55 9B 42 17 83 8C 7A 6C   3C BF 5F CD 63 94 E6 B6  U.B...zl<._.c...
#     0040: 01 E4 ED D1 BE 96 80 44   0F 94 29 BB DB 7E 67 AD  .......D..)...g.
#     0050: B3 82 C4 4E 07 3E F0 1A   B8 35 E5 D4 00 48 FE 92  ...N.>...5...H..
#     0060: 7B 39 C3 11 45 83 51 6D   E4 87 65 09 9B 0F C8 24  .9..E.Qm..e....$
#     0070: 47 B9 8C D4 72 16 7C 74   B7 78 A1 F2 CE 60 53 FA  G...r..t.x...`S.
#     0080: A2 71 DE 0F 05 D4 E7 25   C7 1D 35 C9 B9 57 45 FB  .q.....%..5..WE.
#     0090: E0 1C D3 F1 61 15 93 1E   0B 21 9C 2D 7A EB 11 D5  ....a....!.-z...
#     00A0: 21 02 9A CD 43 1F E0 1A   EF E2 C0 DD 56 28 37 03  !...C.......V(7.
#     00B0: 0C 15 A9 8A B8 29 8A E5   0B 50 4B B2 EA 49 35 37  .....)...PK..I57
#     00C0: 3F 9E DC BC 24 20 6B 60   AF 44 A2 59 40 BE 65 28  ?...$ k`.D.Y@.e(
#     00D0: 18 18 1D B9 B1 EB DC 62   0F 87 2B C3 B7 35 EC 02  .......b..+..5..
#     00E0: D9 AF 1D 82 B9 27 D3 FE   85 7B 35 CA 4E 09 52 82  .....'....5.N.R.
#     00F0: 8A AC 57 E9 C7 E5 4F B0   CB C0 5A A5 C5 ED B6 B3  ..W...O...Z.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.532 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C 34 03 65 08 71 BA CA   AE 40 9F FE 41 27 E7 34  <4.e.q...@..A'.4
#     0010: 31 6B 5D 3C D9 E3 04 FA   12 3E EB AA 5E 1A 29 64  1k]<.....>..^.)d
#     0020: 05 03 E4 EA EB EA 72 0D   7A EF AC FD 0D F0 DE 8A  ......r.z.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.533 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.590 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "17 BA 21 2B 14 52 65 A0 F4 3E F4 E6 6B A3 8E E2 59 F9 50 65 D4 BF 49 74 FC D5 26 03 C8 FD 40 66",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 16:28:49.832 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 16:28:49.833 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 16:29:02.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 16:29:03.314 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 A7 B3 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:21.000 UTC",
#       "not  after"         : "2024-01-25 16:28:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 16:29:03.325 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.561 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.563 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.563 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.567 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.579 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D6 6D 25 93 60 E0 FB 03 63 90 64 AF 22 C2 0E 2F 2B FF 91 5A 62 06 F5 81 1E 4F 1F 6D 0E 91 84 5B",
#     "session id"          : "83 67 8C 4A D4 A5 39 3F 8A 9D 8A A8 CA 3B 35 63 EE A9 53 C9 D7 4B 1C 45 3B C6 1D 67 DB F0 45 6F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3B EE 46 AD 53 94 61 6E   40 E8 73 BE 1A 8E 7B EE  ;.F.S.an@.s.....
#               0010: E0 22 01 59 99 40 39 BE   28 B3 99 A0 7D 8C 16 25  .".Y.@9.(......%
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.595 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "32 0B 92 F0 2E 42 AF 18 13 B4 3D E0 56 6C 0F 00 D1 63 45 AF B9 36 42 B6 52 45 EC A0 DB 3C 75 F4",
#     "session id"          : "83 67 8C 4A D4 A5 39 3F 8A 9D 8A A8 CA 3B 35 63 EE A9 53 C9 D7 4B 1C 45 3B C6 1D 67 DB F0 45 6F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 49 5F 14 48 41 43 D3 50   2F 5B AD 58 02 2A AF 69  I_.HAC.P/[.X.*.i
#             0010: C8 2A 2C B2 96 8C 47 1D   F1 20 F6 43 4B 3C C3 66  .*,...G.. .CK<.f
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.596 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.598 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.598 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.610 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.611 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.612 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.618 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.619 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.619 UTC|SSLExtensions.java:215|Ignore impact of

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:30:15.540 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43612/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14034ms
ok 78 stop command for single port in 17277ms
ok 79 status detects locally running solr in 8913ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7666ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 984ms
ok 82 listing out files in 2870ms
ok 83 copying files around in 6150ms
ok 84 upconfig in 2463ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1220ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1219ms
ok 87 Cleanup in 1959ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 33s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7eofzritbgbuy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8259 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8259/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37031/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 12:58:04.632; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:58:04.636; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:37031/solr] to [https://127.0.0.1:37031].
# WARN  - 2023-10-27 12:58:05.770; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 12:58:05.820; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16272ms
ok 74 start solr with client truststore and security manager in 19120ms
not ok 75 start solr with mTLS needed in 53933ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lxoFfn/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 37031 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37031 (pid=3786610). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 37032 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37032 (pid=3786717). Happy searching!
#
#     INFO  - 2023-10-27 12:59:06.582; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:59:06.597; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:59:07.962; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:07.964; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:07.965; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(ca,h=[localhost],a=[],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.031 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F 16 8A BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:52.000 UTC",
#     "not  after"         : "2024-01-25 12:58:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#         0010: FC F6 4D 89                                        ..M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B F2 AD F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:44.000 UTC",
#     "not  after"         : "2024-01-25 12:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.050 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.251 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.251 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.267 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.267 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.286 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.324 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8A 2A 4D DF 3B 8C EE 40 00 80 B5 54 91 76 A3 D4 14 1F FC 15 D5 EE 2E 0D A9 F2 68 92 CD FA 70 02",
#   "session id"          : "74 44 7B 69 75 E5 6A 5B 89 96 A8 3F F8 4B D6 36 34 CE 7B 5B C9 DF 34 1D 34 1C 0E C8 C4 8B D9 F0",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1E EA A6 2A 0D D1 6D 3E   2B FD 79 04 F4 F1 2B 0D  ...*..m>+.y...+.
#             0010: 5E C5 78 06 C6 AD A1 CB   2B 88 C6 F9 45 14 60 21  ^.x.....+...E.`!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.862 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0E 88 DE 94 7F 4D 62 8C EF 5C CD 27 F3 AC 91 57 DC A7 C8 41 3C 8F 4F F7 62 4D B0 C0 CE 66 35 D5",
#   "session id"          : "74 44 7B 69 75 E5 6A 5B 89 96 A8 3F F8 4B D6 36 34 CE 7B 5B C9 DF 34 1D 34 1C 0E C8 C4 8B D9 F0",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A9 84 8B A9 35 41 0E 70   B8 B1 87 F9 CE 8D E9 66  ....5A.p.......f
#           0010: 37 E5 13 8B 2C A8 F0 25   3D 6A F7 74 70 CD 32 1A  7...,..%=j.tp.2.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.862 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.868 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.870 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.870 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.887 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.892 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.895 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.910 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 F8 FE 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:49.000 UTC",
#       "not  after"         : "2024-01-25 12:58:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 B2 16 B5 CD 1C 9A 0E   E8 D8 82 18 E2 18 D8 C8  ................
#           0010: 3C A2 3F 85                                        <.?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.910 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.001 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.010 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 17 8A 94 5C F5 A8 E6   84 E1 D3 70 A0 0E D4 FC  r...\......p....
#     0010: 2D 3F 93 A7 53 9C 56 44   2D C2 D6 A3 27 4D BF AF  -?..S.VD-...'M..
#     0020: 40 9A 6E DC A3 89 AF 97   F1 3C 8D D6 DA BB 03 08  @.n......<......
#     0030: F1 6D 52 1C 42 1A 95 9C   F2 C0 34 6E 81 C8 E3 A4  .mR.B.....4n....
#     0040: 61 D7 AF F7 25 5A C7 E0   B2 3B 4B E4 EB 50 24 54  a...%Z...;K..P$T
#     0050: B0 13 6D 46 CA 46 80 AE   56 D7 52 86 80 AD D1 4D  ..mF.F..V.R....M
#     0060: 0A 19 72 B1 56 5F 96 44   7A DD E5 3F 29 BF B7 5A  ..r.V_.Dz..?)..Z
#     0070: B8 7C 5D 0C 79 1C 3B 19   47 3C AF 4C E5 F7 67 1D  ..].y.;.G<.L..g.
#     0080: 5A E1 C4 C4 FD D5 29 16   2C 52 99 CF 2E 82 FD 9D  Z.....).,R......
#     0090: CB 60 67 17 87 44 31 09   23 D7 71 88 4B 68 6B 25  .`g..D1.#.q.Khk%
#     00A0: DB A8 1B 08 72 FF 25 0D   8F 7C 02 26 83 4B 37 37  ....r.%....&.K77
#     00B0: 2B F7 D7 BF 76 1B 46 A9   B2 99 AB 24 E9 8F 1B 95  +...v.F....$....
#     00C0: 7E 90 5C EB 3E FD 3C 09   2F 48 46 8F 4F CE 41 2F  ..\.>.<./HF.O.A/
#     00D0: 8A 7B 4E C5 23 59 58 16   DC 58 22 B0 81 16 AA 1F  ..N.#YX..X".....
#     00E0: C0 0A 0C 64 08 D2 5A EA   32 B0 E8 E7 54 53 E6 4D  ...d..Z.2...TS.M
#     00F0: 6F 89 D8 6F 3E 9F 0E B8   54 F1 AA B2 65 49 E3 56  o..o>...T...eI.V
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.012 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 63 97 4F EF D4 B0 FC 2D   6C 2F E8 44 A0 FC 36 C5  c.O....-l/.D..6.
#     0010: 75 57 87 A2 54 29 DA C4   CF F2 55 00 E6 09 B5 80  uW..T)....U.....
#     0020: 07 24 C2 A9 36 4D D0 E3   35 12 76 DD 01 24 FD A9  .$..6M..5.v..$..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.016 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.018 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.018 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.021 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F 16 8A BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:52.000 UTC",
#       "not  after"         : "2024-01-25 12:58:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#           0010: FC F6 4D 89                                        ..M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.066 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C 1C E3 46 6B E6 85 30   C6 C3 25 E2 26 57 0E 3D  l..Fk..0..%.&W.=
#     0010: E6 24 EE AB D8 B6 31 E2   2F 7B 9A AE 00 FE 21 E9  .$....1./.....!.
#     0020: CE 4F 12 02 AC 7C 9C F7   95 51 F7 49 34 E7 4C F0  .O.......Q.I4.L.
#     0030: 8D 65 35 08 E3 55 FC 65   DD D2 2A C8 BB 80 E7 96  .e5..U.e..*.....
#     0040: A7 EC 61 23 FC 18 74 EF   74 68 77 83 AB D0 48 05  ..a#..t.thw...H.
#     0050: 9B 23 4D C3 6E A2 D2 30   C4 F9 62 8A 30 15 F6 7F  .#M.n..0..b.0...
#     0060: 04 CE 61 31 39 5B 35 47   9C A3 57 D0 BA EE FA 66  ..a19[5G..W....f
#     0070: BF 5E 76 F9 85 5C 94 20   34 60 42 D8 CF 70 D0 C0  .^v..\. 4`B..p..
#     0080: 23 EF DA B8 99 E1 29 E7   46 3B F3 75 DC 87 E4 21  #.....).F;.u...!
#     0090: FB DC 05 22 31 05 4F 4D   35 2D 6A B3 73 B9 F6 60  ..."1.OM5-j.s..`
#     00A0: CA 24 04 55 B4 FC FF F2   F2 70 BF EE 37 D1 F4 AE  .$.U.....p..7...
#     00B0: D1 93 AC 20 44 F3 14 07   F4 D2 EB 48 A4 15 AF 6C  ... D......H...l
#     00C0: 0F 27 2C DE 34 16 1D CA   DE F4 6A 10 C6 A5 3E 67  .',.4.....j...>g
#     00D0: 41 80 A5 7F E6 3B B1 B7   AA 37 01 53 F8 C2 8F AD  A....;...7.S....
#     00E0: 2A C7 9B 23 D6 FA FD 2A   E4 BC 82 4C D4 19 11 86  *..#...*...L....
#     00F0: EC 24 DD A4 94 A4 71 01   C9 6A 95 96 FF FF 80 F5  .$....q..j......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.067 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 23 9B EE A3 62 D8 76   E3 F6 B1 95 6F 16 06 80  .#...b.v....o...
#     0010: 68 25 60 F7 03 51 28 8C   B4 1E 8C E5 BD 0F 96 BF  h%`..Q(.........
#     0020: D4 29 0B FD 28 99 59 47   80 5E 2D D0 37 50 A7 9A  .)..(.YG.^-.7P..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.071 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.154 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7E E9 17 7F B5 6F 7F 69 30 74 E6 4C 03 2E 00 AF 8E 99 EA 16 C3 C7 A5 12 C9 63 96 DA 45 E7 FF F2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:59:09.863 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:59:09.863 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 12:59:10.746; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:59:10.749; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:59:11.060; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:11.062; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:11.063; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F 16 8A BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:52.000 UTC",
#     "not  after"         : "2024-01-25 12:58:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#         0010: FC F6 4D 89                                        ..M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.098 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B F2 AD F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:44.000 UTC",
#     "not  after"         : "2024-01-25 12:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.109 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.259 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.260 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.436 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E3 A7 B5 A4 1C 92 5D 8C C3 0E ED 53 24 1D AB D1 A2 8A 89 3D 39 33 A3 23 13 70 84 86 06 89 34 6B",
#   "session id"          : "65 D3 A7 57 14 64 7F 56 39 00 7A B3 ED 00 42 33 4F CA 90 01 35 D6 9D 39 56 26 95 3E F6 37 1B 81",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2A 16 B8 5F 28 D6 B8 3B   C3 DC D0 7E 8C 82 96 A6  *.._(..;........
#             0010: 1E EA 1D 44 0D 0F 7A B3   39 1A 33 D3 E3 24 D7 14  ...D..z.9.3..$..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 C4 0F 6F CD 40 1A 85 C5 7A 05 AB 9A 38 76 97 60 92 D5 0B 69 D1 1F 5C 8C 95 54 80 C7 FA F9 C7",
#   "session id"          : "65 D3 A7 57 14 64 7F 56 39 00 7A B3 ED 00 42 33 4F CA 90 01 35 D6 9D 39 56 26 95 3E F6 37 1B 81",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EA A1 09 C1 D9 77 C2 86   1F 38 B9 C4 5B 50 FF 3F  .....w...8..[P.?
#           0010: 40 9D A5 11 B2 E1 B2 6C   CA 76 3A E9 D3 F6 DA 6D  @......l.v:....m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.527 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.548 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.551 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.561 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.567 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.568 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.568 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.570 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 F8 FE 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:49.000 UTC",
#       "not  after"         : "2024-01-25 12:58:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 B2 16 B5 CD 1C 9A 0E   E8 D8 82 18 E2 18 D8 C8  ................
#           0010: 3C A2 3F 85                                        <.?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.570 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.619 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.621 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E EE 6E DF 90 3D 3E 99   C6 71 4C 5C 09 71 30 E2  ^.n..=>..qL\.q0.
#     0010: D7 08 B6 45 B2 11 60 39   C0 B8 D3 05 04 2D 87 D2  ...E..`9.....-..
#     0020: 33 E8 F2 A2 2D 58 CB 81   CD 31 44 B5 83 59 CB 4E  3...-X...1D..Y.N
#     0030: BF E4 09 17 79 09 0A 63   CB 21 F0 5C 9F FC 96 01  ....y..c.!.\....
#     0040: D4 77 91 05 80 46 53 1E   B3 0A D6 98 B1 4F FD 63  .w...FS......O.c
#     0050: 91 36 84 EE 1B 08 A5 68   AA 2B 8F 91 B7 D9 8E E8  .6.....h.+......
#     0060: 50 7D 61 FF 94 35 4F 94   8E 55 B9 F6 A2 09 D2 8A  P.a..5O..U......
#     0070: E8 D9 30 F9 97 10 4A 32   9E E4 7B F1 1B 29 A1 9A  ..0...J2.....)..
#     0080: 58 90 3B BA CA 4A DE F3   4D 00 47 8F 54 B0 D7 9E  X.;..J..M.G.T...
#     0090: 83 FB C7 A3 19 6A 55 17   6C 57 2F 86 95 B6 E1 AA  .....jU.lW/.....
#     00A0: 5B 30 D5 DE F1 5D 0B 70   1E D1 0E 72 EA 40 0E 00  [0...].p...r.@..
#     00B0: 9B 69 DE 01 0D 7A 16 42   12 2A C3 D7 AF A6 A4 79  .i...z.B.*.....y
#     00C0: 4A 12 CC B1 37 79 06 14   9C F2 71 A5 4B 17 8E B1  J...7y....q.K...
#     00D0: 12 66 BB 45 29 92 AB 51   C2 28 79 80 7A D6 D9 25  .f.E)..Q.(y.z..%
#     00E0: BC D8 FC A7 0D C7 B6 4B   0E A2 17 4B AF B5 1B B2  .......K...K....
#     00F0: 8E AD 5D F4 5C 24 0F 9F   37 75 9F 67 49 1C BA BE  ..].\$..7u.gI...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.623 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 A4 33 25 51 7D D0 F3   D6 0C A0 C3 71 42 60 2D  ..3%Q.......qB`-
#     0010: 6F B0 31 02 C6 F8 85 CD   14 86 99 AD CD 9C A2 7C  o.1.............
#     0020: 49 44 23 C5 8D BD EC DD   D2 EF B6 96 DD BD 46 3C  ID#...........F<
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.625 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.627 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.627 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.629 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F 16 8A BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:52.000 UTC",
#       "not  after"         : "2024-01-25 12:58:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#           0010: FC F6 4D 89                                        ..M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.652 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 C6 5F C6 8C FA BA 40   CB 0F 54 47 84 10 67 5E  .._....@..TG..g^
#     0010: 5F 95 A0 B1 6D EB 5C 26   4F 1B A7 16 0D 80 1C C9  _...m.\&O.......
#     0020: 0B A8 8E BB F5 92 AE DC   88 1C 85 28 8A 7F C2 6F  ...........(...o
#     0030: D6 69 78 4A ED 11 E1 89   98 53 8A C0 3E C6 5B 42  .ixJ.....S..>.[B
#     0040: 3D 1C 43 FB B3 08 76 27   FB DB A9 15 8B 37 B3 47  =.C...v'.....7.G
#     0050: 81 26 30 E2 F3 46 74 83   2B 55 0E 45 7B E3 EF 23  .&0..Ft.+U.E...#
#     0060: 5B 0A E0 A5 13 9E 31 24   57 F7 20 06 1C 9A 03 3B  [.....1$W. ....;
#     0070: 66 29 C3 55 E7 5F 9D EE   D7 11 4A 6C 43 E8 CE C2  f).U._....JlC...
#     0080: 7A 90 37 DD CD 46 E0 2C   4E 79 C2 EE A5 70 C5 6F  z.7..F.,Ny...p.o
#     0090: 5D 3C B6 EC 7B 88 5E C1   34 5A C0 BC DD 20 F2 BF  ]<....^.4Z... ..
#     00A0: 3F 13 52 60 05 63 A5 53   C5 E0 CF F6 7C 5B 6C D5  ?.R`.c.S.....[l.
#     00B0: D2 48 1D E4 9C B5 CF F8   F0 8C E4 B0 76 A2 11 49  .H..........v..I
#     00C0: 5D 15 0B EA F6 E6 D6 E0   30 EE A3 01 66 7A 29 BE  ].......0...fz).
#     00D0: A3 F5 26 62 73 12 E6 C1   AB 8B BE 98 66 41 75 D8  ..&bs.......fAu.
#     00E0: 4D 5C 54 94 5A 93 95 82   93 02 03 A3 CF 24 48 D0  M\T.Z........$H.
#     00F0: BF 98 CE BF B0 B3 96 38   32 82 D6 35 6C DB 4A 12  .......82..5l.J.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.653 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 36 AB 05 BF E5 BA 30   FF FD 14 4B 17 02 A8 66  .6.....0...K...f
#     0010: EA 14 42 C5 EA 0D 51 A4   2E DC 9B 46 F7 CA C1 FB  ..B...Q....F....
#     0020: AC B9 5F DB 8B E8 C9 E7   64 1A DB A7 4B CB 6E 99  .._.....d...K.n.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.653 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.715 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3A BD E2 8E BE 63 37 45 E3 36 06 98 7C 45 94 83 68 1C 76 E6 E1 2D 4E AF 46 A1 B5 43 B5 B7 A2 CE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:59:12.250 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:59:12.251 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.281 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 12:59:24.979; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:25.409 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B F2 AD F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:44.000 UTC",
#       "not  after"         : "2024-01-25 12:58:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:25.421 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.700 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.701 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.702 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.705 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.714 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.715 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.716 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6E E7 24 5A E4 6B B1 0A 82 CD 80 9C 1F 12 6E 8A 65 4E CB 7E 17 02 9C 47 82 BB 7A 57 A7 26 46 CA",
#     "session id"          : "26 9D DA BA B6 77 A1 AB C3 3E D3 51 6F 9E 17 36 42 7F 30 A4 98 5D 57 21 4F 25 A6 AA 55 AE 77 AC",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 09 9D E7 29 0D 3D B6 26   3A 7F 02 CF 87 C7 92 90  ...).=.&:.......
#               0010: BB 56 67 90 2F C2 9A EC   45 69 6A A3 8B 7F 87 28  .Vg./...Eij....(
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.728 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "41 D4 A1 18 27 F8 CA 79 9E 7E 25 F4 7C EB 32 AB 6D 4B 6D F3 1E 2F B5 2E 7F 9F 30 C6 8B C5 00 8A",
#     "session id"          : "26 9D DA BA B6 77 A1 AB C3 3E D3 51 6F 9E 17 36 42 7F 30 A4 98 5D 57 21 4F 25 A6 AA 55 AE 77 AC",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA BF DF 9E F8 A3 E7 F7   18 65 8B 9E 29 4F 59 F2  .........e..)OY.
#             0010: F0 74 FE D5 41 80 E4 76   41 F1 F4 B4 99 68 31 24  .t..A..vA....h1$
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.739 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.740 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.741 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.746 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.746 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.747 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.747 UTC|SSLExtensions.java:215|Ignore impact of unsupported extensio

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 13:00:43.523 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37032/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14635ms
ok 78 stop command for single port in 17649ms
ok 79 status detects locally running solr in 8828ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7196ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 991ms
ok 82 listing out files in 2866ms
ok 83 copying files around in 6202ms
ok 84 upconfig in 2485ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 87 Cleanup in 1988ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 44s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/er3lvrdtfmt7m

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8258 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8258/

All tests passed

Build Log:
[...truncated 1160 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40949/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 09:39:28.468; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:39:28.473; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40949/solr] to [https://127.0.0.1:40949].
# WARN  - 2023-10-27 09:39:29.308; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 09:39:29.364; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17189ms
ok 74 start solr with client truststore and security manager in 19214ms
not ok 75 start solr with mTLS needed in 53721ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-oWgAsW/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40949 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40949 (pid=3436441). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40950 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40950 (pid=3436563). Happy searching!
#
#     INFO  - 2023-10-27 09:40:31.544; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:40:31.548; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 09:40:32.614; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:32.616; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:32.617; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.652 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 FF 2D BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:17.000 UTC",
#     "not  after"         : "2024-01-25 09:40:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#         0010: 6C 66 DB 91                                        lf..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.656 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 CD 5B E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:08.000 UTC",
#     "not  after"         : "2024-01-25 09:40:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.668 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.186 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.186 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.190 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.191 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.196 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.211 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.211 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.214 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.219 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD F0 EC 04 B6 F6 C3 3C EB E8 26 77 E5 EC FD 6F 8B AA D4 C4 7E 55 F8 0C 5E 74 54 62 3D E3 DE 4D",
#   "session id"          : "5D 1E C0 E9 24 7F 71 23 B5 A4 03 0A 2F 73 16 DC A4 CC 25 E9 2F 2D 69 B1 49 03 42 38 8B 3D 27 E8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC 2A A7 CE 9A 4E 10 DB   68 C5 28 16 6A CC 4E 05  .*...N..h.(.j.N.
#             0010: D8 AD C5 8F 3B 14 1C 5A   57 21 BA 4E B9 0C 9C 4F  ....;..ZW!.N...O
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F 46 08 8C 62 55 33 16 A9 81 5A F0 63 FD ED 17 BE 86 92 07 01 59 0A 84 B1 95 EF E3 20 F6 A2 04",
#   "session id"          : "5D 1E C0 E9 24 7F 71 23 B5 A4 03 0A 2F 73 16 DC A4 CC 25 E9 2F 2D 69 B1 49 03 42 38 8B 3D 27 E8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 11 B0 31 3B 9A 43 86 21   1F 45 96 BD C2 58 25 CE  ..1;.C.!.E...X%.
#           0010: EC 72 4E 06 98 A8 C0 48   19 D5 2C 40 A0 82 88 1C  .rN....H..,@....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.402 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.404 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.405 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.419 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.421 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.424 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.436 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 C4 25 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:13.000 UTC",
#       "not  after"         : "2024-01-25 09:40:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 62 67 10 16 AE 5F 3A   E3 BC 9D D5 60 61 CE C4  .bg..._:....`a..
#           0010: AE EE 2F 08                                        ../.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.436 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.539 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.792 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D 8A 34 11 13 D5 82 91   DC 50 36 C2 62 3F 38 91  ..4......P6.b?8.
#     0010: E5 25 EE E5 F3 88 94 47   BA D4 87 A4 09 1E 3C 51  .%.....G......<Q
#     0020: 42 02 18 CB 7D B6 73 6D   42 A8 AC A5 11 E1 D1 28  B.....smB......(
#     0030: E6 83 90 1D 3A 8E C5 F0   20 40 B0 0A 9B 8E 55 00  ....:... @....U.
#     0040: ED 0E C3 D8 10 95 C6 4E   41 B4 86 4F 2D D8 27 B0  .......NA..O-.'.
#     0050: 8E 6C 9F EF 54 80 1E BD   78 E6 87 FE CB 1E CF 43  .l..T...x......C
#     0060: 79 4D 36 24 9A EB 11 F6   DC 45 8C 9D 80 CE 3C FF  yM6$.....E....<.
#     0070: 12 59 4B 3B AE 2B 46 F3   B2 D5 C3 D7 46 6A ED B5  .YK;.+F.....Fj..
#     0080: 4C 59 EC 65 17 D7 3E 95   31 F9 BE 2B 0D 5F 48 0B  LY.e..>.1..+._H.
#     0090: 42 70 25 09 A0 65 3C 8D   28 46 72 03 FA A2 68 53  Bp%..e<.(Fr...hS
#     00A0: 36 25 73 B2 8C EF 42 22   A9 ED 16 7E A8 C7 26 05  6%s...B"......&.
#     00B0: 6E 8E EF 08 8C 01 9C E1   77 B4 29 D4 68 9C 51 C1  n.......w.).h.Q.
#     00C0: B0 8F AA 07 B0 30 41 6F   A5 7B B8 9C B8 14 C8 C4  .....0Ao........
#     00D0: 3C 1D 9D 69 58 E6 F6 6A   43 E7 F0 A7 34 E8 57 0E  <..iX..jC...4.W.
#     00E0: 85 1A DD D7 34 17 C5 59   96 17 55 3D 18 E7 19 5D  ....4..Y..U=...]
#     00F0: FE 1A 22 78 76 A1 71 AE   2D F3 B9 02 4A 0B 6A 6F  .."xv.q.-...J.jo
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.794 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AD 26 FA 71 AF 9D 54 BA   84 EB 50 19 0A 76 31 BB  .&.q..T...P..v1.
#     0010: AA 9E 63 43 C4 E2 8D 24   88 A2 25 4A 20 99 57 B6  ..cC...$..%J .W.
#     0020: 3F 1B 70 C4 AB EC 30 21   99 4D 92 99 56 62 F8 30  ?.p...0!.M..Vb.0
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.823 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.830 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 FF 2D BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:17.000 UTC",
#       "not  after"         : "2024-01-25 09:40:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#           0010: 6C 66 DB 91                                        lf..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.901 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C 85 A2 74 33 32 F4 26   86 71 B8 3E D9 EB 63 41  <..t32.&.q.>..cA
#     0010: 8B F2 5C 1B 54 88 74 84   E3 0F 6C D0 B2 53 2C B2  ..\.T.t...l..S,.
#     0020: 0A CA 6C 81 D7 EA 53 A2   0C DF E8 AC 5D 26 E2 08  ..l...S.....]&..
#     0030: F4 DC D9 51 08 EE C9 4A   87 48 31 02 B2 B1 C1 F1  ...Q...J.H1.....
#     0040: 19 D2 9E 19 6D AC A3 29   CB 81 F3 9B D4 BC FD 79  ....m..).......y
#     0050: E0 27 B4 02 97 F3 8E D5   30 C1 4E BA 18 A1 59 7A  .'......0.N...Yz
#     0060: 1F FD D8 5C F5 5C 6A 4C   04 C6 34 67 A9 0A 81 07  ...\.\jL..4g....
#     0070: CA F0 66 48 02 47 E9 10   21 D3 05 62 78 50 FC 75  ..fH.G..!..bxP.u
#     0080: 87 86 20 4A B2 E2 6F 21   50 A8 82 DE 75 86 06 55  .. J..o!P...u..U
#     0090: EE 4D 58 7B 23 C6 F3 0D   62 04 9D D5 05 62 6B B2  .MX.#...b....bk.
#     00A0: 3B 87 4A 07 4D FC A4 D8   43 3B D7 05 52 B5 8C 5D  ;.J.M...C;..R..]
#     00B0: 31 25 2E 29 B0 CD 0B 50   89 50 0F 80 ED B9 6B F3  1%.)...P.P....k.
#     00C0: 91 C7 6E 86 98 21 4F FB   C9 1E 0D 81 97 BA 14 01  ..n..!O.........
#     00D0: CA 81 6A 74 CE B8 BC 77   DF A1 6F 67 F0 BE 6D 38  ..jt...w..og..m8
#     00E0: B8 72 EC 57 CA EC 6F 08   F9 BB EB 81 99 B7 EA 33  .r.W..o........3
#     00F0: 3E 97 48 59 36 7E BF 4E   31 7E C6 A5 6A 9D C6 D1  >.HY6..N1...j...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.905 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 4C 13 8E C0 66 44 4F   F9 D5 85 69 BE 83 05 97  OL...fDO...i....
#     0010: F4 14 78 7D 68 D9 41 70   A5 B8 D9 AA 59 28 50 B8  ..x.h.Ap....Y(P.
#     0020: 3D 23 38 81 0C B2 04 E2   27 7F F8 B2 58 21 06 26  =#8.....'...X!.&
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.909 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:34.005 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "51 5B 56 87 33 06 B5 9E AC 40 DA F7 A9 DB A2 74 9E 6D E7 35 D0 15 02 6B BD 66 8C 15 C7 0D C4 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-27 09:40:34.763 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 09:40:34.764 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-27 09:40:34.781 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-27 09:40:35.726; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:40:35.755; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 09:40:36.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:36.258; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:36.258; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.294 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 FF 2D BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:17.000 UTC",
#     "not  after"         : "2024-01-25 09:40:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#         0010: 6C 66 DB 91                                        lf..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.298 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 CD 5B E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:08.000 UTC",
#     "not  after"         : "2024-01-25 09:40:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.310 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.481 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.481 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.483 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.484 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.503 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F1 AC 03 5C 38 F3 A3 6A 0E BC 48 AA 9A 4E 4E FE 93 8D 8B F6 17 50 64 6B B9 66 0D DC EA C4 6A 27",
#   "session id"          : "4E AE D6 B4 E6 91 CA 04 67 0D 14 79 DA 05 F6 1F 80 06 D2 34 B1 50 37 B3 7D 70 B0 D2 2D D2 A6 5B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2A 35 C0 E8 FB 48 DA 5B   D1 0B 8A 2C 86 89 DE 83  *5...H.[...,....
#             0010: 0E 43 F7 8F 6A 80 B8 BF   E6 2C B0 48 C0 54 1B 67  .C..j....,.H.T.g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A7 35 99 21 F8 EE 88 68 7F 88 97 15 B0 9A 40 34 13 DA AB 92 D3 0B 63 F5 2C C8 32 F2 31 B3 61 78",
#   "session id"          : "4E AE D6 B4 E6 91 CA 04 67 0D 14 79 DA 05 F6 1F 80 06 D2 34 B1 50 37 B3 7D 70 B0 D2 2D D2 A6 5B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 98 3D 26 A4 B9 72 25 CF   80 7F 6B AA 12 6E 4B 30  .=&..r%...k..nK0
#           0010: F0 A4 37 75 18 ED 03 2B   54 99 2C E9 E4 78 B6 70  ..7u...+T.,..x.p
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.650 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.651 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.680 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.681 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.682 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.685 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.687 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.698 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 C4 25 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:13.000 UTC",
#       "not  after"         : "2024-01-25 09:40:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 62 67 10 16 AE 5F 3A   E3 BC 9D D5 60 61 CE C4  .bg..._:....`a..
#           0010: AE EE 2F 08                                        ../.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.698 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.759 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.762 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E B0 0F EE 1B E2 12 01   47 5C 6A 2D 7B 8B D9 44  n.......G\j-...D
#     0010: F0 1F C5 BA 94 79 82 F3   59 0A 3D 9E 16 BE C2 C9  .....y..Y.=.....
#     0020: 6C 3A 5B 0A 72 EB 1B E1   75 72 3F 9C 69 CE CC 86  l:[.r...ur?.i...
#     0030: 61 F4 87 B8 DB E7 91 9E   6B 8B 65 B2 82 D2 75 DE  a.......k.e...u.
#     0040: 0F 33 EC 8F 96 17 CA C1   B6 F6 7C 73 71 BF 58 35  .3.........sq.X5
#     0050: C9 4D 0C 4D 8F D6 4F F8   91 D9 A7 85 6E CC E9 2D  .M.M..O.....n..-
#     0060: DA 25 9F 2D 2A 94 1B C3   94 DF 88 06 40 BF 2E 22  .%.-*.......@.."
#     0070: AB 05 25 93 86 1C 69 A1   72 42 7E 98 67 11 3C C9  ..%...i.rB..g.<.
#     0080: 64 8E F4 DF 66 E1 2E D0   D0 48 29 5A FF CD 10 57  d...f....H)Z...W
#     0090: 71 F6 19 7B 73 59 1F 68   50 D7 21 CA B9 A8 80 DD  q...sY.hP.!.....
#     00A0: E3 CE B0 29 D2 36 7D F3   98 79 B8 C5 02 81 42 26  ...).6...y....B&
#     00B0: D6 82 91 7C C9 40 B6 95   85 D0 EF 39 EF 75 56 75  .....@.....9.uVu
#     00C0: C8 7E A7 B5 53 66 EE 04   15 71 94 BE 72 F7 22 ED  ....Sf...q..r.".
#     00D0: AD F6 0F 85 AC E6 6C 98   6A 79 92 86 41 DB ED 20  ......l.jy..A..
#     00E0: A2 1A EE 5B 2A 55 50 FF   43 BA A8 DD 09 89 F7 B4  ...[*UP.C.......
#     00F0: 74 DE 21 90 1A 3A 48 CF   70 49 0B 2D 6A 49 79 86  t.!..:H.pI.-jIy.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.764 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A2 33 6E 67 33 B4 2B 5D   0A F7 7B 47 89 CF F6 46  .3ng3.+]...G...F
#     0010: 7F 40 30 70 AE 12 6F 47   94 B7 A3 23 54 93 1A 1D  .@0p..oG...#T...
#     0020: 6E 2E 78 7E 15 59 BA 50   34 61 59 B3 7E 27 07 BB  n.x..Y.P4aY..'..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.765 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.766 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.768 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.769 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 FF 2D BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:17.000 UTC",
#       "not  after"         : "2024-01-25 09:40:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#           0010: 6C 66 DB 91                                        lf..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.794 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C2 0F 7D 4A 3B 5D 7C 46   38 39 FF D6 40 67 F0 96  ...J;].F89..@g..
#     0010: 48 9D 72 1A 01 77 A7 F9   B4 03 E6 6F 44 CF B3 01  H.r..w.....oD...
#     0020: A3 B3 1D DD EB 11 59 EB   DC 0A A0 56 62 63 9A 1B  ......Y....Vbc..
#     0030: 00 52 74 C2 94 D3 CA 43   46 67 7B 83 17 03 2A D2  .Rt....CFg....*.
#     0040: 89 37 AD 99 D5 E7 25 23   B4 1D CF 6C 4B A3 C8 5D  .7....%#...lK..]
#     0050: DC 78 B2 0A B1 CC EC 30   EF 37 33 1B 84 1D BD 18  .x.....0.73.....
#     0060: 08 E9 6B 28 24 65 86 B7   41 D2 63 92 91 10 E2 B0  ..k($e..A.c.....
#     0070: AC 24 AD 62 F1 55 FA 3F   7A 84 DC 54 CE D6 C8 69  .$.b.U.?z..T...i
#     0080: D6 BE 44 3A FC 5A 72 48   FE D1 0A 77 44 C4 9D 5D  ..D:.ZrH...wD..]
#     0090: 8F A7 87 F0 9A 46 D6 85   51 C6 5C 8D A7 C8 33 32  .....F..Q.\...32
#     00A0: BC EF CC CF 8E 65 1E C1   EE 2E 90 D2 E2 C0 C3 92  .....e..........
#     00B0: F3 C5 08 38 3A 40 C8 EB   7B C2 9E 6D 14 72 25 2A  ...8:@.....m.r%*
#     00C0: 72 B3 03 50 01 F5 A2 05   33 36 A3 55 C4 69 4C D8  r..P....36.U.iL.
#     00D0: 87 38 62 B0 57 5E 1D CD   87 62 A4 42 B7 FD 60 40  .8b.W^...b.B..`@
#     00E0: 15 B6 B2 EE 24 67 97 36   FE A0 96 E5 85 96 9B A6  ....$g.6........
#     00F0: 6F F1 11 6D 90 3D 3D B0   75 96 21 80 BF 74 BF 30  o..m.==.u.!..t.0
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.795 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 D1 39 CC 3D A2 A6 64   5D A1 6A B3 56 2C 1D B8  ..9.=..d].j.V,..
#     0010: C2 5A 8F 83 1D 22 D0 2F   06 5A F4 79 E8 75 5B DE  .Z..."./.Z.y.u[.
#     0020: F3 ED FE A6 84 8F 90 19   C6 BF E9 35 40 0E B3 24  ...........5@..$
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.796 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.996 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 91 C4 CF 5A 9D 40 E7 86 42 11 20 FC B7 A8 2F D9 DA 30 39 5B 00 1B A3 EB 12 3C 04 0C 31 1A F7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.277 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-27 09:40:37.325 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 09:40:37.326 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 09:40:37.326 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-27 09:40:50.495; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:50.812 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 CD 5B E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:08.000 UTC",
#       "not  after"         : "2024-01-25 09:40:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:50.825 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.105 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.107 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.107 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.112 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.125 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "73 63 1D 17 A9 27 A1 C5 17 97 41 0E 47 69 E9 D9 FA 9A C0 97 CC 26 0D B6 46 E3 D4 AE B2 A3 0D AD",
#     "session id"          : "CE D1 FD 3A 3A FD B0 D2 A1 0D 86 16 66 5A 9E 8B 43 4D F5 98 15 79 E6 41 0F AE 65 FE 58 D7 A4 FD",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 68 CB 19 1A 52 A9 7A F0   E3 10 50 77 E3 E4 7C 59  h...R.z...Pw...Y
#               0010: E1 FF 3D 9B A9 00 16 54   11 FB 6A 38 0E 9C 1F 24  ..=....T..j8...$
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "ED 0F 00 E8 4E 39 8C A2 73 2B D6 46 53 34 B4 02 91 88 DD 6A B4 32 8A AE 76 C7 E6 A7 D1 E6 87 C3",
#     "session id"          : "CE D1 FD 3A 3A FD B0 D2 A1 0D 86 16 66 5A 9E 8B 43 4D F5 98 15 79 E6 41 0F AE 65 FE 58 D7 A4 FD",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 70 3A 62 10 8B 69 36 26   39 C8 3D 2F 76 5B BB 03  p:b..i6&9.=/v[..
#             0010: 0F 22 85 F7 5D A9 6D C0   E5 58 C1 7C 44 30 A1 34  ."..].m..X..D0.4
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.166 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.167 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.168 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-

[...truncated too long message...]

jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:42:06.562 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40950/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 15077ms
ok 78 stop command for single port in 17850ms
ok 79 status detects locally running solr in 9424ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7443ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1087ms
ok 82 listing out files in 2941ms
ok 83 copying files around in 6571ms
ok 84 upconfig in 2780ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
ok 87 Cleanup in 2046ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/eb2ykhxjjvic6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8257 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8257/

All tests passed

Build Log:
[...truncated 1161 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35553/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 07:12:27.227; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:12:27.232; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35553/solr] to [https://127.0.0.1:35553].
# WARN  - 2023-10-27 07:12:28.049; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 07:12:28.087; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17325ms
ok 74 start solr with client truststore and security manager in 19342ms
not ok 75 start solr with mTLS needed in 54773ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-D1FDga/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35553 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35553 (pid=3139783). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35554 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35554 (pid=3139910). Happy searching!
#
#     INFO  - 2023-10-27 07:13:30.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:13:30.837; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 07:13:32.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:32.183; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:32.185; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.234 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 18 DA DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:16.000 UTC",
#     "not  after"         : "2024-01-25 07:13:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#         0010: 07 D7 E9 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.238 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 77 68 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:07.000 UTC",
#     "not  after"         : "2024-01-25 07:13:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.250 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.893 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.897 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.897 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.906 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.927 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.928 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.928 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.932 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 65 4E 01 79 DB 4A B5 5D 56 7F B8 00 FA C9 70 A4 55 BC 58 39 EA 0E 58 08 42 50 E9 2C 6A 44 2A",
#   "session id"          : "6E 3D 4D DF B7 DB DD DB 0F E1 EB 45 61 92 46 BE B8 D3 02 AD 22 00 BA 21 ED 90 91 AC 79 77 77 95",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 90 A0 5E 68 34 00 E1 29   96 81 01 8A 3E 1B C4 39  ..^h4..)....>..9
#             0010: AD 1E CF 1E A9 7A F7 04   17 58 D0 43 99 34 63 33  .....z...X.C.4c3
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.103 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B0 A2 62 FF B8 A9 C8 D0 72 AC E7 AA CF 77 20 49 70 55 CA 1C 80 9B BC A4 52 30 7A 7D 85 37 F7 73",
#   "session id"          : "6E 3D 4D DF B7 DB DD DB 0F E1 EB 45 61 92 46 BE B8 D3 02 AD 22 00 BA 21 ED 90 91 AC 79 77 77 95",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D5 9D 0E 8E A3 9A AC 10   60 9C 87 2F 5A B8 A7 17  ........`../Z...
#           0010: DE 40 9B 58 B1 35 3F 76   18 86 54 96 FE EE EC 76  .@.X.5?v..T....v
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.103 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.104 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.152 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.154 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.167 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.179 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.203 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.204 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.204 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.208 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 D0 60 BA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:12.000 UTC",
#       "not  after"         : "2024-01-25 07:13:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 DC 1C E0 C4 16 03 09   41 BD 80 A1 B4 C8 14 FD  ........A.......
#           0010: DB 55 09 91                                        .U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.208 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.310 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.317 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 F8 0C 00 94 9B C7 26   A8 AC C6 D8 CA E8 20 9B  "......&...... .
#     0010: 76 46 E5 AB D7 DA 49 98   ED 99 3F 6E 4D 0E A2 F3  vF....I...?nM...
#     0020: 9F C9 35 CA 83 D5 17 61   D9 46 D8 9A 14 A9 C5 F5  ..5....a.F......
#     0030: 9A C1 93 4F 54 0C 2F 63   1D 92 F4 AD 64 9D FA 84  ...OT./c....d...
#     0040: 9B 59 63 03 C1 0D EF 25   B3 E0 BB 64 E3 76 52 DA  .Yc....%...d.vR.
#     0050: BD C9 97 EA 90 67 1E 37   52 0A AE EA 92 32 DF 89  .....g.7R....2..
#     0060: 88 2C 6B 45 CC 85 E8 CE   52 D9 9C 20 BE 39 B3 39  .,kE....R.. .9.9
#     0070: 12 1D 80 76 42 B6 72 DB   4C 54 B0 E9 B4 A0 32 07  ...vB.r.LT....2.
#     0080: 83 1F 39 04 16 20 CD B8   C4 E2 03 EC 49 31 6A BF  ..9.. ......I1j.
#     0090: A2 84 60 C6 54 54 FB FB   72 44 50 6A EA 3A 2D FC  ..`.TT..rDPj.:-.
#     00A0: 29 93 B1 24 5A 16 0D 37   F8 4D 7B 1A 83 3D B2 52  )..$Z..7.M...=.R
#     00B0: 56 F7 EC 47 F4 C1 B6 87   FB 9D C3 AB 88 56 49 7C  V..G.........VI.
#     00C0: F4 99 C4 09 B1 E7 F6 3F   2E 89 C2 58 88 71 8E 04  .......?...X.q..
#     00D0: FA 52 EA 1B F5 CA 97 36   B8 0A B4 E7 49 7E 25 33  .R.....6....I.%3
#     00E0: 19 32 FF F7 FD A6 AF 33   4F 5C C3 07 FB 05 53 36  .2.....3O\....S6
#     00F0: 6B 2D C5 E2 AC 63 68 44   91 F7 0D 4F DD 27 D3 EC  k-...chD...O.'..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.318 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 10 ED 25 41 40 0C DA CD   B1 28 D5 75 A7 F2 DB D9  ..%A@....(.u....
#     0010: DF 2B 51 DF 0B 06 55 C0   12 B2 42 C2 38 FC 4D 42  .+Q...U...B.8.MB
#     0020: 9C C2 4B E1 31 D4 18 E6   E8 42 98 40 A1 78 A3 B4  ..K.1....B.@.x..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.327 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.341 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 18 DA DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:16.000 UTC",
#       "not  after"         : "2024-01-25 07:13:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#           0010: 07 D7 E9 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.392 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 48 D2 81 5F 2E F7 F2   45 D8 3F AF F4 E5 70 21  EH.._...E.?...p!
#     0010: 01 99 4D BC BF 46 27 DD   54 99 84 DB AD 72 1B 26  ..M..F'.T....r.&
#     0020: F2 DC 23 F8 63 FE 9C B6   B9 DD 5A 70 28 52 12 26  ..#.c.....Zp(R.&
#     0030: 2A CB B2 0E 14 C2 4A 01   B1 77 30 A1 A5 97 60 A9  *.....J..w0...`.
#     0040: 82 2A 9D 0A B9 D6 02 6D   7B 1C DD 56 99 2E BE D3  .*.....m...V....
#     0050: 21 06 28 93 E5 13 17 17   B2 F8 36 E3 D4 8E D9 B5  !.(.......6.....
#     0060: 70 BB E8 F8 E8 00 82 D6   B2 4B AC D2 8B F1 4E CC  p........K....N.
#     0070: B9 91 8B E7 FD F2 E6 BA   27 98 58 BC BA CF 7A A4  ........'.X...z.
#     0080: 94 B9 01 6F C6 B8 A1 9D   1E 3B D5 96 25 19 2D B7  ...o.....;..%.-.
#     0090: 73 B5 17 5B 0E 62 E2 56   8B 92 85 70 AB F5 79 FF  s..[.b.V...p..y.
#     00A0: DD 95 1E A6 1E 1D 9C 07   6A 80 B5 18 96 41 F6 FF  ........j....A..
#     00B0: FE 14 4B 50 F0 09 ED E7   3B C0 55 39 23 97 50 2C  ..KP....;.U9#.P,
#     00C0: EF E2 58 98 33 A9 E1 7C   97 D0 59 9A 8B A3 88 7D  ..X.3.....Y.....
#     00D0: 9D 4D A6 C3 EB 91 27 4E   0E 46 B6 34 1E 91 C1 11  .M....'N.F.4....
#     00E0: EB 07 EA 24 42 BA B2 E5   34 38 A2 01 AA 1D FC CF  ...$B...48......
#     00F0: F3 E7 E7 32 68 AC EC 27   41 64 28 F7 DA A4 E9 D7  ...2h..'Ad(.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.397 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 97 01 0D 12 EA 4C 87   FE D0 11 35 DC 47 1E F8  x.....L....5.G..
#     0010: 22 ED 72 EA 8E 23 BB BF   AB D3 A6 7E B3 EC C2 D3  ".r..#..........
#     0020: A5 EE B5 6E 59 96 84 A0   34 47 D9 7D D5 FC F3 44  ...nY...4G.....D
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.401 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.778 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1D 0B 62 5C 90 17 D1 F7 A1 69 65 06 48 F8 EC 76 EF 18 D6 52 83 E4 B6 F1 27 53 39 E3 E9 1A 7D 76",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-27 07:13:34.039 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 07:13:34.040 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 07:13:35.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:13:35.357; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 07:13:35.706; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:35.708; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:35.708; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.746 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 18 DA DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:16.000 UTC",
#     "not  after"         : "2024-01-25 07:13:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#         0010: 07 D7 E9 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.750 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 77 68 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:07.000 UTC",
#     "not  after"         : "2024-01-25 07:13:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.762 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.939 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.939 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.941 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.941 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.946 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.960 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "64 B9 28 F8 3A B1 3A 78 7D 14 7E 45 0F FC 82 F4 4A AA E7 D0 61 34 4F 15 3D 8F D0 D1 E3 99 4F FD",
#   "session id"          : "7A A8 BC 21 D7 2D 89 24 FB 96 AA 8E 2E F7 86 74 DD 2F 4F F2 30 28 05 EE AE 07 C8 A1 E8 44 87 F5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BA 7A 6F 89 00 7C 02 06   7F 47 61 4F C9 23 62 FB  .zo......GaO.#b.
#             0010: 9E 1E FB 4C 98 98 9C 13   C4 F0 D6 8E 7B 85 3B 3F  ...L..........;?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.087 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 0F 69 AD 80 18 97 48 B7 9C AE 92 AC C0 17 B8 34 33 2F 61 C4 16 2A 6D BA 7B 6F F5 01 ED 05 FC",
#   "session id"          : "7A A8 BC 21 D7 2D 89 24 FB 96 AA 8E 2E F7 86 74 DD 2F 4F F2 30 28 05 EE AE 07 C8 A1 E8 44 87 F5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1C 9E 3A CD F6 A6 35 2A   14 DA 4A C3 DB FC 04 82  ..:...5*..J.....
#           0010: 5B F6 3D B8 90 34 55 C2   1E 00 68 8E F8 34 96 39  [.=..4U...h..4.9
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.088 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.088 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.113 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.116 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.119 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.133 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.144 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.144 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.145 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.148 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 D0 60 BA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:12.000 UTC",
#       "not  after"         : "2024-01-25 07:13:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 DC 1C E0 C4 16 03 09   41 BD 80 A1 B4 C8 14 FD  ........A.......
#           0010: DB 55 09 91                                        .U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.207 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.212 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C0 B2 2F 62 9D A3 2B 7A   B1 2B 18 E5 A4 1A FA AA  ../b..+z.+......
#     0010: 50 03 ED 5E D0 5B CE 5A   4E B3 BC 75 3D EA A5 59  P..^.[.ZN..u=..Y
#     0020: F8 7D C6 53 BB AD 6E 0F   3E EA 5E 8B DA 9B 0E 5A  ...S..n.>.^....Z
#     0030: 3D DC 9B F4 31 05 64 96   E3 FB 35 BA 03 6A B4 5F  =...1.d...5..j._
#     0040: 38 A7 05 1C E3 67 C1 9D   91 4C 70 97 A8 49 75 CD  8....g...Lp..Iu.
#     0050: 99 E6 D9 D1 49 A1 FD BD   A4 61 3C 4C 5B A7 A9 D7  ....I....a<L[...
#     0060: 2F AB 1D 35 DD A3 90 52   F9 C5 C4 09 87 4B F4 4D  /..5...R.....K.M
#     0070: 79 53 33 2B 01 51 2F 7E   97 60 AD 76 34 A9 BC F8  yS3+.Q/..`.v4...
#     0080: 8D 51 07 6D 3E BA F2 DF   7E 0E 3B 1B 74 4E 6C 8F  .Q.m>.....;.tNl.
#     0090: 25 3E 70 84 A0 4C 1F CB   33 56 EA E9 B7 3E B5 A1  %>p..L..3V...>..
#     00A0: 0F 40 7F EF 9F 3E 67 D5   EC 75 40 4B AE 7B CD 4F  .@...>g..u@K...O
#     00B0: DE 92 8D 92 EA 1A 89 64   0D 16 85 CA A5 A5 EB BB  .......d........
#     00C0: 1B 6C 15 30 40 FE 39 08   7B F1 FF 18 59 B3 5D 12  .l.0@.9.....Y.].
#     00D0: 82 CF 00 FF D5 F8 D6 8E   E8 60 5B BC D8 9B 41 C1  .........`[...A.
#     00E0: D1 8D C4 C2 52 C0 A3 BB   24 67 3E 7F 99 74 BD F1  ....R...$g>..t..
#     00F0: 82 D0 F6 5D BC 31 D3 8E   8C E6 F0 93 52 CB 4C DD  ...].1......R.L.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.214 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 3B 7C AB F2 33 66 ED   61 A7 B1 55 CF BF CC 2F  .;...3f.a..U.../
#     0010: CF 9B 01 F9 5C 77 33 C3   E4 47 56 CC 35 28 6C 5F  ....\w3..GV.5(l_
#     0020: 49 0B E5 C7 84 D0 96 FB   65 06 E2 CA C0 BF FE 02  I.......e.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.215 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.219 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 18 DA DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:16.000 UTC",
#       "not  after"         : "2024-01-25 07:13:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#           0010: 07 D7 E9 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.242 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 F4 BF 62 28 18 89 5A   68 2A 4E AC 78 DD 4E FF  ...b(..Zh*N.x.N.
#     0010: 62 FD B8 DA 6D 1B 2F 0E   BB BD E5 73 64 F5 30 9F  b...m./....sd.0.
#     0020: 17 94 32 EF 63 9C 54 2B   F1 59 A8 5B D7 1A 27 2C  ..2.c.T+.Y.[..',
#     0030: 53 C2 F0 AE B4 66 1B B3   D5 AE 9A A5 4A A8 34 9A  S....f......J.4.
#     0040: 61 26 FE C5 88 AF C9 E7   AF 7C 3B F6 2C CB 2A 97  a&........;.,.*.
#     0050: FD CE 6B F7 AB EF 40 87   50 68 81 0B 4E EF 10 B5  ..k...@.Ph..N...
#     0060: 6A 28 F7 A4 4B D5 DF 1E   67 21 46 8C 9F DF E5 6E  j(..K...g!F....n
#     0070: C5 6A E9 31 EA 39 76 CF   EE E9 98 AD D7 6C 23 3B  .j.1.9v......l#;
#     0080: 97 D4 63 65 24 7B A6 D4   DB 69 2F D7 09 60 75 15  ..ce$....i/..`u.
#     0090: 3C 15 76 F2 27 2F 65 7D   5E 60 59 72 E1 E6 00 7C  <.v.'/e.^`Yr....
#     00A0: B1 6D 4C 7D 83 79 0D 5A   2C 96 2E 0B 59 02 1E 48  .mL..y.Z,...Y..H
#     00B0: 07 91 96 29 E4 B2 91 A0   F6 1A 1D 73 B0 18 44 B6  ...).......s..D.
#     00C0: 85 6B 1D DB 7A 0A 35 77   6B 37 5D 1C F8 B8 82 98  .k..z.5wk7].....
#     00D0: B9 71 B1 20 95 C7 1F C9   58 36 74 7F D5 A5 A6 DA  .q. ....X6t.....
#     00E0: A9 02 38 C3 E9 94 22 6E   B9 EA 79 28 7A 0D 3F 36  ..8..."n..y(z.?6
#     00F0: FE E2 5E 9D 91 7A A9 A6   39 A0 CE 22 06 7F A1 F8  ..^..z..9.."....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.243 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C F3 DC DC 0C C8 63 F8   C1 96 01 B4 F1 7F 63 8D  <.....c.......c.
#     0010: C8 A3 C8 88 F4 49 92 14   3A 02 91 A1 50 91 BA 26  .....I..:...P..&
#     0020: E3 AF 14 8B 53 02 99 EE   0C F6 93 0A 30 B2 0F 53  ....S.......0..S
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.244 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.309 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FB 79 04 78 E2 0A 25 68 B1 C3 77 71 19 9A 6D 8B 5D 6F 39 18 32 D4 EF 31 F6 1C 23 B6 36 3E CA 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 07:13:36.624 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 07:13:36.625 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 07:13:49.805; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:50.297 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 77 68 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:07.000 UTC",
#       "not  after"         : "2024-01-25 07:13:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:50.310 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.480 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.481 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.482 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.482 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.500 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2E 62 A9 91 84 94 C9 AC E5 60 4D FD 0E 46 0A D3 77 5B 68 CD CE 72 BC B1 37 AD 85 30 17 F4 8A AD",
#     "session id"          : "03 D0 A4 FD 11 94 A4 5E A7 56 B3 12 4B CD 5E A6 64 5D E0 04 B4 A8 CC 1F 03 9E 37 9B E9 4E FA DE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 10 BA C9 D0 60 A7 19 BD   7D 1D 8F 7C 98 33 38 6C  ....`........38l
#               0010: D5 81 B1 4C 82 83 10 BD   68 29 33 22 08 48 90 6B  ...L....h)3".H.k
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F6 D4 43 CE 69 7A 17 01 86 B4 8E 79 73 B4 20 0B 8D A6 E7 43 5B A9 D6 18 37 10 54 33 83 18 7B 81",
#     "session id"          : "03 D0 A4 FD 11 94 A4 5E A7 56 B3 12 4B CD 5E A6 64 5D E0 04 B4 A8 CC 1F 03 9E 37 9B E9 4E FA DE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F5 E9 1A 6E 34 AD 07 4C   DB 87 0A C7 39 91 D4 37  ...n4..L....9..7
#             0010: 2E A7 F4 2C F9 37 62 79   54 B2 FF B7 D9 81 06 25  ...,.7byT......%
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.527 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.544 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.546 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.549 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.552 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.555 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.559 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.561 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.562 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.566 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "37 D0 60 BA",
#         "signature algorithm": "SHA256withRSA",
#         "issuer"             : "

[...truncated too long message...]

.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:15:06.329 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35554/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.414 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
ok 77 SOLR-11740 check 'solr stop' connection in 14455ms
ok 78 stop command for single port in 17825ms
ok 79 status detects locally running solr in 9429ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7676ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1104ms
ok 82 listing out files in 2958ms
ok 83 copying files around in 6747ms
ok 84 upconfig in 2923ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1247ms
ok 87 Cleanup in 2114ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 11s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2rpkzlqjgkrn2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8256 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8256/

All tests passed

Build Log:
[...truncated 1163 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41999/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 03:14:07.145; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:14:07.150; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41999/solr] to [https://127.0.0.1:41999].
# WARN  - 2023-10-27 03:14:08.077; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 03:14:08.114; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16349ms
ok 74 start solr with client truststore and security manager in 19709ms
not ok 75 start solr with mTLS needed in 53997ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-UpWmEX/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41999 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41999 (pid=2622925). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42000 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42000 (pid=2623094). Happy searching!
#
#     INFO  - 2023-10-27 03:15:10.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:15:10.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 03:15:10.894; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:10.897; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:10.899; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.957 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 0C BC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:56.000 UTC",
#     "not  after"         : "2024-01-25 03:14:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#         0010: 2B 0E 15 4D                                        +..M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.961 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 61 A7 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:47.000 UTC",
#     "not  after"         : "2024-01-25 03:14:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.980 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.349 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.351 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.351 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.366 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.388 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "ED A7 CF A1 EF 36 CE 1A 27 D4 AA 78 33 E8 17 74 66 15 68 50 2B A3 C0 27 43 F9 7C 0A 15 86 F3 EC",
#   "session id"          : "7C 07 C8 97 A3 0C EA 01 2C BF C5 8E 6E B8 46 C1 55 23 F9 A9 8D B2 5F 02 48 ED 15 02 FD 75 41 5F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 37 9C 10 5F D0 A1 66 BD   EA E2 A9 08 2D 28 1F 08  7.._..f.....-(..
#             0010: 69 02 A1 C3 2B 34 13 E9   61 4F 2D 78 F4 9B D6 6E  i...+4..aO-x...n
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 90 A2 6B BB BB 2A 17 72 A8 B4 64 35 80 82 6A C5 07 84 D3 7C 71 A1 CC C5 1E DA 24 39 C2 B9 BE",
#   "session id"          : "7C 07 C8 97 A3 0C EA 01 2C BF C5 8E 6E B8 46 C1 55 23 F9 A9 8D B2 5F 02 48 ED 15 02 FD 75 41 5F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AD B9 BE 47 54 7B A0 7D   42 FB 92 98 66 1D 36 97  ...GT...B...f.6.
#           0010: 20 CC 85 C3 3A 20 F9 20   BA C4 AE 7C AE 59 11 11   ...: . .....Y..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.005 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.007 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.009 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.022 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.022 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.024 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.024 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.026 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 9F 91 E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:52.000 UTC",
#       "not  after"         : "2024-01-25 03:14:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 AB A4 B3 D3 51 D5 19   F9 89 EE 5D B8 B8 21 04  .....Q.....]..!.
#           0010: 1A 82 5A 26                                        ..Z&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.027 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.117 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.125 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 21 9D D3 6C 91 0F D1 61   EE 0D 3E 25 02 17 9F C1  !..l...a..>%....
#     0010: C5 1D 56 59 05 AB AF 43   CE 5C 4A D0 80 42 48 88  ..VY...C.\J..BH.
#     0020: EC 9D 88 D9 2D 6B CD EE   92 5E 7E 1C 5D 9B 5B D0  ....-k...^..].[.
#     0030: 17 04 15 2B 72 EC 34 D3   85 07 A8 BD 5D 69 42 65  ...+r.4.....]iBe
#     0040: 9F 35 5F 5D 5F 31 22 80   37 10 75 B5 F6 23 70 41  .5_]_1".7.u..#pA
#     0050: 82 74 5B C0 A2 93 0A B9   A8 8C 5B E1 D4 E2 50 30  .t[.......[...P0
#     0060: BD 5E 45 9B 93 F7 25 F6   21 B1 F0 E2 7E 26 23 C1  .^E...%.!....&#.
#     0070: D8 18 9D 30 92 E8 A3 79   A4 D2 51 FA C0 0F 34 6D  ...0...y..Q...4m
#     0080: 56 9A C0 46 5A 9B 69 1D   4B 50 E3 4E A3 44 FD 5C  V..FZ.i.KP.N.D.\
#     0090: 4C 93 E0 51 92 78 90 4B   02 21 F8 66 C5 7C CE 18  L..Q.x.K.!.f....
#     00A0: C6 59 3E 41 B7 2F 91 54   12 59 35 7F FD 11 FB 2D  .Y>A./.T.Y5....-
#     00B0: B7 76 F0 79 97 1C D3 88   9A 86 C5 7B 19 7C 18 A9  .v.y............
#     00C0: B2 07 71 99 98 74 59 ED   D2 30 72 90 26 02 6A BC  ..q..tY..0r.&.j.
#     00D0: 98 CE 50 BF A0 B8 82 47   20 D3 85 88 B3 E9 ED 0F  ..P....G .......
#     00E0: 2D 31 BB CE 97 D2 09 58   41 FD 8E EF DF 92 03 D7  -1.....XA.......
#     00F0: 88 16 5B 88 A4 CC 54 6D   6B 74 E4 2D 34 F9 9A 84  ..[...Tmkt.-4...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.127 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 C2 E1 76 A1 B3 85 21   09 0A EF 7F 9C 89 1D 35  @..v...!.......5
#     0010: 17 87 E3 CE 1B D9 D5 3F   EE 58 6B 28 71 F4 46 47  .......?.Xk(q.FG
#     0020: 97 3C FA 84 BB 68 CE 31   08 E7 D8 57 9B 94 CD E0  .<...h.1...W....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.134 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.136 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.138 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 0C BC AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:56.000 UTC",
#       "not  after"         : "2024-01-25 03:14:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#           0010: 2B 0E 15 4D                                        +..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.168 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 3B 9E 09 73 BA 3D DF   32 C9 50 50 EA 7F 86 B0  4;..s.=.2.PP....
#     0010: 0F 99 88 B7 41 0B 8A F2   7D FF EE CA DA FA FC 25  ....A..........%
#     0020: 8A FD A4 06 1A DB F3 7A   17 01 BE E6 66 AB 19 31  .......z....f..1
#     0030: 77 8A 03 D2 D7 D6 6A 02   73 52 6E 93 98 85 AE A0  w.....j.sRn.....
#     0040: 37 CC 6C 64 A2 0A 04 B0   E1 9D 8E D7 9F 01 7D 3D  7.ld...........=
#     0050: A8 75 1D 26 79 D1 2B A9   75 E0 9D BE 31 0B A1 51  .u.&y.+.u...1..Q
#     0060: 29 B4 05 25 F2 B6 7C 1C   8A 9B 56 70 D7 F2 92 F8  )..%......Vp....
#     0070: 87 20 E6 52 39 BF 3F FB   0E 16 07 56 0B 16 20 C8  . .R9.?....V.. .
#     0080: DC F7 1D 12 EF F7 7D 4E   38 C1 ED 6E 69 C9 D6 CF  .......N8..ni...
#     0090: 83 89 C6 AD 31 9E F6 DA   62 69 66 A5 9C 39 0B 04  ....1...bif..9..
#     00A0: 75 29 46 A5 34 61 37 44   F4 D7 C5 B5 2C 99 98 0D  u)F.4a7D....,...
#     00B0: FE 0E 5E D0 E8 F5 CC 42   BA 0A BA 6D 81 25 B3 88  ..^....B...m.%..
#     00C0: 66 22 32 38 FC C1 08 2B   DF 83 5E E2 B2 3C 30 D1  f"28...+..^..<0.
#     00D0: B5 69 D5 FE 51 58 9A 3A   2A AF 60 27 14 33 4E BB  .i..QX.:*.`'.3N.
#     00E0: AB 57 9F 25 E9 E2 C3 C6   50 5E CB 87 6F 2A BF EA  .W.%....P^..o*..
#     00F0: F2 A2 05 E1 18 08 60 B8   8A E8 FC F7 1C B6 D0 B5  ......`.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.169 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C D1 70 DA D0 4F EF 85   DA A7 32 59 3E 26 A9 6C  l.p..O....2Y>&.l
#     0010: C4 23 66 3F 60 BC A3 44   E6 CF C2 51 F7 94 07 AB  .#f?`..D...Q....
#     0020: 2D 51 D1 43 68 05 2A 83   97 5A 47 87 DB FB 9E 5E  -Q.Ch.*..ZG....^
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.170 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.239 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.239 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.240 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.240 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.248 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "72 26 16 20 86 B5 B3 FB 5A 8F C2 A8 2A DD 61 AD BA E1 8D F4 E2 31 AF D8 1B 4C 48 F5 85 6B 53 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 03:15:13.017 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 03:15:13.018 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 03:15:14.290; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:15:14.294; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 03:15:14.656; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:14.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:14.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.691 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 0C BC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:56.000 UTC",
#     "not  after"         : "2024-01-25 03:14:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#         0010: 2B 0E 15 4D                                        +..M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.695 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 61 A7 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:47.000 UTC",
#     "not  after"         : "2024-01-25 03:14:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.706 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.888 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.888 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.890 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.890 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.907 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 06 98 B8 B5 0D B1 A0 DF 25 F5 F7 5D E6 35 5D C9 67 CE 13 12 27 93 C3 C2 8F 39 26 4D 46 19 4D",
#   "session id"          : "D5 3C 8C 3E 07 A5 B3 EB 0D AE ED E7 FB 0F FB 8F A9 09 A5 C0 7E 42 BA 9A 23 3F 9D D3 00 DB AD 1E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 96 B6 4C DB 05 43 9A F1   69 B0 D6 9A 2A 50 FB CE  ..L..C..i...*P..
#             0010: AC D8 D1 81 E6 76 AC 92   2A DF AB 44 13 23 21 56  .....v..*..D.#!V
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.027 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B2 4A 46 17 24 03 21 D0 07 FD C9 0C BE 5F 19 53 A0 8D 22 58 82 2C 49 EE A9 3F 75 D6 27 3D 1B 41",
#   "session id"          : "D5 3C 8C 3E 07 A5 B3 EB 0D AE ED E7 FB 0F FB 8F A9 09 A5 C0 7E 42 BA 9A 23 3F 9D D3 00 DB AD 1E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 60 2D 99 04 64 17 F1 5B   9D 2C F3 32 01 76 F3 6F  `-..d..[.,.2.v.o
#           0010: C5 E2 CD 27 E2 C4 A5 23   55 B9 F3 DC 32 08 84 5B  ...'...#U...2..[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.028 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.033 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.033 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.054 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.056 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.066 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.072 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.080 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 9F 91 E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:52.000 UTC",
#       "not  after"         : "2024-01-25 03:14:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 AB A4 B3 D3 51 D5 19   F9 89 EE 5D B8 B8 21 04  .....Q.....]..!.
#           0010: 1A 82 5A 26                                        ..Z&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.080 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.143 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.146 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 07 12 CC 16 60 8F B9   86 E3 23 F0 BD 90 D6 97  /....`....#.....
#     0010: 9F CA EE 81 BA 03 34 DB   3D CB 6C A5 07 63 1E 22  ......4.=.l..c."
#     0020: E7 3B 57 58 60 29 2E 17   E2 E0 62 E6 85 39 1F 8B  .;WX`)....b..9..
#     0030: 2F 12 FB 3A 31 BE 2F 4D   71 D2 6A 09 3F A4 6B F2  /..:1./Mq.j.?.k.
#     0040: 7A C5 A0 7A 75 79 2B D5   AE 52 DD 77 85 B3 D3 91  z..zuy+..R.w....
#     0050: F7 84 86 29 FE 91 6F 3A   3A 6E A1 ED 67 2E 63 48  ...)..o::n..g.cH
#     0060: 14 99 97 7E 4E 75 16 50   2D 57 0D CF DD 8E 4C 9D  ....Nu.P-W....L.
#     0070: 44 49 19 21 51 09 69 42   E7 59 45 F5 9A 34 37 90  DI.!Q.iB.YE..47.
#     0080: F8 FD FB 0F AD FB BB 2D   C0 2B EE 94 19 44 A6 DE  .......-.+...D..
#     0090: B7 24 69 0D 3B CA 3B 9F   88 02 EC AE CA 10 AD 5C  .$i.;.;........\
#     00A0: FA 30 BC B1 BB 5B DE 0C   3B 3B 21 03 91 9B 22 03  .0...[..;;!...".
#     00B0: 98 00 3E 73 B5 11 61 ED   C3 4E 39 41 ED E0 35 C0  ..>s..a..N9A..5.
#     00C0: 3C 21 71 5D 72 B0 A9 EC   15 45 3E F2 DB 3F 0B BB  <!q]r....E>..?..
#     00D0: 6E 0A F7 0C 8E A0 F7 EB   A6 59 CD E3 1B 68 87 39  n........Y...h.9
#     00E0: 79 58 EF 8E AB 2E 6F 2E   36 71 EF A3 95 F6 D6 BB  yX....o.6q......
#     00F0: 8C D2 58 E9 6D E2 F5 55   E9 1C 1A F4 1C 42 E9 47  ..X.m..U.....B.G
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.147 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 10 D3 2E 7F E6 DE F8 8B   42 0C 55 7B 94 78 9C A0  ........B.U..x..
#     0010: C5 77 5F C0 F2 76 91 D9   93 8F 7B AE 80 36 E8 9D  .w_..v.......6..
#     0020: 91 70 E2 7C 74 47 0C BA   30 54 E6 45 26 82 FE 45  .p..tG..0T.E&..E
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.249 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.250 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.250 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.253 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 0C BC AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:56.000 UTC",
#       "not  after"         : "2024-01-25 03:14:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#           0010: 2B 0E 15 4D                                        +..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.275 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 25 DB 91 6E AD FA C1 12   A1 C0 98 7A 57 8D 73 B5  %..n.......zW.s.
#     0010: 8D 2B 8B C1 83 E6 CB D4   AD 02 95 D0 78 A3 9D 51  .+..........x..Q
#     0020: DC 73 8E DA 6C DD C5 81   F1 6B 23 C9 44 AE 3E C8  .s..l....k#.D.>.
#     0030: 9B 9B 38 C9 8E 91 56 4D   70 71 C8 67 57 97 C5 FF  ..8...VMpq.gW...
#     0040: 15 8D AB F2 7F 8D 5E 95   4C 4F 1F 05 B2 10 BE 8F  ......^.LO......
#     0050: 5B EB EF 8F 16 D7 41 55   49 FF CF 4E 2F 78 03 F0  [.....AUI..N/x..
#     0060: 02 6C 1C 88 75 74 DE F5   29 C3 43 58 22 D6 87 EF  .l..ut..).CX"...
#     0070: DB F7 AB D0 D1 22 97 D9   7F 10 B3 59 82 33 4A B9  .....".....Y.3J.
#     0080: C1 73 1D 5D 3C A7 36 27   A0 99 FC 49 ED 4F 42 83  .s.]<.6'...I.OB.
#     0090: ED D5 6B 86 B3 6D E4 34   C7 7C 2A 8A F3 16 DD AF  ..k..m.4..*.....
#     00A0: 6D 8E 9B E3 7B 20 51 22   C2 8F 93 C1 86 B5 AE 6D  m.... Q".......m
#     00B0: EA 06 E5 B9 53 86 D7 C2   73 FF C0 DA DF BF AC 9B  ....S...s.......
#     00C0: 55 44 E1 F1 32 7B 6A C9   EE FA 1A 47 7F 3F 9A 24  UD..2.j....G.?.$
#     00D0: 08 36 CC 4F A3 9B 32 83   28 92 63 C8 C1 00 0A D4  .6.O..2.(.c.....
#     00E0: CD 08 FE B4 90 FC 94 00   2B 56 9C 20 DC 49 E9 3E  ........+V. .I.>
#     00F0: 7A AF 44 0D 2F 4B 27 EA   7A 85 7A 83 40 25 73 9F  z.D./K'.z.z.@%s.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.277 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 90 E3 43 A8 07 1C 18 6A   07 D8 79 08 BB 53 00 B4  ..C....j..y..S..
#     0010: 5A 25 42 19 DF D9 D9 29   74 86 7A E1 4A 8F 4C 2E  Z%B....)t.z.J.L.
#     0020: C8 45 C7 23 C4 49 9B 4A   D3 8D 83 03 7C 8D B9 E1  .E.#.I.J........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.277 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.346 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C5 D8 40 3C 7C 5D 71 B6 32 AB FF 37 14 73 FC 2D 5F 03 47 DA A2 EC 02 C5 E3 9C 0C EA 41 16 37 7C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 03:15:15.620 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 03:15:15.626 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 03:15:29.159; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:29.639 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 61 A7 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:47.000 UTC",
#       "not  after"         : "2024-01-25 03:14:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:29.653 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.809 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.811 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.811 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.817 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.829 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.829 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.830 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.832 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "42 67 AA 20 A4 CF 16 E3 F5 C2 3C C2 3A 58 5B A5 92 B3 98 72 28 F5 FE 80 2B 27 EA B0 4A D3 C3 05",
#     "session id"          : "F3 C0 5A A9 DC F9 22 65 1D B9 7D 47 90 DD 4D 91 08 89 4C 38 E3 BD 74 40 51 2F 96 E3 3F 9C B4 E9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D4 9A F6 78 F0 53 85 D9   57 C8 3F 73 A1 13 DA 95  ...x.S..W.?s....
#               0010: 4D 5D 28 4E 65 73 EE 24   35 8D 93 A5 BE 0D 6F 34  M](Nes.$5.....o4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.848 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "26 BA 72 D0 44 C2 B4 C4 A8 F5 6F 2C 4D 04 B6 8B 2F 13 1B BF 61 D4 03 42 D7 33 3D CF B7 E1 DE 04",
#     "session id"          : "F3 C0 5A A9 DC F9 22 65 1D B9 7D 47 90 DD 4D 91 08 89 4C 38 E3 BD 74 40 51 2F 96 E3 3F 9C B4 E9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 69 FB 21 01 12 04 A9 95   F5 5B 94 DF DE EF 57 90  i.!......[....W.
#             0010: 06 28 D6 16 03 19 07 14   D0 19 C6 DF A3 E8 26 3E  .(............&>
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.848 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.851 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.861 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.862 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.863 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.870 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.870 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.871 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extensio

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:16:44.645 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42000/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14603ms
ok 78 stop command for single port in 17739ms
ok 79 status detects locally running solr in 9521ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7360ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1097ms
ok 82 listing out files in 3042ms
ok 83 copying files around in 6587ms
ok 84 upconfig in 2611ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1259ms
ok 87 Cleanup in 2142ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 49s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nr7ww2yoeqcto

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8255 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8255/

All tests passed

Build Log:
[...truncated 1429 lines...]
BUILD FAILED in 1h 2m 52s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/e6c4nvlyg4lyu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8254 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8254/

All tests passed

Build Log:
[...truncated 1434 lines...]
BUILD FAILED in 1h 1m 30s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/mbe6aqqn3gxyg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8253 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8253/

All tests passed

Build Log:
[...truncated 1163 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41111/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 18:22:28.023; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:22:28.027; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41111/solr] to [https://127.0.0.1:41111].
# WARN  - 2023-10-26 18:22:28.846; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 18:22:28.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17084ms
ok 74 start solr with client truststore and security manager in 19921ms
not ok 75 start solr with mTLS needed in 60800ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-e7xD3M/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41111 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41111 (pid=1489663). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41112 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41112 (pid=1489790). Happy searching!
#
#     INFO  - 2023-10-26 18:23:32.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:23:32.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 18:23:33.568; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:33.570; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:33.571; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.608 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 7C 92 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:18.000 UTC",
#     "not  after"         : "2024-01-24 18:23:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#         0010: 3F 34 DF D3                                        ?4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.612 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 99 B9 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:09.000 UTC",
#     "not  after"         : "2024-01-24 18:23:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.624 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.327 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.328 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.330 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.330 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.355 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.376 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.388 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 D7 69 F4 17 F8 E8 B2 9D 84 9C 0D 4A 59 7B C9 B1 CB 2C 40 C8 AE BF D3 E7 74 BF 75 BE 9F E1 15",
#   "session id"          : "FB 94 F7 D5 DC 36 55 46 9F 9F 94 FA 4C A1 22 1B 05 58 91 21 BA DC 79 D2 E7 15 1E CD 57 CD 26 E4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 11 B5 5C 2D 20 92 38 49   F2 B0 ED A4 80 49 C0 0C  ..\- .8I.....I..
#             0010: D1 A4 46 1E 34 E3 70 CD   62 23 7D 89 81 0E B0 2F  ..F.4.p.b#...../
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F 3D 5E FB 66 DB A1 88 71 9D 1E E7 89 4A 25 CD 22 31 CB 1E C9 B9 96 B4 B5 CE 5F 6C 3D 5A 8A A4",
#   "session id"          : "FB 94 F7 D5 DC 36 55 46 9F 9F 94 FA 4C A1 22 1B 05 58 91 21 BA DC 79 D2 E7 15 1E CD 57 CD 26 E4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 87 51 BA E4 90 17 E1 AC   BB 50 A5 C5 65 A3 E2 29  .Q.......P..e..)
#           0010: 55 06 A8 3A 3A CB 54 34   3D A2 9F B3 13 34 EB 6D  U..::.T4=....4.m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.828 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.846 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.847 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.861 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.886 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.887 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.892 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.892 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.893 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.897 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.897 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.901 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 C1 CA 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:13.000 UTC",
#       "not  after"         : "2024-01-24 18:23:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B FD AE 01 24 E7 3A 9E   42 A9 1E FC B6 FB 73 3B  ....$.:.B.....s;
#           0010: 72 52 52 FA                                        rRR.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.902 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.201 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.229 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.237 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A6 5B 36 A3 EF 14 96 C0   91 83 7F 2B AE F3 BC 92  .[6........+....
#     0010: AA 15 85 2D 11 31 5E 1A   C6 1D F8 61 12 11 AE A5  ...-.1^....a....
#     0020: 3F A7 8D 16 1F 21 F1 86   18 8D CA E4 95 06 0B BB  ?....!..........
#     0030: DE FA E1 7A 04 D8 29 0B   B4 FC 0B 0D 46 47 4B 99  ...z..).....FGK.
#     0040: A4 F0 45 1D EA D0 7B A5   B9 95 F9 D5 86 4B 48 9F  ..E..........KH.
#     0050: 12 C5 CC C2 8D 73 36 F2   19 67 B7 4D E5 BB 3D D3  .....s6..g.M..=.
#     0060: 06 45 7A AF A5 2A 60 B1   3E F4 40 2A 40 9F F5 44  .Ez..*`.>.@*@..D
#     0070: F1 B9 C4 56 E3 1A 19 1F   2E 3D E6 AB 47 47 5D 01  ...V.....=..GG].
#     0080: 9B 17 D0 11 AF 76 6E 0C   A2 B0 5F 1D 9F 05 59 4B  .....vn..._...YK
#     0090: 4F 2A A3 D6 FF 7A 6D D2   D4 40 5B EC 36 3D 41 66  O*...zm..@[.6=Af
#     00A0: 4E D8 B3 7E 87 67 07 01   0F D0 AD 1D FB D8 53 0B  N....g........S.
#     00B0: 88 26 01 80 8A 0D A8 52   B1 0D 7F 16 FF 14 14 2A  .&.....R.......*
#     00C0: D5 62 BE CD BB 40 EB 6C   FF E0 69 0E 9A 30 56 EC  .b...@.l..i..0V.
#     00D0: 6E B7 23 31 43 34 39 E2   11 CB 1A E8 CF F8 BB A8  n.#1C49.........
#     00E0: D5 2C 28 BC C2 E1 52 2B   DE 4E C7 1D 18 B1 3D 5F  .,(...R+.N....=_
#     00F0: 48 42 DF B8 B8 BC 31 1F   F0 74 10 CC 04 B3 39 6E  HB....1..t....9n
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.239 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6F AA 37 41 5C 2B BF FB   87 DA AB 23 BC 7D 53 4F  o.7A\+.....#..SO
#     0010: 20 78 84 2F C6 7C C8 45   D9 E5 7D 79 91 A2 5D 35   x./...E...y..]5
#     0020: 6E D4 B1 1D 17 81 D1 19   55 58 1E 46 53 B7 51 3A  n.......UX.FS.Q:
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.247 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.248 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.258 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 7C 92 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:18.000 UTC",
#       "not  after"         : "2024-01-24 18:23:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#           0010: 3F 34 DF D3                                        ?4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.314 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 C2 A1 5A 68 36 13 ED   8D 52 C9 AB D5 DC 0A 9B  ...Zh6...R......
#     0010: 79 29 68 5D 7F 6C 04 E7   7A CE B2 7A 60 D3 36 A4  y)h].l..z..z`.6.
#     0020: 7C 8C CD 2F 6B 63 BF 05   6C A0 4C 66 FB DD 86 2F  .../kc..l.Lf.../
#     0030: 91 CE F2 92 69 9A 49 25   91 84 05 87 67 C5 FC 46  ....i.I%....g..F
#     0040: 41 DA 0A 0E EA E0 24 CB   F7 2B D8 22 BC DE 83 96  A.....$..+."....
#     0050: CC 82 18 D5 C6 11 80 7F   01 90 C1 82 4C A6 9C C1  ............L...
#     0060: B5 F2 70 2E 14 CC CA 34   8B 1F 12 4D 3F 9B 43 FE  ..p....4...M?.C.
#     0070: E0 C2 70 B9 58 0C AD CD   F6 0E 3F 15 27 A9 1C 2C  ..p.X.....?.'..,
#     0080: 7F 0A 77 08 72 B1 B5 E1   88 25 1B 44 C0 8B E4 E1  ..w.r....%.D....
#     0090: 15 F0 71 CB 37 24 F2 7B   AD F1 B1 6E 5C 69 55 A9  ..q.7$.....n\iU.
#     00A0: D4 0F CB DB 5A A2 46 30   1C 69 65 FF 86 31 3A 5D  ....Z.F0.ie..1:]
#     00B0: 6F 15 B7 53 F7 6F 83 F4   95 A6 92 24 0B 04 58 29  o..S.o.....$..X)
#     00C0: CA 54 99 2F 03 8F E6 19   B6 1F 57 C7 C6 64 C0 1D  .T./......W..d..
#     00D0: C3 2C 34 30 7E 86 D8 50   27 AD 74 69 70 7D AD 2E  .,40...P'.tip...
#     00E0: D1 71 FB 62 DD B5 31 6A   80 07 23 7C B7 C4 33 EF  .q.b..1j..#...3.
#     00F0: C2 7C 33 0C 41 B9 4D 4A   E1 E0 04 28 55 93 02 BA  ..3.A.MJ...(U...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.315 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9F B6 21 B6 20 DB A9 DB   92 90 52 DE 38 78 EA 39  ..!. .....R.8x.9
#     0010: 91 20 00 BC B1 5D B1 ED   B1 58 01 A4 14 BD FA 9C  . ...]...X......
#     0020: BD 92 DB 21 AC 39 B9 4B   A8 A7 2F 09 6B CC 8B 09  ...!.9.K../.k...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.316 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.629 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FF 29 4C BD 56 0B E1 F1 D4 46 8C 22 82 4E 87 FF 84 A3 99 8E AD 2D 97 C2 40 5D 43 CE 8D D1 E1 55",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 18:23:37.070 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 18:23:37.071 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 18:23:38.449; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:23:38.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 18:23:38.814; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:38.816; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:38.816; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.853 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 7C 92 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:18.000 UTC",
#     "not  after"         : "2024-01-24 18:23:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#         0010: 3F 34 DF D3                                        ?4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.857 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 99 B9 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:09.000 UTC",
#     "not  after"         : "2024-01-24 18:23:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.868 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.369 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.372 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.372 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.389 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.390 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.392 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3B 8A 3D 19 2A 7C 09 B1 62 CC 56 DA E5 8D 63 05 77 76 84 0F E0 B9 F0 A4 F3 7D C5 97 F7 37 42 89",
#   "session id"          : "C7 F7 47 DD 04 E2 6E D0 A6 44 2B CC DA 8F BC AA AD 45 D9 65 00 55 C5 6A 38 2A 21 7B 1C BF 7D 0D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 11 7E E8 0E 71 1D 06 DD   DD 95 C1 48 65 40 7D E4  ....q......He@..
#             0010: B4 A6 A8 0B F1 A0 F1 33   23 D1 52 36 EC 6B BA 15  .......3#.R6.k..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "19 22 21 07 2F E8 09 B6 D8 D9 21 97 51 79 99 34 D4 F4 2B 41 6D 7A 6B 95 C0 47 6E 7F 2F F3 FB 89",
#   "session id"          : "C7 F7 47 DD 04 E2 6E D0 A6 44 2B CC DA 8F BC AA AD 45 D9 65 00 55 C5 6A 38 2A 21 7B 1C BF 7D 0D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8E F1 4B DB 5C 00 CA 55   D4 26 B8 56 01 50 79 44  ..K.\..U.&.V.PyD
#           0010: 98 9C DF C6 7F C7 8D 80   05 04 6A 6B 9A 34 C8 7D  ..........jk.4..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.517 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.519 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.566 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.569 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.572 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.576 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.579 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.579 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.584 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.587 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.588 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.588 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.592 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 C1 CA 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:13.000 UTC",
#       "not  after"         : "2024-01-24 18:23:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B FD AE 01 24 E7 3A 9E   42 A9 1E FC B6 FB 73 3B  ....$.:.B.....s;
#           0010: 72 52 52 FA                                        rRR.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.595 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.644 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.677 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.681 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 CE C7 D7 19 7F 8B AF   19 1A D2 C8 71 96 76 3A  F...........q.v:
#     0010: 48 03 09 32 CD 0F E4 0B   85 C1 43 7A 10 07 EE 8B  H..2......Cz....
#     0020: 9B 9B 42 98 F1 B7 C7 E5   69 78 C7 B2 79 BD A4 44  ..B.....ix..y..D
#     0030: C1 CD 13 2D 0D BC BF 44   C8 F8 CD B5 AC 5C 7B 09  ...-...D.....\..
#     0040: 0C 2F 73 B8 F1 EA 35 73   04 E7 6D 8A 6F 1B 2C 7D  ./s...5s..m.o.,.
#     0050: 83 22 30 22 95 92 D3 AC   A9 CB D5 0B EA A3 B0 A9  ."0"............
#     0060: 84 07 BB 8E EB F3 67 73   C4 BB 4B D3 A9 05 28 51  ......gs..K...(Q
#     0070: 2A 71 8E A6 51 EB D9 78   93 3D E1 B9 18 51 1D A7  *q..Q..x.=...Q..
#     0080: F0 2E 62 B2 19 9B 50 D6   E5 58 27 01 84 4F 3C F3  ..b...P..X'..O<.
#     0090: 91 A1 DE 1D A7 FF E8 10   C8 DA C6 9D B3 92 1B B6  ................
#     00A0: 25 EB C3 E7 58 77 81 E0   4F 08 03 72 C2 22 B7 FD  %...Xw..O..r."..
#     00B0: BE 79 4F CC 3B 0E 46 97   FF 7D 64 91 31 7B 27 4E  .yO.;.F...d.1.'N
#     00C0: C1 40 CA 07 93 3B 59 F6   98 6B 82 C9 3E 41 2E D1  .@...;Y..k..>A..
#     00D0: A5 AD E7 F6 C0 08 44 E3   A4 06 75 38 FC 3F 4D D4  ......D...u8.?M.
#     00E0: ED F0 F9 1F FA 65 9B 60   2B 59 F4 7E 96 38 4D AF  .....e.`+Y...8M.
#     00F0: 2E DB E7 6E AE FA CC C6   BB C9 3D 47 4F FF 93 2A  ...n......=GO..*
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.683 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 04 F2 5A B5 ED 1D 4E 20   F0 96 8A 47 F3 DC A5 96  ..Z...N ...G....
#     0010: 0D C3 57 AC 93 80 F7 6A   78 70 72 67 47 22 7D 6A  ..W....jxprgG".j
#     0020: 1F B2 71 01 09 05 E4 6D   44 7B 34 9F 25 C2 65 08  ..q....mD.4.%.e.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.684 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.689 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 7C 92 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:18.000 UTC",
#       "not  after"         : "2024-01-24 18:23:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#           0010: 3F 34 DF D3                                        ?4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.720 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 53 30 66 25 FA 11 2A 09   AA 2F 88 3B 8D E0 89 85  S0f%..*../.;....
#     0010: 4D 6B A3 A1 40 43 B2 F6   5E 7E 42 E3 DF 0E 69 7C  Mk..@C..^.B...i.
#     0020: 18 08 2C E6 88 13 CA 29   61 22 40 4F 79 55 F8 12  ..,....)a"@OyU..
#     0030: A0 F7 04 9B F0 99 E2 46   F6 B6 BB AB 75 D9 10 78  .......F....u..x
#     0040: 9B 5D 1C 8F DE 7D 8E AD   96 F0 B9 01 51 EA A6 5F  .]..........Q.._
#     0050: FF 25 97 3A 82 F0 FC B7   3A 7B 03 32 45 7C 56 B5  .%.:....:..2E.V.
#     0060: CA 4F 16 66 40 5B C8 E6   AC 34 C0 76 23 03 9F 03  .O.f@[...4.v#...
#     0070: 97 7E 50 9F 97 1C AB 57   73 0A 93 7D B3 F0 07 91  ..P....Ws.......
#     0080: 77 B8 7A B2 65 46 4B B6   97 9B DE E2 09 8E 28 0F  w.z.eFK.......(.
#     0090: DD A6 2F 2E A0 56 C4 D6   25 38 F3 AC 6B 62 B2 EA  ../..V..%8..kb..
#     00A0: 00 BB 39 2B 2C 33 EE 7D   69 1A 7B A1 85 69 9A 0D  ..9+,3..i....i..
#     00B0: 1A 0F E3 6F 39 AF EB 41   82 E7 6F 86 C0 58 CB 7D  ...o9..A..o..X..
#     00C0: A5 AC D6 0C BC FB D2 0E   63 D9 65 6D 23 0E F4 AD  ........c.em#...
#     00D0: 6F F2 39 7B 1E CF 2F 21   FC 5B 67 C5 E4 92 4D 26  o.9.../!.[g...M&
#     00E0: 4E DC ED 66 DB 68 D3 E2   9B 81 0C FC C1 6A 62 06  N..f.h.......jb.
#     00F0: 2B 95 55 88 1D 15 81 DE   7D 66 CC 84 19 1D 54 E1  +.U......f....T.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.721 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 F0 47 D1 C6 85 D8 36   BE D9 EC CD 33 B0 EC AE  ..G....6....3...
#     0010: 5A F2 62 F4 CD 7B 29 DE   FC 92 CF E1 4D 0B B1 A9  Z.b...).....M...
#     0020: C5 80 69 7E 69 E8 46 6E   FE C2 61 14 0A 12 41 C8  ..i.i.Fn..a...A.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.722 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.775 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F1 6A 6D 3C D2 42 34 6C 51 C5 30 01 65 3E 26 92 BC 51 5C 15 A5 3B ED 96 51 58 C3 9C 44 F5 F5 E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 18:23:40.069 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 18:23:40.070 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-26 18:23:57.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:57.775 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 99 B9 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:09.000 UTC",
#       "not  after"         : "2024-01-24 18:23:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:57.789 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.110 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.112 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.112 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.130 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "29 FA F3 3D 61 70 43 28 87 6A 40 9E 8F 9F 2F 87 54 05 4D 39 83 B0 EC 1B F8 C9 3E 11 7A 88 0B 04",
#     "session id"          : "C0 63 BD 81 17 CD 56 C9 0D 07 33 4A 8A C5 FF 55 35 00 E8 2E FC 87 8B C1 A8 2A 49 14 91 27 50 63",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E8 70 26 0D 3C C1 05 2D   97 D1 4D 2E FD 84 FD 8D  .p&.<..-..M.....
#               0010: 9F F6 00 19 DC 9A 29 C4   44 F5 3F F3 9E 63 C0 77  ......).D.?..c.w
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8B E9 C5 B2 C5 35 32 90 C3 E5 F2 7E 3A E2 28 7A 9E 84 D0 84 37 49 89 F5 B1 30 0D CF 13 F4 47 D1",
#     "session id"          : "C0 63 BD 81 17 CD 56 C9 0D 07 33 4A 8A C5 FF 55 35 00 E8 2E FC 87 8B C1 A8 2A 49 14 91 27 50 63",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C 72 85 3E 2C 3B 38 DC   97 A3 FA B1 9C A7 BC 88  \r.>,;8.........
#             0010: AE 93 C5 07 00 46 4B 64   5B 46 21 41 FA D9 87 7D  .....FKd[F!A....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.154 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.163 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.165 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.169 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.174 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensio

[...truncated too long message...]

e.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:25:22.568 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.628 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.628 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.629 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.629 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41112/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14369ms
ok 78 stop command for single port in 17771ms
ok 79 status detects locally running solr in 9638ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7432ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1112ms
ok 82 listing out files in 2979ms
ok 83 copying files around in 6646ms
ok 84 upconfig in 2591ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1248ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1256ms
ok 87 Cleanup in 2136ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 6s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/p6hwayglm35fy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8252 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8252/

All tests passed

Build Log:
[...truncated 1394 lines...]
BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/65rcwiuheopm4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8251 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8251/

All tests passed

Build Log:
[...truncated 1271 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40129/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 13:05:45.228; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:05:45.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40129/solr] to [https://127.0.0.1:40129].
# WARN  - 2023-10-26 13:05:46.056; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:05:46.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16898ms
ok 74 start solr with client truststore and security manager in 19408ms
not ok 75 start solr with mTLS needed in 54801ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-XfGouV/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40129 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40129 (pid=765600). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40130 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40130 (pid=765707). Happy searching!
#
#     INFO  - 2023-10-26 13:06:48.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:06:48.769; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:06:49.203; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:49.205; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:49.206; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(ca,h=[localhost],a=[],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.260 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1E 5B 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:34.000 UTC",
#     "not  after"         : "2024-01-24 13:06:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#         0010: 6A E9 69 7A                                        j.iz
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.281 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 47 14 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:25.000 UTC",
#     "not  after"         : "2024-01-24 13:06:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.322 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.956 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.958 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.958 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.972 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.990 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.990 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.992 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5C 00 7A BC 7C C5 12 F5 FC A2 B6 1B C8 48 0E 1F D0 AC 36 A6 66 F6 BE F4 70 AF 75 8A 69 13 56 FF",
#   "session id"          : "87 2B E5 83 7D 58 69 12 B1 A5 C4 C0 D5 A5 2C 75 50 0D 8F 9E AC A8 B5 B1 AB 71 00 06 5B DC CF CF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 36 B6 5B 24 FA F5 0B   17 2B 36 F3 E3 36 E5 A3  h6.[$....+6..6..
#             0010: 91 79 DC E1 0E F9 B0 30   3E B8 3D 9F EF B9 02 28  .y.....0>.=....(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 D3 1E 47 45 0D 35 BF F3 1E 76 7F FA F9 2B F4 16 F8 48 2D BA 54 E2 0F 06 E2 85 FC F0 89 F3 7E",
#   "session id"          : "87 2B E5 83 7D 58 69 12 B1 A5 C4 C0 D5 A5 2C 75 50 0D 8F 9E AC A8 B5 B1 AB 71 00 06 5B DC CF CF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F2 E7 32 CA 01 0D F8 CE   FC EB 70 19 56 C7 84 BE  ..2.......p.V...
#           0010: A6 25 18 4C 0C B8 AB 71   F1 F3 F8 0F C1 FD B4 6C  .%.L...q.......l
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.550 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.566 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.567 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.568 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.596 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.611 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 02 0B 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:30.000 UTC",
#       "not  after"         : "2024-01-24 13:06:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 89 56 A6 D9 EA 9F 78   50 7B C4 F0 4B 81 BF 90  ..V....xP...K...
#           0010: BA A7 B4 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.611 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.694 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.698 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 BF 1A C3 49 55 03 0F   6C DE 9A AC FD 1C CF 74  ....IU..l......t
#     0010: 04 FA DD 0A E0 2A 5A 7B   02 5A D5 69 E2 D4 C4 3C  .....*Z..Z.i...<
#     0020: 1E F1 B5 B6 E7 CF 87 75   65 81 6C DC 61 3F FA BD  .......ue.l.a?..
#     0030: C9 39 15 45 BE 94 24 E2   F5 F8 B8 DB 05 43 A1 36  .9.E..$......C.6
#     0040: BC 8C A6 F7 81 4E A4 E1   48 EA 2D 54 40 1F 6D 12  .....N..H.-T@.m.
#     0050: 06 68 32 8B 3C 77 C3 CF   94 AF 8E F4 26 0C 90 34  .h2.<w......&..4
#     0060: 54 26 79 FD 0B B8 EB 1E   F5 C0 D8 38 9B 0C B3 FA  T&y........8....
#     0070: 7B FD 61 6E BC DE A7 06   15 ED B4 60 4E 9B 76 52  ..an.......`N.vR
#     0080: 4A F0 8F 2F 97 A4 D8 1C   5E 21 63 A0 83 12 B3 5F  J../....^!c...._
#     0090: 7D B4 07 97 1F B7 47 24   6F 06 2A 9A D6 01 CB 1E  ......G$o.*.....
#     00A0: 68 4D 67 CA 8C 83 6B 97   12 97 B5 33 42 9E B1 B9  hMg...k....3B...
#     00B0: 19 22 16 C7 92 61 41 C8   EA EB B2 A4 8D F5 49 CE  ."...aA.......I.
#     00C0: F7 5D 88 95 6A 72 8E 31   AD A2 C9 B1 B8 F1 97 B1  .]..jr.1........
#     00D0: FA B3 C2 18 F7 3D 4A 31   32 7A CC 69 0A 44 45 83  .....=J12z.i.DE.
#     00E0: A3 B1 CC 13 26 64 05 3A   DF 68 E9 99 ED AB 0B 4F  ....&d.:.h.....O
#     00F0: A5 51 1D 88 2B C2 5B F1   F1 4C 0F AA 51 CA FF 0F  .Q..+.[..L..Q...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.700 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CA 8C D0 E6 3E 02 9C F6   B7 0B D0 F6 7D 92 75 DD  ....>.........u.
#     0010: E4 4F D3 0D 59 5E 29 A6   60 19 0D 58 7B 17 5A 2B  .O..Y^).`..X..Z+
#     0020: E9 C1 13 67 25 EA AD 5B   99 9C 83 A8 A9 CA 5C A0  ...g%..[......\.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.703 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.706 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.708 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1E 5B 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:34.000 UTC",
#       "not  after"         : "2024-01-24 13:06:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#           0010: 6A E9 69 7A                                        j.iz
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.751 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 12 2C F9 F6 01 E5 24   3C B7 6E A7 61 F9 13 EA  4.,....$<.n.a...
#     0010: 31 7B BA E8 B8 4D 4C 75   F6 A5 8B BA FA 25 B0 01  1....MLu.....%..
#     0020: 12 92 C3 91 E7 8D 66 12   A4 6F 34 CE 51 E9 52 CE  ......f..o4.Q.R.
#     0030: 91 DF 46 12 77 80 F5 C8   75 31 AB 03 AF EE 96 A5  ..F.w...u1......
#     0040: 8E 25 29 05 F6 49 1D E9   A8 65 AD D6 3B D5 36 FF  .%)..I...e..;.6.
#     0050: F4 02 A0 22 D0 8A 95 3F   E8 67 90 5F 63 F8 DA 40  ..."...?.g._c..@
#     0060: 0C BA 74 9E 6A 50 DF 77   C8 27 FC CB 24 A8 34 3D  ..t.jP.w.'..$.4=
#     0070: 18 AD F2 DE 43 AF 3B F4   02 EA EB 7D 28 53 D2 E1  ....C.;.....(S..
#     0080: 3F 6F 7F 70 2A D0 73 E3   78 C5 6B 8D DE A0 AF 56  ?o.p*.s.x.k....V
#     0090: 0D 37 7B EA 31 1C 71 09   F1 27 FA 64 A6 7B 17 AA  .7..1.q..'.d....
#     00A0: D3 86 58 FF 9B 52 6B 55   4E 00 CF A3 1C 4D A0 61  ..X..RkUN....M.a
#     00B0: 27 7F 8A 57 C4 19 4E 5E   F7 84 65 3C 55 2F 5D 91  '..W..N^..e<U/].
#     00C0: 58 D1 DF 4A 76 18 7D FB   67 1E A2 A3 B1 E0 16 A4  X..Jv...g.......
#     00D0: F8 9B 99 C2 AA 09 CE A2   79 59 69 FB 2A 38 7E 01  ........yYi.*8..
#     00E0: 56 53 40 51 F3 5D 03 23   6E B0 A3 A0 70 1D 57 CE  VS@Q.].#n...p.W.
#     00F0: 3F 65 E1 F1 93 F2 6C 08   05 EE 2D 33 32 12 5D 9C  ?e....l...-32.].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.752 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 92 22 F4 49 39 EE 22   5F 23 9F 43 7A 5C 64 21  ..".I9."_#.Cz\d!
#     0010: 5A F3 47 53 3A DB E9 76   68 7E 0A 9D B8 06 4A F0  Z.GS:..vh.....J.
#     0020: 88 7F 47 3E 71 EB 0A 9B   B8 3A E6 F8 E6 67 93 F5  ..G>q....:...g..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.755 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.865 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E2 B7 65 CE 40 53 15 40 75 76 6C C4 D5 C9 EC 3E 6F AD AB 59 5F 91 32 88 F6 A2 1A 52 3E 7B 5A A9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:06:51.433 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:06:51.434 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 13:06:52.811; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:06:52.816; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:06:53.211; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:53.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:53.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.252 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1E 5B 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:34.000 UTC",
#     "not  after"         : "2024-01-24 13:06:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#         0010: 6A E9 69 7A                                        j.iz
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.256 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 47 14 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:25.000 UTC",
#     "not  after"         : "2024-01-24 13:06:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.271 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.450 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.450 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.452 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.452 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.456 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.469 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BB 8D 7A 83 93 1E 82 80 17 4D 1F BC 4B E5 42 AB E7 50 AC D4 E4 2A 8E 46 09 A8 47 7B 1C 3E 5D 1A",
#   "session id"          : "A5 3E 3B 9E 1C D0 4E 96 E3 B7 CE C9 B1 B6 E9 99 5F 05 0E 9D F7 45 E7 9F 08 A6 A0 09 F1 0F 5F E7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F 6F 29 E7 78 2D BC A7   18 25 5A 49 C4 C3 3E 9B  .o).x-...%ZI..>.
#             0010: 80 A6 A3 44 6C 7B CD 42   9D 56 22 90 F2 34 81 02  ...Dl..B.V"..4..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.622 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D2 04 8F E1 D8 FD 8E 4A 55 D6 43 CD CD F1 CA 62 CA 50 D0 63 17 FE 7A 9F 92 1E FE 0B A4 1D 22 50",
#   "session id"          : "A5 3E 3B 9E 1C D0 4E 96 E3 B7 CE C9 B1 B6 E9 99 5F 05 0E 9D F7 45 E7 9F 08 A6 A0 09 F1 0F 5F E7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 70 CE DE 9C CB 41 54 7F   90 33 68 C5 0B 04 69 15  p....AT..3h...i.
#           0010: 33 38 5A AD F4 07 89 53   48 B4 1D 0A EE 76 86 56  38Z....SH....v.V
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.623 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.623 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.628 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.639 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.642 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.643 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.649 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.649 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.650 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.650 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.652 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 02 0B 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:30.000 UTC",
#       "not  after"         : "2024-01-24 13:06:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 89 56 A6 D9 EA 9F 78   50 7B C4 F0 4B 81 BF 90  ..V....xP...K...
#           0010: BA A7 B4 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.652 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.991 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.994 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 D2 A0 DD 2E C7 35 E0   A1 10 F8 3E 17 8B DF 17  Q.....5....>....
#     0010: 64 20 E5 4D 6B 53 3B 84   80 4E C4 FF E5 26 74 AC  d .MkS;..N...&t.
#     0020: 9B 09 B2 41 84 9B A9 B9   B7 F3 29 D8 87 AB A1 FD  ...A......).....
#     0030: 06 1F DD EB 19 B4 18 B7   29 90 D6 ED 7D AB 2E 18  ........).......
#     0040: DF 27 A7 5E 01 A8 CA B6   0D AD 70 E4 AE B3 57 AE  .'.^......p...W.
#     0050: 0C D4 E8 01 71 5F 1B 0A   B0 53 AD 12 14 7E 14 D8  ....q_...S......
#     0060: D9 93 27 55 53 54 13 AF   0B FA C0 FB A8 02 58 C0  ..'UST........X.
#     0070: 12 A7 80 38 4F ED 74 90   41 F2 10 5F 62 41 89 CF  ...8O.t.A.._bA..
#     0080: A5 8B 99 32 BA 81 65 C2   C0 E7 61 62 28 B7 1D 63  ...2..e...ab(..c
#     0090: 5E 77 FA C5 37 87 99 6F   18 A8 3A BD E3 D0 C2 00  ^w..7..o..:.....
#     00A0: 22 7F 2A F5 ED A5 F5 FF   0F E7 03 CD C6 EA 6E B2  ".*...........n.
#     00B0: C1 E6 F3 21 47 E7 BD D9   41 1A F2 1D 9A 75 FF 31  ...!G...A....u.1
#     00C0: 1A 43 C9 68 6B 73 97 A7   DF F9 72 D4 6B 82 64 95  .C.hks....r.k.d.
#     00D0: 35 9E 2B F5 E5 B7 3D EA   12 20 9D 9D FC 2A 1D E8  5.+...=.. ...*..
#     00E0: 7B CA 2E 63 9C A6 B3 3A   CF C8 9A 15 EF 57 25 18  ...c...:.....W%.
#     00F0: 52 BF 28 CF D4 06 B5 C0   97 01 23 E5 59 2C 4E 38  R.(.......#.Y,N8
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.995 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 84 B1 BC 28 BA 18 39   F9 BF 98 75 37 12 E1 D0  x...(..9...u7...
#     0010: 56 3E F2 A7 60 93 ED CA   EC 0A 0A 45 34 31 40 E4  V>..`......E41@.
#     0020: 22 1C F7 50 9C 93 EA 8B   DB 02 20 05 07 DD EF 34  "..P...... ....4
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.000 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1E 5B 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:34.000 UTC",
#       "not  after"         : "2024-01-24 13:06:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#           0010: 6A E9 69 7A                                        j.iz
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.025 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 C4 C7 77 6C C3 18 6F   4C 86 3F EA 92 EF 26 EC  H..wl..oL.?...&.
#     0010: 9A 92 5F F0 29 B0 B2 B7   9E 68 44 40 C1 6F C1 3F  .._.)....hD@.o.?
#     0020: B8 09 11 24 B4 E6 66 D5   61 34 EE D2 E6 C0 E4 91  ...$..f.a4......
#     0030: DB F0 D0 4F F5 7D 22 65   6E F3 8E C9 FC 61 D1 1F  ...O.."en....a..
#     0040: AB 37 3C A6 4B 7C EB D6   04 51 99 21 1B 6A 89 0C  .7<.K....Q.!.j..
#     0050: 2F 95 A7 35 CA 48 A1 50   BD 29 20 E9 57 4E E8 C4  /..5.H.P.) .WN..
#     0060: 31 28 F5 3D 48 C2 E8 B2   0A 68 E6 44 4B EA 07 E2  1(.=H....h.DK...
#     0070: 27 08 4C 7A 7A 52 81 C7   FC DC B4 E7 9A FB E4 6B  '.LzzR.........k
#     0080: 95 63 1F 3F 3C 1F C3 CC   F7 B9 59 45 8A 6F 1A 5A  .c.?<.....YE.o.Z
#     0090: 33 15 FC 5F 34 94 FB 48   64 2A D9 25 BA 17 E1 68  3.._4..Hd*.%...h
#     00A0: 60 F0 23 F9 65 EE 12 33   3A 29 A7 33 D9 5E 39 63  `.#.e..3:).3.^9c
#     00B0: 67 FB 37 EA F7 89 1D 4C   4C C0 32 58 F9 D1 D9 D1  g.7....LL.2X....
#     00C0: 06 92 F0 B0 4F C7 4A 56   10 2A A7 49 57 1B A0 60  ....O.JV.*.IW..`
#     00D0: 7F 3E 97 5F 43 B6 D3 BA   28 C7 92 7F 6D 5C D6 67  .>._C...(...m\.g
#     00E0: 1F 4F 7B B0 83 64 C9 00   91 CF 0C E0 21 AD EB 24  .O...d......!..$
#     00F0: DB D1 49 0C 9A 8D 0F D7   88 CE B2 CB A9 59 28 15  ..I..........Y(.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.026 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 56 78 F2 23 7F 45 01 3A   8D 14 E6 39 16 76 98 E9  Vx.#.E.:...9.v..
#     0010: C5 52 59 A3 B7 D4 97 14   23 F9 3C E8 9B 15 4D D3  .RY.....#.<...M.
#     0020: AB C6 1B DC 0B C2 DC CD   A2 BD 6A 2A A7 5A A1 A1  ..........j*.Z..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.027 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.085 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "88 B2 FE C1 F3 FB DA D1 A7 91 AB 17 C1 30 93 80 75 AF CC E6 3A 37 70 F3 55 68 B8 87 ED 85 BB AC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:06:54.371 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:06:54.371 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-26 13:06:54.375 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-26 13:06:54.376 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-26 13:07:07.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:07:07.948 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 47 14 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:25.000 UTC",
#       "not  after"         : "2024-01-24 13:06:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:07:07.961 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.488 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.490 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.506 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "26 CB 73 02 F5 B0 DC A9 9F 56 F9 63 AD FF 81 0B 61 80 A0 B6 1D B4 11 4F 97 35 6C 05 9D 59 FA AB",
#     "session id"          : "D1 46 9D E5 4F 09 04 D3 62 C7 B2 7D 1A 43 23 82 6E 83 6C 5E B1 70 20 B2 9A 86 48 5B D6 CB A2 E3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2C 8D AA 69 11 18 40 2B   4C 7E B1 DF F6 6A 05 3B  ,..i..@+L....j.;
#               0010: 20 34 73 D1 94 0D 5A D3   61 6C 40 93 1A 4A AB 2C   4s...Z.al@..J.,
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D9 B1 50 04 62 27 84 0B F6 D4 47 5F BD 31 14 AF D6 0F 48 77 29 69 9B 98 2D 8D F5 26 D8 4D 0B 61",
#     "session id"          : "D1 46 9D E5 4F 09 04 D3 62 C7 B2 7D 1A 43 23 82 6E 83 6C 5E B1 70 20 B2 9A 86 48 5B D6 CB A2 E3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 67 1B 8C 99 81 0E 31 B9   F1 E2 3A E0 4D FE CC 07  g.....1...:.M...
#             0010: D5 C3 6D 85 7B 95 20 B5   AE 7B 0D 2E 5E F5 FE 27  ..m... .....^..'
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.527 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.537 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.539 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.540 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.543 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.543 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.544 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.544 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#  

[...truncated too long message...]

SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14773ms
ok 78 stop command for single port in 17721ms
not ok 79 status detects locally running solr in 1511ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7499ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1473ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2888ms
ok 83 copying files around in 6596ms
ok 84 upconfig in 2596ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1245ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
not ok 87 Cleanup in 2491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 36s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/dszeggnocywt2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8250 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8250/

All tests passed

Build Log:
[...truncated 1393 lines...]
BUILD FAILED in 1h 6m 7s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/llp6p5tdzm5ta

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8249 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8249/

All tests passed

Build Log:
[...truncated 1405 lines...]
BUILD FAILED in 1h 5m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/f7ninp5jwcaeo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8248 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8248/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43477/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 05:22:22.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:22:22.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43477/solr] to [https://127.0.0.1:43477].
# WARN  - 2023-10-26 05:22:23.536; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 05:22:23.575; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16550ms
ok 74 start solr with client truststore and security manager in 19547ms
not ok 75 start solr with mTLS needed in 50907ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-baNBEo/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43477 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43477 (pid=1251883). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43478 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43478 (pid=1252050). Happy searching!
#
#     INFO  - 2023-10-26 05:23:25.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:23:25.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 05:23:26.019; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:26.021; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:26.022; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 1D F8 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:11.000 UTC",
#     "not  after"         : "2024-01-24 05:23:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#         0010: 5F D0 AB 82                                        _...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.111 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1C CE 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:03.000 UTC",
#     "not  after"         : "2024-01-24 05:23:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.138 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.477 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.564 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.566 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.566 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.576 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.624 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 22 83 63 D4 A5 A3 86 FE F7 6E A4 2D 90 96 5D DA 5B B5 27 90 2B 6C F3 13 6C 4A F1 AA D1 E2 CD",
#   "session id"          : "67 78 28 44 AC 95 C7 90 DB E1 BF D7 A8 F9 4E 6D 69 A5 D6 C4 28 DD 03 9F 10 27 FA E4 1A 4D E2 D8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D0 5C 0E E6 27 77 EE 85   FD 09 7D 7D 58 21 77 A7  .\..'w......X!w.
#             0010: 8A 28 22 1D 77 73 C1 59   B5 37 FE 87 62 8F D2 3A  .(".ws.Y.7..b..:
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.952 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2B 71 C3 27 CB 7B 3B DB 05 3E B0 65 EA 4C 11 5F E7 02 53 4E 81 E6 8E 8E D1 E6 AC 5D E4 50 31 6C",
#   "session id"          : "67 78 28 44 AC 95 C7 90 DB E1 BF D7 A8 F9 4E 6D 69 A5 D6 C4 28 DD 03 9F 10 27 FA E4 1A 4D E2 D8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F4 30 16 BC 2B 78 04 53   E3 B3 8A C4 D9 EE 28 DA  .0..+x.S......(.
#           0010: 41 86 B2 D0 ED EF F8 CE   EC 01 3C 6B 39 31 16 45  A.........<k91.E
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.952 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.953 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.976 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.977 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.978 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.984 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.984 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.985 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.002 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 90 59 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:07.000 UTC",
#       "not  after"         : "2024-01-24 05:23:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 B8 F7 87 E1 F1 D2 7D   53 13 9E A5 87 D6 CC 8B  ........S.......
#           0010: C4 DB A2 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.002 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.101 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.106 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 E1 0E 69 56 12 B8 A8   97 2B 82 B1 C4 0E 0D B9  ...iV....+......
#     0010: 9C 56 7F 47 85 26 41 1F   37 E7 C3 7B E9 F7 3A E0  .V.G.&A.7.....:.
#     0020: E0 60 A8 52 6F FF D7 87   C1 D6 0F 88 79 B2 59 98  .`.Ro.......y.Y.
#     0030: 2C 21 97 FB 76 C8 8F F1   A2 31 32 BC 7C 0D 64 75  ,!..v....12...du
#     0040: 78 60 C3 6E 48 F4 E3 EC   7B B0 35 4E BC 38 FF C8  x`.nH.....5N.8..
#     0050: E9 6A 8F 3E 3D 9A 93 9B   B9 5C FE 63 90 7F 63 C3  .j.>=....\.c..c.
#     0060: CF EC 5C B7 53 96 2E E7   DB 56 15 9C 77 85 7D E7  ..\.S....V..w...
#     0070: 91 D7 FC 40 3E 5D 17 CF   47 41 C7 1E FD 8B E4 59  ...@>]..GA.....Y
#     0080: 83 CA 77 C1 C5 7F DD 62   F3 A2 E2 16 74 C8 4D 50  ..w....b....t.MP
#     0090: B8 05 40 A4 ED 66 EA 26   0A A7 D8 BC 42 1E 13 85  ..@..f.&....B...
#     00A0: 22 92 99 86 EC 4E 63 6C   E4 8F 58 8C 9B 98 67 31  "....Ncl..X...g1
#     00B0: D1 96 EE 1E 03 B6 90 71   9D 96 F2 5B 91 6A BA B6  .......q...[.j..
#     00C0: FF C4 DC 32 48 2A 7D 17   07 E4 93 3D D3 05 51 1F  ...2H*.....=..Q.
#     00D0: A6 E8 C9 AD 8E F5 41 11   90 E9 90 6B 75 8F 8B D8  ......A....ku...
#     00E0: 36 95 16 B7 B3 4E 80 6F   86 7E 6A D0 EA 7C 75 48  6....N.o..j...uH
#     00F0: 72 F4 48 60 C9 D2 15 47   08 1D D2 FD A0 C5 DF 75  r.H`...G.......u
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.117 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CC 6F 51 A9 C8 70 8C A4   A8 B9 FA 34 F9 CE A1 71  .oQ..p.....4...q
#     0010: EA CC 8C 5B E6 79 65 19   62 16 5E 51 16 0D D2 C5  ...[.ye.b.^Q....
#     0020: 66 70 7E AE BF D9 73 9B   04 55 91 20 03 49 63 29  fp....s..U. .Ic)
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.118 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.126 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 1D F8 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:11.000 UTC",
#       "not  after"         : "2024-01-24 05:23:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#           0010: 5F D0 AB 82                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.322 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 3B 3B 7F 36 62 C4 84   F8 51 45 C9 CD AE 87 F6  b;;.6b...QE.....
#     0010: FB A4 7A D9 97 2D DD 28   48 B5 0E 34 11 56 D3 72  ..z..-.(H..4.V.r
#     0020: 68 BE 66 1C C1 20 93 D8   4A 53 B1 56 E2 13 AB 3A  h.f.. ..JS.V...:
#     0030: 4E B0 98 E7 DB 8A AC 87   31 C0 AD BE EF 83 64 4D  N.......1.....dM
#     0040: 6B 0E 2B 20 89 89 38 5C   83 76 A5 15 54 03 F9 C2  k.+ ..8\.v..T...
#     0050: 10 27 BD 6F 9C 61 E2 0B   D3 B0 6F 83 91 F1 A5 0C  .'.o.a....o.....
#     0060: DC 5A 53 97 47 95 73 81   AC 64 A7 57 51 80 B9 3A  .ZS.G.s..d.WQ..:
#     0070: 5B 28 C2 12 71 ED 8F F0   FF 1F 83 26 89 02 17 38  [(..q......&...8
#     0080: 1A CE 16 AB E8 50 2A 05   7E 8A 51 9B D4 AC 33 D0  .....P*...Q...3.
#     0090: 85 FD 47 92 F3 CA E3 01   3B 89 3B FE 63 4A 9F 96  ..G.....;.;.cJ..
#     00A0: FA 52 A7 53 2F C8 08 0E   2C F8 A9 F0 29 28 3C 98  .R.S/...,...)(<.
#     00B0: 12 53 37 8E F1 96 49 02   CC 4E A2 5E 28 E4 C7 95  .S7...I..N.^(...
#     00C0: 90 C7 2E 48 42 C5 D5 B1   E5 8B AF D4 EC 6A 85 3D  ...HB........j.=
#     00D0: 8D 56 A5 11 47 05 B4 25   5F 61 93 65 D4 8A 57 C3  .V..G..%_a.e..W.
#     00E0: E7 AF 1F D5 A9 6B EC 0D   D6 DB 04 E6 43 69 C8 A2  .....k......Ci..
#     00F0: EE E6 92 D4 7A 2E 77 35   7B E9 21 13 04 C2 17 74  ....z.w5..!....t
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.323 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 33 11 7D 5C 0D 55 1A   F8 38 ED 99 13 50 FE B9  .3..\.U..8...P..
#     0010: 73 96 DE 88 D2 85 5D 46   A3 9A 68 D3 F3 73 3C 6B  s.....]F..h..s<k
#     0020: 9D 21 A5 A5 67 76 25 C2   8F F2 95 56 0F B8 59 01  .!..gv%....V..Y.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.326 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.461 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D2 7B 31 F6 91 1C 4C C6 67 85 B4 2A A4 F2 58 BD 4B 1C 51 E7 2F 87 D1 0D 5D 66 B4 DE 43 14 A8 8F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 05:23:28.150 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 05:23:28.151 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 05:23:29.400; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:23:29.404; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 05:23:29.759; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:29.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:29.762; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.793 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 1D F8 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:11.000 UTC",
#     "not  after"         : "2024-01-24 05:23:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#         0010: 5F D0 AB 82                                        _...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.797 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1C CE 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:03.000 UTC",
#     "not  after"         : "2024-01-24 05:23:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.808 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.961 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.962 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.963 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.963 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.978 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.979 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.981 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "90 FA FA FB 69 F2 AD 8C 6B 20 DE FE C8 7A CA 36 21 50 56 8F A3 F5 5F DF 50 F1 8C 63 A4 C4 F2 99",
#   "session id"          : "B1 66 29 7F 63 EE 06 57 66 4D F0 64 62 C2 32 D0 7C 98 86 2A C3 DC 1F 65 2F 64 A7 F3 66 9B 22 D5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D6 D7 55 DA E7 45 9C 9E   B2 25 2E C2 31 05 BB 7D  ..U..E...%..1...
#             0010: A6 80 F5 2B 7A 59 55 59   87 90 79 E5 F4 F7 E6 0C  ...+zYUY..y.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "11 A3 A0 4B 56 3F 04 55 CF EE 6A C6 ED 74 D8 21 32 10 6E 1B CB 58 4A 66 E1 45 23 56 D5 F2 A8 24",
#   "session id"          : "B1 66 29 7F 63 EE 06 57 66 4D F0 64 62 C2 32 D0 7C 98 86 2A C3 DC 1F 65 2F 64 A7 F3 66 9B 22 D5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D2 7A DB 0F BD 7F 9B 81   D9 16 20 58 19 A1 1B 41  .z........ X...A
#           0010: 3C 9D 2A F4 2B D4 03 63   68 26 8F B5 E2 22 23 35  <.*.+..ch&..."#5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.089 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.092 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.111 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.113 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.115 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.118 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.118 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.119 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.127 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.128 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.129 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.136 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 90 59 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:07.000 UTC",
#       "not  after"         : "2024-01-24 05:23:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 B8 F7 87 E1 F1 D2 7D   53 13 9E A5 87 D6 CC 8B  ........S.......
#           0010: C4 DB A2 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.136 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.202 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.205 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3A 37 06 AD 00 EC FB B0   3B 01 55 31 87 F3 DA 02  :7......;.U1....
#     0010: 3B 70 85 79 0E 48 23 60   25 71 40 55 73 CC D2 52  ;p.y.H#`%q@Us..R
#     0020: EA 65 54 76 D8 18 AE FD   01 6A 64 D2 9D 56 8E 2C  .eTv.....jd..V.,
#     0030: 83 1F 22 88 3F 36 1D 8E   EB BB 21 A2 A6 84 80 40  ..".?6....!....@
#     0040: BB 29 FF F7 CC AC 57 0D   E7 80 5C B9 54 FC 95 C5  .)....W...\.T...
#     0050: 57 14 69 07 0C 16 AD 0E   35 64 13 26 4C 6D A9 2A  W.i.....5d.&Lm.*
#     0060: 8B 6E 13 91 95 C6 62 EA   51 15 10 8F 50 00 D3 45  .n....b.Q...P..E
#     0070: 1A 3E B6 21 71 ED 3D 81   52 8A 77 F9 5A 41 2A 8E  .>.!q.=.R.w.ZA*.
#     0080: F8 C0 61 B7 65 12 D4 0A   86 71 1C 13 2E D0 A1 E5  ..a.e....q......
#     0090: 6A 7D 16 D4 74 11 B7 94   88 61 E2 38 DA C6 E2 40  j...t....a.8...@
#     00A0: 31 BE F3 53 3C 32 C0 C0   88 91 E0 B7 C9 CD D0 DE  1..S<2..........
#     00B0: 24 8D 65 4A E7 2D D0 D6   5C B4 2C 88 85 FD 7B 55  $.eJ.-..\.,....U
#     00C0: 9B 2D 07 7F 52 02 BA 55   BB 6D BA 5C 65 60 4B 90  .-..R..U.m.\e`K.
#     00D0: B5 55 E1 AF 45 7C BD B0   C7 D8 C8 86 4F CD 3F 7B  .U..E.......O.?.
#     00E0: B0 08 0A 91 84 FB F8 BA   31 FE 9A 79 30 38 A9 68  ........1..y08.h
#     00F0: 78 29 86 52 9D 13 80 64   E2 F8 B2 A7 9B 3D 60 20  x).R...d.....=`
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.206 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4C 02 B7 3D 8B 1B 40 4F   FC D6 3F F9 A9 A9 4D 99  L..=..@O..?...M.
#     0010: 70 50 10 A4 17 5C AB CB   BB A1 17 0A 17 C8 92 89  pP...\..........
#     0020: C6 4C EA 45 08 5D 3C F8   12 C1 2C C0 D0 8E 0E 46  .L.E.]<...,....F
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.208 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.210 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.212 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 1D F8 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:11.000 UTC",
#       "not  after"         : "2024-01-24 05:23:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#           0010: 5F D0 AB 82                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.235 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E 5F FA A4 B6 AD 2F B5   E0 93 F5 E3 2B 5C 12 0A  n_..../.....+\..
#     0010: 54 4E 55 53 D9 3B B2 8A   88 59 4E 92 8C 6B 93 E5  TNUS.;...YN..k..
#     0020: 54 E9 C5 AC 0D EF 51 67   72 27 5E 3A 2A 75 17 DA  T.....Qgr'^:*u..
#     0030: EB 3F D4 18 51 E8 AD 6C   CD 48 5B E8 39 1B BC 38  .?..Q..l.H[.9..8
#     0040: 62 7E A0 C4 91 20 15 BE   12 15 D8 85 BD F9 AD 02  b.... ..........
#     0050: 47 B8 F4 59 88 22 17 11   5E 48 49 6A 37 CD 46 4E  G..Y."..^HIj7.FN
#     0060: F2 BD CA 2C BF 7E B4 16   F9 EF B6 06 C2 33 7D 7B  ...,.........3..
#     0070: 6E 9C 33 08 EB C7 26 58   DE E2 94 0F 28 71 2C 4C  n.3...&X....(q,L
#     0080: 15 02 15 5F 61 A4 17 39   AB 0F D4 D8 ED 4C 6C B9  ..._a..9.....Ll.
#     0090: 0B 34 48 BE B2 43 07 97   2C 89 19 28 24 A3 48 36  .4H..C..,..($.H6
#     00A0: 22 F0 28 74 E2 4E BE 18   3B 1F 40 69 29 77 B3 A2  ".(t.N..;.@i)w..
#     00B0: C2 23 40 95 C6 C8 9F 42   86 4C 5A 60 7D 39 C9 AD  .#@....B.LZ`.9..
#     00C0: 7F BF B0 6D 40 BB E3 39   6E 78 44 5E E3 9A 62 8B  ...m@..9nxD^..b.
#     00D0: 55 F4 7B 6A 42 77 BF 7F   C9 4E 0A C2 13 14 91 AE  U..jBw...N......
#     00E0: 9D 2B BF 23 53 CE A0 41   F9 7C B8 99 23 F0 74 78  .+.#S..A....#.tx
#     00F0: 11 9F D5 35 F3 D8 D1 56   C7 46 CD 75 D7 90 A9 02  ...5...V.F.u....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.236 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F0 1D 9F 51 02 6B ED FD   3B 1A 90 AB 62 25 47 3B  ...Q.k..;...b%G;
#     0010: 9C 81 06 DD 54 89 D8 81   D8 2E B5 FC F5 D9 A8 90  ....T...........
#     0020: F1 87 4F CF 6A 90 61 13   8C C6 C5 49 91 F8 3C 3D  ..O.j.a....I..<=
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.236 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.295 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "99 0B 76 7C D4 AF AF 06 1E 7E 98 8F F1 ED 5A 21 88 D3 08 AB 57 51 78 A5 43 FB 7C 5E E4 B1 E0 32",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 05:23:30.548 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 05:23:30.549 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-26 05:23:30.565 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-26 05:23:44.104; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:44.454 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 1C CE 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:03.000 UTC",
#       "not  after"         : "2024-01-24 05:23:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:44.467 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.628 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.628 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.630 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.630 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.634 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.648 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "85 95 A0 BE 6F 34 1F 03 40 B3 BD 81 61 BF EF B2 AE 13 7A AB 04 46 72 05 1E 93 B1 1F 94 D1 62 C1",
#     "session id"          : "E2 07 D2 74 80 51 69 BD F3 F2 B1 96 FE 1E A6 60 CC 18 0C AE AE BE 30 03 9E 12 F6 DF 70 38 86 FA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: DB 64 20 DA 5A 1F EA BA   83 7A 38 97 95 D6 E7 E2  .d .Z....z8.....
#               0010: 22 C8 C9 07 9F 99 01 16   B3 C0 5F 1C 72 9C C9 58  "........._.r..X
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "BC F5 75 AD 50 B1 A4 79 EF A3 30 43 7C 0D D4 90 4A 92 1E 6D 4D E4 1F 6C C6 1C DB 8F 1D 89 88 DB",
#     "session id"          : "E2 07 D2 74 80 51 69 BD F3 F2 B1 96 FE 1E A6 60 CC 18 0C AE AE BE 30 03 9E 12 F6 DF 70 38 86 FA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA D8 D8 49 9E 3E 25 52   F8 D3 4E 63 9A 04 03 55  ...I.>%R..Nc...U
#             0010: C6 BD C1 C0 93 A9 23 55   27 B7 F1 20 99 E1 92 7A  ......#U'.. ...z
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.671 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.682 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.684 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.685 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.701 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "cert

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:24:57.923 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43478/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14523ms
ok 78 stop command for single port in 18606ms
ok 79 status detects locally running solr in 9648ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7428ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1126ms
ok 82 listing out files in 3011ms
ok 83 copying files around in 6646ms
ok 84 upconfig in 2606ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1244ms
ok 87 Cleanup in 2086ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 55s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/wvenjdlkwvo4y

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8247 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8247/

All tests passed

Build Log:
[...truncated 1559 lines...]
BUILD FAILED in 1h 5m 50s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vkvyixryih34q

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8246 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8246/

All tests passed

Build Log:
[...truncated 1562 lines...]
BUILD FAILED in 1h 5m 16s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jabc27uv4zxky

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8245 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8245/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43585/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-25 18:20:52.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:20:52.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43585/solr] to [https://127.0.0.1:43585].
# WARN  - 2023-10-25 18:20:53.162; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:20:53.201; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16373ms
ok 74 start solr with client truststore and security manager in 19811ms
not ok 75 start solr with mTLS needed in 56234ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-vHw9CF/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43585 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43585 (pid=3882620). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43586 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43586 (pid=3882788). Happy searching!
#
#     INFO  - 2023-10-25 18:21:54.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:21:54.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:21:55.831; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:21:55.834; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:21:55.839; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.912 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 BB 0D 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:41.000 UTC",
#     "not  after"         : "2024-01-23 18:21:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#         0010: FA 54 1B A6                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.920 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 4C AB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:32.000 UTC",
#     "not  after"         : "2024-01-23 18:21:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.935 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.511 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.511 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.524 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.566 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "16 76 70 F3 0D 64 76 17 F0 F4 DC 77 CC 6A CF B3 89 31 19 0C 71 13 FA F1 86 0C C5 85 5A C4 E2 C2",
#   "session id"          : "57 D1 9D D5 89 F9 9D B5 A1 4A F6 AD 70 81 76 F4 1C 5E 12 01 FC 89 48 1A 18 8B 6E F9 5E 00 E2 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 37 5A BA 22 67 C0 63 9B   E1 7E 61 AE 2D 0D B7 97  7Z."g.c...a.-...
#             0010: 40 35 65 AD F6 C7 FC 16   E8 8F 19 15 E1 9C FD 63  @5e............c
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.965 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "06 BE 06 EA CF A4 DB AE A1 53 55 49 2B B4 CB 1B 9F 6A 83 17 EF A4 4E B9 D0 0C 8F 01 48 A8 4C 65",
#   "session id"          : "57 D1 9D D5 89 F9 9D B5 A1 4A F6 AD 70 81 76 F4 1C 5E 12 01 FC 89 48 1A 18 8B 6E F9 5E 00 E2 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3A C4 78 32 00 58 FC 09   73 12 84 34 14 6C 46 43  :.x2.X..s..4.lFC
#           0010: 3C 64 1D 1D 9C BD 1A D8   1F 65 AE DD 8E 53 FC 30  <d.......e...S.0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.965 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.966 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.983 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.983 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.990 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.995 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.995 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.030 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.045 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.047 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.051 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.052 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.052 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.054 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.069 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.069 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.070 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.081 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 22 71 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:37.000 UTC",
#       "not  after"         : "2024-01-23 18:21:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 1B 4B B5 54 BE C8 0F   4A AD E2 ED C8 07 82 7C  W.K.T...J.......
#           0010: 1E B2 5D FA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.082 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.225 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.426 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E A7 97 E1 B0 C1 39 8F   65 8B 29 88 E7 C1 87 6E  >.....9.e.)....n
#     0010: 8E C7 6D 94 FA F8 EF A7   B2 56 4E 49 EE 8E 1D 3F  ..m......VNI...?
#     0020: 10 EE 2C E0 08 C6 2D 1E   A5 25 5D D9 89 C9 F2 21  ..,...-..%]....!
#     0030: 81 C9 15 7C F7 FD 9B A6   B0 EB 23 BD 2A 30 F6 83  ..........#.*0..
#     0040: D0 A6 03 DC EC 14 FB AD   3B 10 BC 4A DA D8 D1 CA  ........;..J....
#     0050: 6E E0 1F 53 84 41 9A C5   35 AA E5 0F 9F 88 28 1F  n..S.A..5.....(.
#     0060: 18 02 BF 46 54 52 6C 00   02 95 CB 00 8C 37 F3 E3  ...FTRl......7..
#     0070: 54 39 DF A2 5C FA 55 31   35 A0 FA 95 32 32 6F 1B  T9..\.U15...22o.
#     0080: 49 AD 65 6F B6 C7 13 78   EB 40 C3 E3 2E C1 72 4B  I.eo...x.@....rK
#     0090: 31 D4 B4 C7 89 E8 52 BC   AE 34 9A EE 0B 38 DB 86  1.....R..4...8..
#     00A0: BB 5B 62 9B 86 60 16 F5   57 1E A9 AA 5F B4 AD A0  .[b..`..W..._...
#     00B0: 10 B5 D6 46 F3 F0 EE 86   4F 6A 5E 5A 23 CF 87 50  ...F....Oj^Z#..P
#     00C0: 46 E0 D4 54 5F 0C 90 5B   CC 82 3F 47 52 44 52 F9  F..T_..[..?GRDR.
#     00D0: 02 46 A2 B1 D0 E5 EB 62   15 98 8A A6 D4 94 2A EE  .F.....b......*.
#     00E0: 41 21 F0 A8 0C 43 27 7D   B7 23 1F D1 42 6C 90 AC  A!...C'..#..Bl..
#     00F0: B8 1A DA B6 C9 2E B3 54   BB 72 3D A9 DA 6C 8E 8A  .......T.r=..l..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.428 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 79 17 4F 12 BC 7B 42 C5   DD 57 1C F9 2C 7B CD 4F  y.O...B..W..,..O
#     0010: 49 E5 8E 74 99 2B 95 4F   EE 97 7C BB 4F E8 D2 87  I..t.+.O....O...
#     0020: 45 FE 5B 7A 4E A7 BE 09   EF BF 2A 3D 21 AB 7E CA  E.[zN.....*=!...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.430 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.432 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.444 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 BB 0D 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:41.000 UTC",
#       "not  after"         : "2024-01-23 18:21:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#           0010: FA 54 1B A6                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.527 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.527 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 4D 72 41 D1 E7 5A F3   F9 02 5B CF 69 25 37 63  tMrA..Z...[.i%7c
#     0010: B8 F9 57 A8 A2 1F D2 68   1E FE BD 7B A7 D8 F3 43  ..W....h.......C
#     0020: 73 C4 2F 77 79 F8 AE 27   E2 15 0B 1B 48 40 AD 13  s./wy..'....H@..
#     0030: 1B 77 10 00 DA 4D 82 02   F4 7E 79 B2 63 6B 92 5A  .w...M....y.ck.Z
#     0040: F1 58 79 E2 53 7E 36 DB   E6 53 89 94 6E 06 C4 FF  .Xy.S.6..S..n...
#     0050: 1E 06 A1 2B 76 8C 32 4C   F1 03 52 72 0B 1B 8A EF  ...+v.2L..Rr....
#     0060: 96 E7 47 A9 83 04 39 30   33 3E E5 48 A1 F9 34 31  ..G...903>.H..41
#     0070: D2 C4 02 43 46 D2 6F F7   83 6B BE DC C0 30 2F 8C  ...CF.o..k...0/.
#     0080: 24 B8 E9 FA 71 83 DF 20   CE 4E 4F F3 DE 4C 4B 5A  $...q.. .NO..LKZ
#     0090: 38 EA A9 FD 92 8E 6C 88   A9 49 61 F0 6C 2C C7 FA  8.....l..Ia.l,..
#     00A0: 25 4B B8 3E 91 77 02 64   61 C9 D1 E8 E0 E9 9D A8  %K.>.w.da.......
#     00B0: F6 81 E5 E6 33 BD 3F A8   28 2B 0D 6F 2C 5C C3 12  ....3.?.(+.o,\..
#     00C0: 23 F7 1C C9 F2 8A 40 A4   18 CE 21 69 D8 E2 62 EA  #.....@...!i..b.
#     00D0: 6E 53 BB 11 A0 C8 9B 3A   9F 49 D8 4E 54 31 FF FB  nS.....:.I.NT1..
#     00E0: F9 EE 6C 66 D3 3B 63 2F   26 51 51 97 38 E5 9E D6  ..lf.;c/&QQ.8...
#     00F0: E0 7A 94 4F 7E 26 DC 0B   04 83 06 51 FA D6 3A 39  .z.O.&.....Q..:9
#   }
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.529 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 85 44 F4 8E E1 73 F7   C3 CE C5 05 53 E3 92 DA  ..D...s.....S...
#     0010: BB 2F 2D 7C BC 99 DA 23   EC CD AF 70 BD E5 0A AA  ./-....#...p....
#     0020: 7E A2 58 AB 9C AD EF 09   95 60 66 73 57 97 FE 6B  ..X......`fsW..k
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.529 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.624 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "21 42 09 80 A8 06 13 1A 22 09 D7 B5 DD 6F 49 E7 78 31 E7 C6 81 01 42 7A 84 2B 4A 21 4F 7D A2 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 18:21:58.263 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 18:21:58.264 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 18:21:59.797; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:21:59.802; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:22:00.174; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:22:00.176; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:22:00.177; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.212 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 BB 0D 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:41.000 UTC",
#     "not  after"         : "2024-01-23 18:21:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#         0010: FA 54 1B A6                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.216 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 4C AB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:32.000 UTC",
#     "not  after"         : "2024-01-23 18:21:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.228 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.395 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.396 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.399 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.399 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.404 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.418 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EE 64 AE 69 E7 A7 E5 97 F3 B8 89 EA 6F 15 2B 98 6B D2 80 75 25 26 2C 43 2E EF 90 3E 07 FA EA BF",
#   "session id"          : "2A 65 8D 92 87 11 A2 AB 6D 11 AE 36 56 D3 62 44 86 5C C8 11 C2 BB 87 FA 2A F1 9E 4B C4 26 B3 73",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D9 C9 B2 D8 1E 67 4C BC   60 BD 63 F3 F5 30 8A B4  .....gL.`.c..0..
#             0010: 77 4B 9B AA B3 A2 DC 27   B5 DF 5D 99 BC 20 E8 76  wK.....'..].. .v
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.520 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7B 40 39 87 CB 63 D4 31 0D 47 9F 70 58 E3 D4 7C 97 2D 4F 31 D4 36 11 2C 7A 36 F0 0C 54 D7 A2 23",
#   "session id"          : "2A 65 8D 92 87 11 A2 AB 6D 11 AE 36 56 D3 62 44 86 5C C8 11 C2 BB 87 FA 2A F1 9E 4B C4 26 B3 73",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C9 4E AE A2 53 92 B9 EF   CE 3E B9 C1 FB 36 78 2A  .N..S....>...6x*
#           0010: 36 82 26 87 EE 5F FB 43   7E 7A A5 3D 9F 46 FE 7C  6.&.._.C.z.=.F..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.524 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.549 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.551 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.553 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.576 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 22 71 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:37.000 UTC",
#       "not  after"         : "2024-01-23 18:21:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 1B 4B B5 54 BE C8 0F   4A AD E2 ED C8 07 82 7C  W.K.T...J.......
#           0010: 1E B2 5D FA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.576 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.635 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.639 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 01 03 69 39 AB 00 17 C9   67 B0 35 23 A8 45 B5 0F  ..i9....g.5#.E..
#     0010: A5 EC 2E 36 8C C9 33 17   AE 96 3C 9E A4 2E 46 7C  ...6..3...<...F.
#     0020: 58 8F E0 5C FD 23 15 1E   54 E6 87 50 EE B6 53 0A  X..\.#..T..P..S.
#     0030: 62 E6 1C F1 D8 B9 B0 36   A9 38 01 F3 44 F5 F2 02  b......6.8..D...
#     0040: 11 38 E3 06 AA AC E5 4F   4E E3 D7 FB 96 CE 25 30  .8.....ON.....%0
#     0050: 3B 88 3E A6 D4 B9 F4 AF   19 02 9D 34 96 1C 7A 15  ;.>........4..z.
#     0060: 2A 98 63 01 3B B7 8B 6A   19 E3 2C 51 B6 77 50 4F  *.c.;..j..,Q.wPO
#     0070: 67 E7 29 43 2B D4 EA 19   DE A6 FE B2 D9 6E F1 57  g.)C+........n.W
#     0080: 9B 26 8F 05 54 09 A6 C1   20 60 66 E7 40 74 36 5A  .&..T... `f.@t6Z
#     0090: 05 1E 8B 87 02 99 91 1C   70 BF BB 4B FA C3 7B 9B  ........p..K....
#     00A0: 39 54 3C 9F 89 D4 5C 7E   82 E3 A1 FB 6B EF 0C E8  9T<...\.....k...
#     00B0: 3E 37 AE BB F3 B7 9C EF   F7 05 AB FD CE 16 52 28  >7............R(
#     00C0: CE C2 FD 92 6C 56 93 42   A5 7F 88 3B 74 23 2E CD  ....lV.B...;t#..
#     00D0: 57 37 18 78 96 21 FC 87   BC 5E D8 78 EE 1E 1B 7B  W7.x.!...^.x....
#     00E0: 72 86 5F 2A 93 7E 78 DA   C1 A5 90 9E F1 3A 0A 14  r._*..x......:..
#     00F0: BA 34 96 D1 AD FE 3C 2C   B6 60 75 5B 91 8A 05 10  .4....<,.`u[....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.641 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF AC 03 A8 6C FB 7D FC   AB B0 53 3A AC 2F E4 81  ....l.....S:./..
#     0010: AD 5C C9 28 89 A9 0A 80   06 9B 27 94 48 B8 B2 05  .\.(......'.H...
#     0020: 43 55 B0 0A 38 14 1E CB   29 3A C1 63 82 4D D6 AD  CU..8...):.c.M..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.642 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.643 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.643 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.646 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 BB 0D 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:41.000 UTC",
#       "not  after"         : "2024-01-23 18:21:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#           0010: FA 54 1B A6                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.668 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 A8 2A 21 86 6D D0 4B   DE 9B 45 8A 27 59 8C E9  v.*!.m.K..E.'Y..
#     0010: AC DC 22 98 A6 EA 15 00   50 8E 64 2B 1C 78 49 CA  ..".....P.d+.xI.
#     0020: C6 85 D2 12 39 76 3B 24   C9 72 D0 FB 83 AF C9 AB  ....9v;$.r......
#     0030: E4 4F 07 AB ED EE EA D9   05 F0 E5 39 15 E7 2A 65  .O.........9..*e
#     0040: EE DF EC 6C EA 5C 01 BC   25 3C 07 9E 6E E7 6F 23  ...l.\..%<..n.o#
#     0050: 10 5E 77 22 48 FA 18 3A   F1 26 0F 7D A4 13 D9 F8  .^w"H..:.&......
#     0060: 95 11 8C D2 8C 4C 23 14   5E 0B F9 C2 99 F9 FC 87  .....L#.^.......
#     0070: 8D C3 D6 6A D6 B9 B4 59   24 43 B7 1C 81 8C C1 3B  ...j...Y$C.....;
#     0080: 73 15 37 5E 15 6D 95 F3   14 3B 11 9E 13 3E 73 16  s.7^.m...;...>s.
#     0090: 38 59 61 F7 4F CB 0F 8E   E1 39 F7 62 D9 B2 48 01  8Ya.O....9.b..H.
#     00A0: C1 E7 57 04 E7 51 A0 BD   C4 5E A2 B0 E1 9B 85 4E  ..W..Q...^.....N
#     00B0: 64 7A 24 45 AC 28 7E 27   00 E6 E9 3E AD 62 02 68  dz$E.(.'...>.b.h
#     00C0: E7 6A 76 F4 8D 4D D4 5A   EB 40 BD DA D5 57 01 19  .jv..M.Z.@...W..
#     00D0: A0 43 29 F4 6E 48 B0 A3   53 42 CF B2 4B BF 85 36  .C).nH..SB..K..6
#     00E0: 59 75 0D 06 21 68 38 AB   2C F2 9B 43 A5 0B C5 A0  Yu..!h8.,..C....
#     00F0: CC 43 2B B3 17 65 18 84   59 A0 DF CB FA 01 00 3A  .C+..e..Y......:
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.670 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F8 D5 59 42 0E 95 C6 E5   11 3C AD B4 C5 5B 78 21  ..YB.....<...[x!
#     0010: 12 2E 2F BF C6 12 46 70   0D CB F3 8F 74 EA 03 83  ../...Fp....t...
#     0020: 34 B3 F7 71 4C E8 C8 3B   38 B4 4C A7 D5 D4 3D B8  4..qL..;8.L...=.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.670 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.756 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.758 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4E 70 2F D9 30 2D E8 F6 47 3F 5D 36 F6 5F CD D6 BB 29 1C 49 82 2F 4C AF C7 2B 2D 11 81 4B 3B 93",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 18:22:01.179 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 18:22:01.180 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-25 18:22:14.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:14.606 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 4C AB AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:32.000 UTC",
#       "not  after"         : "2024-01-23 18:21:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:14.619 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.150 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.152 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.152 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.156 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.166 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.167 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.167 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.169 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "44 3A 41 10 E5 FC 32 73 FE 1A C4 9B EA BB 2F 73 E6 75 03 F2 C8 07 8E 8F B6 7E D2 01 EF 9C BB 5B",
#     "session id"          : "7F A8 02 2F 73 73 85 FF F9 53 CC 7F 4D C7 BC 86 A4 BB BD A4 2D E7 1E DD 54 43 47 B4 68 28 4B 23",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A5 E5 6F 71 6B C9 3E 11   75 CD 80 45 2B F8 B4 7D  ..oqk.>.u..E+...
#               0010: 7D 36 32 96 54 06 CF 71   2B E9 F3 85 0D EF 4A 50  .62.T..q+.....JP
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C2 D7 8C C9 12 37 9B F7 D2 C9 C3 5D A3 39 A3 F2 A9 2C 48 A1 8B A8 CE 5E 14 12 EE CB 8D 61 0F 67",
#     "session id"          : "7F A8 02 2F 73 73 85 FF F9 53 CC 7F 4D C7 BC 86 A4 BB BD A4 2D E7 1E DD 54 43 47 B4 68 28 4B 23",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 10 79 03 7B 87 CF EE   01 13 CF AF 0C D0 F3 88  D.y.............
#             0010: EE 50 CB DD 85 30 A3 B1   95 4A 8B 0D 3B 61 59 33  .P...0...J..;aY3
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.200 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.202 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.205 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificat

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:23:32.655 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43586/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14409ms
ok 78 stop command for single port in 17752ms
ok 79 status detects locally running solr in 9341ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7522ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1095ms
ok 82 listing out files in 2881ms
ok 83 copying files around in 6561ms
ok 84 upconfig in 2554ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1251ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1242ms
ok 87 Cleanup in 2077ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 7m 4s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3lv2fewxtke4q

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8244 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8244/

1 tests failed.
FAILED:  org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget

Error Message:
java.lang.AssertionError: The non-source node '127.0.0.1:46587_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>

Stack Trace:
java.lang.AssertionError: The non-source node '127.0.0.1:46587_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>
	at __randomizedtesting.SeedInfo.seed([9A3018CA9339638A:B45BCCF0A65AB2FE]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget(MigrateReplicasTest.java:303)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 4133 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32885/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-25 12:54:27.654; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:54:27.658; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:32885/solr] to [https://127.0.0.1:32885].
# WARN  - 2023-10-25 12:54:28.514; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 12:54:28.552; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16965ms
ok 74 start solr with client truststore and security manager in 19748ms
not ok 75 start solr with mTLS needed in 50740ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-O1u2aT/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 32885 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32885 (pid=3409191). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 32886 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 32886 (pid=3409316). Happy searching!
#
#     INFO  - 2023-10-25 12:55:29.615; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:55:29.635; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:55:30.465; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:30.467; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:30.470; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.542 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9E 6F EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:17.000 UTC",
#     "not  after"         : "2024-01-23 12:55:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#         0010: D5 86 BD 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.546 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 F0 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:08.000 UTC",
#     "not  after"         : "2024-01-23 12:55:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.581 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.518 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.519 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.523 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.531 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.544 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.544 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.550 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.552 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7B AF E4 4E 62 C9 96 F6 0F 53 16 44 13 D7 C8 AD 8F C3 73 92 BD 66 81 2C 92 79 7A E6 A9 DB 9A 38",
#   "session id"          : "3A 9A C6 B4 ED 7E 7F 85 05 3E 1C A4 72 97 8D 16 A7 27 4F C2 97 B8 36 8D 71 AD 05 09 A3 95 58 CE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B7 3D 67 13 5F 11 57 F5   B0 DB E8 52 7D 6F F1 9C  .=g._.W....R.o..
#             0010: 64 30 07 4C 65 60 69 1E   07 52 64 BE 97 78 70 38  d0.Le`i..Rd..xp8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.745 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4E 49 16 C7 10 17 BA 12 2A E9 7C A4 F7 8E FC 4D EF DD AC 9D D1 2B 82 23 C1 60 CC D2 D6 5B 1C 77",
#   "session id"          : "3A 9A C6 B4 ED 7E 7F 85 05 3E 1C A4 72 97 8D 16 A7 27 4F C2 97 B8 36 8D 71 AD 05 09 A3 95 58 CE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 45 30 79 07 ED 7C CC A1   FA F4 58 B7 6F 18 B4 18  E0y.......X.o...
#           0010: EB D6 02 09 F3 89 1B 6F   E6 38 4E D9 A6 13 F7 3D  .......o.8N....=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.745 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.746 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.756 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.768 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.768 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.808 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.810 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.811 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.844 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.852 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.853 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.865 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 82 49 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:13.000 UTC",
#       "not  after"         : "2024-01-23 12:55:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 8A 18 F3 43 28 C4 46   F5 03 E2 CC 5A 31 F6 BE  :...C(.F....Z1..
#           0010: 73 18 AF 03                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.865 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.967 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.977 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 65 69 C7 3A 6B 34 87   7C 8B C3 33 02 A1 08 5D  .ei.:k4....3...]
#     0010: 55 B3 3D 33 8F 5F 9F 27   EA FE A0 BE 84 C8 2E D7  U.=3._.'........
#     0020: 1F 63 00 D0 32 C0 CB CD   5E 9D 1D ED E5 15 79 97  .c..2...^.....y.
#     0030: C3 32 91 49 94 97 2D B1   41 7B 11 C7 AD F5 4A 6F  .2.I..-.A.....Jo
#     0040: C9 6B 5C 06 18 E1 0E 47   A7 13 A2 F0 68 87 55 09  .k\....G....h.U.
#     0050: 74 FF 93 26 17 2F 52 FA   69 01 A3 23 29 6B 2B FF  t..&./R.i..#)k+.
#     0060: 19 76 0E B4 06 7C 57 96   6B 9E C5 38 6B 87 74 40  .v....W.k..8k.t@
#     0070: 27 3D 39 FE B9 1B F0 D2   6A 3B B4 C9 D5 1B DB 80  '=9.....j;......
#     0080: 07 F4 1D B2 CA E7 12 19   4F 23 4C D1 86 44 36 CE  ........O#L..D6.
#     0090: 25 7E 65 63 FC D4 7B 24   E8 19 EB AE 00 9D A0 E0  %.ec...$........
#     00A0: AC D8 54 5D B8 1F 07 DA   D6 E7 6F 49 A5 9D DC 1A  ..T]......oI....
#     00B0: D5 96 F1 5D AA EF 72 F2   D8 74 07 8B 36 0E 8D 65  ...]..r..t..6..e
#     00C0: BD 75 53 7B 55 D7 47 A2   88 89 EF C6 57 11 53 40  .uS.U.G.....W.S@
#     00D0: 6C BA E3 6A 9A AA 25 04   7B E1 05 88 16 24 72 92  l..j..%......$r.
#     00E0: 61 92 EE 6B DD D5 22 54   85 04 D0 F3 EC EB 87 36  a..k.."T.......6
#     00F0: 1A 8C CE 1B 71 29 09 24   66 2E 2B 46 7C F3 F1 E8  ....q).$f.+F....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.978 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A7 90 29 17 0F 4E 7F 04   4A 69 D9 3B 12 39 62 77  ..)..N..Ji.;.9bw
#     0010: DE 2A 89 92 50 DC A6 8B   09 EA 76 6F DF 32 01 FB  .*..P.....vo.2..
#     0020: 05 83 A3 2F 5D B1 80 71   62 7D 9F E1 75 F8 43 B5  .../]..qb...u.C.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.981 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.988 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9E 6F EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:17.000 UTC",
#       "not  after"         : "2024-01-23 12:55:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#           0010: D5 86 BD 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.042 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 71 77 2D D3 9E A4 9A   CD 58 DB 63 F0 F7 61 1F  .qw-.....X.c..a.
#     0010: 7E 42 F3 CE A3 77 BB 74   24 E9 79 BA FE F1 FB 36  .B...w.t$.y....6
#     0020: 16 AB 87 05 B9 33 C4 F3   34 A0 73 DE 6C 6A 74 6D  .....3..4.s.ljtm
#     0030: E5 40 8B 2E 91 8A C5 D4   28 CD B7 BF 0F F2 71 3F  .@......(.....q?
#     0040: 8F CD 64 56 69 78 74 3E   80 33 B4 91 B7 38 B5 49  ..dVixt>.3...8.I
#     0050: B5 36 D6 B7 66 82 02 C4   CA 88 3B A6 BE A8 89 64  .6..f.....;....d
#     0060: 84 4A 54 2B EC 5E C2 C0   34 AF A2 57 45 9C 5B B1  .JT+.^..4..WE.[.
#     0070: 02 56 5B 02 A3 73 A5 D7   37 0F 95 7E 4E F8 F1 93  .V[..s..7...N...
#     0080: 94 1C 19 EA 55 62 0F 5E   54 AC 97 37 E6 15 57 59  ....Ub.^T..7..WY
#     0090: F9 49 4E DA F9 77 C9 8A   00 0E 96 E9 AC 6E C8 B6  .IN..w.......n..
#     00A0: 16 0B 16 36 D8 21 9C 87   C9 FE 4C 35 FB 45 76 56  ...6.!....L5.EvV
#     00B0: F4 16 24 5C 03 59 F4 38   94 BA EF D7 65 5A FF A1  ..$\.Y.8....eZ..
#     00C0: 14 B5 9A 85 01 EE BD A6   3E 8B 57 91 19 8E DD 79  ........>.W....y
#     00D0: 3B 42 FD 3D 69 1E 95 3E   F3 C5 E2 7A C8 23 5E C8  ;B.=i..>...z.#^.
#     00E0: 2A 9A AE 91 08 BC 96 38   51 0A 1A 10 F3 26 1B D6  *......8Q....&..
#     00F0: 4E 6A A4 24 8A 41 BD 2E   38 16 D6 B9 E6 43 02 02  Nj.$.A..8....C..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.052 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 0C F2 D2 AC FF 61 BE   D6 88 26 3D 4F 3E DE 93  ......a...&=O>..
#     0010: 83 EE A0 FB F2 01 38 3A   F7 7B CC 12 3F 03 0D 0D  ......8:....?...
#     0020: F5 47 AF C4 10 29 83 21   53 07 09 45 87 62 59 03  .G...).!S..E.bY.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.052 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.146 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "98 0C 17 65 12 AF 9B 38 38 72 48 51 B2 BE 45 D1 24 E2 C4 3E F4 B9 22 DC 6D E2 31 4B B0 B1 BD 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:55:33.028 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:55:33.029 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 12:55:34.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:55:34.819; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:55:35.231; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:35.233; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:35.234; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.270 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9E 6F EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:17.000 UTC",
#     "not  after"         : "2024-01-23 12:55:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#         0010: D5 86 BD 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.274 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 F0 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:08.000 UTC",
#     "not  after"         : "2024-01-23 12:55:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.286 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.461 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.461 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.463 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.463 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.482 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6D CF 58 6B AF E1 BC 0B 3F 90 17 E0 59 22 7A 91 68 04 7A 23 9F 70 61 45 36 BA 45 4B 16 9E FD 90",
#   "session id"          : "5B 37 E8 46 95 E4 24 27 0B 7F B6 9D C7 85 8A 9F 06 FA 60 7A 99 58 A3 A1 43 C4 8C 1B 9D 16 D7 B4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 12 B3 FF C6 AB D5 B4   00 9D 84 13 F1 9C 4A DE  ..............J.
#             0010: 5F 3E 60 8E 69 0E 98 8C   BC 77 64 17 52 0A 4B 69  _>`.i....wd.R.Ki
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 31 46 73 0D 18 39 E0 17 CF BB D8 37 FE 87 BE 3F 24 A3 F6 86 E1 FE F8 D5 B1 5E A2 2B 18 CC DE",
#   "session id"          : "5B 37 E8 46 95 E4 24 27 0B 7F B6 9D C7 85 8A 9F 06 FA 60 7A 99 58 A3 A1 43 C4 8C 1B 9D 16 D7 B4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A2 B9 03 F1 1D F0 78 7E   9D 80 C8 C0 A8 F3 A5 F1  ......x.........
#           0010: 94 CF 2C C6 C8 4E B5 93   49 7C C6 BE E6 BF D4 60  ..,..N..I......`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.613 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.620 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.627 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.628 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.640 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 82 49 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:13.000 UTC",
#       "not  after"         : "2024-01-23 12:55:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 8A 18 F3 43 28 C4 46   F5 03 E2 CC 5A 31 F6 BE  :...C(.F....Z1..
#           0010: 73 18 AF 03                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.641 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.713 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.719 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D FA 54 A3 57 10 C8 6C   30 1D 4E 62 B3 81 05 94  M.T.W..l0.Nb....
#     0010: EE F9 3C 75 08 F0 DC 51   4C 56 DF 3B 8D AD 31 72  ..<u...QLV.;..1r
#     0020: DC 85 CC 67 F6 69 61 80   DC 5C D0 A8 5A 5A E9 6F  ...g.ia..\..ZZ.o
#     0030: 24 F6 F6 07 D4 AA F5 A3   48 D3 75 A0 B8 4D 12 33  $.......H.u..M.3
#     0040: 9A 41 66 0F 26 43 CB 6C   B5 3B 53 7A B4 80 65 44  .Af.&C.l.;Sz..eD
#     0050: 73 68 81 15 08 24 7F 48   46 7A C9 BC F6 9C B3 96  sh...$.HFz......
#     0060: EE 22 E6 8F 82 F7 65 9D   8F B7 0C 85 FF 66 A6 80  ."....e......f..
#     0070: 0D 14 DF 95 C9 62 09 4D   D9 82 6D BA 29 52 FB 46  .....b.M..m.)R.F
#     0080: DB F2 29 8E 99 57 D0 BC   01 6D 0A 81 BB 8A 51 D8  ..)..W...m....Q.
#     0090: 9E 61 FB 61 D5 4C A9 58   EC 08 20 3A 20 3D C5 CC  .a.a.L.X.. : =..
#     00A0: 16 DE 6B E1 BB 48 73 8E   0F C4 E8 97 2E 91 7E 38  ..k..Hs........8
#     00B0: 43 80 12 50 B5 AC DC 67   D8 0C EB D2 AB F3 D7 BC  C..P...g........
#     00C0: CB C8 3F 5F 49 44 A4 28   9B 26 A8 17 5B 08 42 33  ..?_ID.(.&..[.B3
#     00D0: 3D 17 B7 69 3B 8E 5E 4E   F9 F0 36 73 DD F1 67 AB  =..i;.^N..6s..g.
#     00E0: F5 3B 39 C7 24 E9 22 43   17 CC DE E5 71 4C BC CA  .;9.$."C....qL..
#     00F0: BA 3A EA 1F 59 71 D6 98   1A 70 BF DC D4 9B 7C EC  .:..Yq...p......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.721 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0D 0D 5B 88 6E E6 2D 01   46 D9 70 82 F3 D0 E7 1D  ..[.n.-.F.p.....
#     0010: 21 82 92 EC 2D 8E 97 7D   87 1B 8A AC 4F 16 25 85  !...-.......O.%.
#     0020: F5 E3 97 F4 0E 19 A0 F9   04 D5 EA 1D 22 20 40 3B  ............" @;
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.722 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.726 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9E 6F EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:17.000 UTC",
#       "not  after"         : "2024-01-23 12:55:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#           0010: D5 86 BD 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.754 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 6B F4 9E 87 E3 F0 0F   F1 36 F8 F8 B7 07 91 08  wk.......6......
#     0010: D2 5E EC 9D B3 E2 33 6A   BA 7F 89 EB 6A 43 18 C8  .^....3j....jC..
#     0020: D7 39 5C 76 B5 F5 47 85   C3 1F 06 03 E4 EC 88 5D  .9\v..G........]
#     0030: A2 2F BD 49 16 8D E8 06   5B 72 1F 83 E3 1E 10 B3  ./.I....[r......
#     0040: B5 E2 72 60 06 56 D1 39   38 01 4D C3 4D E7 5D 68  ..r`.V.98.M.M.]h
#     0050: 97 02 FC FD 6D 86 45 6D   6B 68 B0 C4 21 23 79 80  ....m.Emkh..!#y.
#     0060: 9E 44 43 97 18 80 C1 C4   2F D7 B2 AD 53 B1 9D 04  .DC...../...S...
#     0070: 2A A3 0D D0 91 7C 73 9C   A5 CE BA 6B DA 6C 4C D0  *.....s....k.lL.
#     0080: 8E E9 FE 2F 45 88 FA 8E   DE B0 F8 01 38 9F 78 04  .../E.......8.x.
#     0090: A8 B0 E1 94 90 27 D7 2B   EC B7 BD 6F 1A 59 CE 8C  .....'.+...o.Y..
#     00A0: 52 2D D0 56 79 4C 1F 05   42 1F 5B DC 11 DB 9C 7C  R-.VyL..B.[.....
#     00B0: 74 43 BF 30 B5 5F 19 FD   2F B8 89 CA 5D A3 67 76  tC.0._../...].gv
#     00C0: 8F 5C EC 2A 38 4F 6D 28   C4 02 14 F8 F2 50 67 20  .\.*8Om(.....Pg
#     00D0: 81 93 ED FD 40 F0 16 55   E0 2B 41 B6 93 8E 70 BE  ....@..U.+A...p.
#     00E0: 6D AD 20 BC B0 15 5B C9   3F 07 62 5B 62 8A 00 5C  m. ...[.?.b[b..\
#     00F0: CC E8 45 62 6B B0 C2 A2   40 B8 D7 2B A6 2B AD 46  ..Ebk...@..+.+.F
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.755 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 06 76 5C FA 2B 18 C8 29   4B 8D 6B 7F EE 3C 2B EB  .v\.+..)K.k..<+.
#     0010: ED 0E 9E 93 B9 AF 10 8D   B7 B8 66 73 5B 14 67 14  ..........fs[.g.
#     0020: F1 08 34 34 6C A8 59 D2   9E A5 CA 15 6D 4B 13 DC  ..44l.Y.....mK..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.756 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.777 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.822 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "74 24 AC 3E D6 EF 95 D0 D2 BA 4E E3 4A 73 61 DA 27 9B 67 53 D5 31 6E BF C5 46 36 EE EB 0E 6F 13",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:55:36.137 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:55:36.138 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-25 12:55:49.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:49.447 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 26 F0 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:08.000 UTC",
#       "not  after"         : "2024-01-23 12:55:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:49.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.718 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.718 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.720 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.720 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.724 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.737 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "18 43 B8 DF AF 54 96 27 C6 73 15 6D 40 62 4A A0 28 00 A8 F9 7B 41 89 A1 D7 9C A9 91 59 BB FB BE",
#     "session id"          : "B5 1F D2 AD F1 1A F5 1D 60 50 41 1E 30 80 CA 7E 72 37 B1 C7 84 C2 E5 CF D6 85 A7 06 0E 03 8D 6A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4C 78 2F 11 83 FC B9 53   EF B4 AF BB 22 D2 AB C5  Lx/....S...."...
#               0010: 71 74 C0 7F F7 B2 92 9E   13 42 D1 1D 03 AA 3C 43  qt.......B....<C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "66 8B 39 96 7D 18 C6 59 75 5E 79 3F 3A F9 3E 1E B1 DD D5 EC 32 E2 B7 77 1C C2 B1 E1 94 B3 7C E8",
#     "session id"          : "B5 1F D2 AD F1 1A F5 1D 60 50 41 1E 30 80 CA 7E 72 37 B1 C7 84 C2 E5 CF D6 85 A7 06 0E 03 8D 6A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C 58 A9 6F 66 5C 3C BC   98 76 7C D6 96 6E 82 CE  .X.of\<..v...n..
#             0010: 24 B2 B1 08 19 E9 74 80   FB 09 16 24 12 84 E3 38  $.....t....$...8
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.757 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:49.760 UTC|SS

[...truncated too long message...]

cutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:57:02.433 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.475 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:32886/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14639ms
ok 78 stop command for single port in 18385ms
ok 79 status detects locally running solr in 9683ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7494ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1092ms
ok 82 listing out files in 3034ms
ok 83 copying files around in 6573ms
ok 84 upconfig in 2632ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1255ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
ok 87 Cleanup in 2107ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.MigrateReplicasTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=9A3018CA9339638A -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/73svf2ok7acmw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8243 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8243/

All tests passed

Build Log:
[...truncated 1519 lines...]
BUILD FAILED in 1h 5m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/bdkwg4nsmaxrs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8242 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8242/

All tests passed

Build Log:
[...truncated 1493 lines...]
BUILD FAILED in 1h 5m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/fzxrsupd7fppu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8241 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8241/

All tests passed

Build Log:
[...truncated 1414 lines...]
BUILD FAILED in 1h 5m 26s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7yw2sobcvxisi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8240 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8240/

All tests passed

Build Log:
[...truncated 1568 lines...]
BUILD FAILED in 1h 6m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uprod6xs27iuo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8239 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8239/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([8D7ACC67C69FB847:BAE13879FE5365E3]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2022 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=8D7ACC67C69FB847 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 9s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/a6ukutag3p6ie

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8238 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8238/

All tests passed

Build Log:
[...truncated 1438 lines...]
BUILD FAILED in 1h 5m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/w6pyzygehomfq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8237 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8237/

All tests passed

Build Log:
[...truncated 1443 lines...]
BUILD FAILED in 1h 4m 42s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/6sdseuprn4yjs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8236 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8236/

All tests passed

Build Log:
[...truncated 1435 lines...]
BUILD FAILED in 1h 5m 51s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3shwx3kssdwj6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8235 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8235/

All tests passed

Build Log:
[...truncated 1449 lines...]
BUILD FAILED in 1h 3m 45s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vrmgz3zyrlkrk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8234 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8234/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([394CC427F3ECF24C:ED73039CB202FE8]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1980 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=394CC427F3ECF24C -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/epgwchjfnbdlg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8233 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8233/

All tests passed

Build Log:
[...truncated 1445 lines...]
BUILD FAILED in 1h 5m 30s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3bvmmozuozpvm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8232 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8232/

All tests passed

Build Log:
[...truncated 1399 lines...]
BUILD FAILED in 1h 6m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/yugmfbwmr4kcc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8231 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8231/

All tests passed

Build Log:
[...truncated 1458 lines...]
BUILD FAILED in 1h 4m 8s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uss42e7oadbmq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8230 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8230/

All tests passed

Build Log:
[...truncated 1423 lines...]
BUILD FAILED in 1h 3m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/xqmtwvy4j3epm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8229 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8229/

1 tests failed.
FAILED:  org.apache.solr.search.TestFiltering.testRandomFiltering

Error Message:
java.lang.AssertionError: FAILURE: indexSize=67 iiter=2 qiter=67 request=[q, {!frange v=val_i l=20 u=86 cache=false}, fq, {!frange v=val_i l=7 u=11 cache=true tag=t}, fq, {! cache=true tag=t}id:RAND1679204360 OR val_s:{00028 TO 00059}, fq,  val_i:3 val_i:5 val_i:6 val_i:7 val_i:8 val_i:9 val_i:10 val_i:11 val_i:14 val_i:21 val_i:25 val_i:27 val_i:30 val_i:32 val_i:33 val_i:34 val_i:35 val_i:36 val_i:39 val_i:40 val_i:41 val_i:42 val_i:43 val_i:44 val_i:45 val_i:48 val_i:49 val_i:51 val_i:52 val_i:54 val_i:56 val_i:60 val_i:61 val_i:62, facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}val_i:[00061 TO 00106] AND val_i:{00060 TO 00107}]

Stack Trace:
java.lang.AssertionError: FAILURE: indexSize=67 iiter=2 qiter=67 request=[q, {!frange v=val_i l=20 u=86 cache=false}, fq, {!frange v=val_i l=7 u=11 cache=true tag=t}, fq, {! cache=true tag=t}id:RAND1679204360 OR val_s:{00028 TO 00059}, fq,  val_i:3 val_i:5 val_i:6 val_i:7 val_i:8 val_i:9 val_i:10 val_i:11 val_i:14 val_i:21 val_i:25 val_i:27 val_i:30 val_i:32 val_i:33 val_i:34 val_i:35 val_i:36 val_i:39 val_i:40 val_i:41 val_i:42 val_i:43 val_i:44 val_i:45 val_i:48 val_i:49 val_i:51 val_i:52 val_i:54 val_i:56 val_i:60 val_i:61 val_i:62, facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}val_i:[00061 TO 00106] AND val_i:{00060 TO 00107}]
	at __randomizedtesting.SeedInfo.seed([52FBBACC94C7D024:4D98190971E0902D]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.search.TestFiltering.testRandomFiltering(TestFiltering.java:576)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 3041 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestFiltering.testRandomFiltering (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestFiltering.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestFiltering.testRandomFiltering" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=52FBBACC94C7D024 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 52s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ooqpujx3cz2me

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8228 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8228/

All tests passed

Build Log:
[...truncated 1429 lines...]
BUILD FAILED in 1h 2m 10s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/q3knwsj67rvkk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8227 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8227/

All tests passed

Build Log:
[...truncated 1409 lines...]
BUILD FAILED in 1h 4m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/rxszpphxsjpzg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8226 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8226/

2 tests failed.
FAILED:  org.apache.solr.HelloWorldSolrCloudTestCase.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([6B1E8E1597B8FEF6]:0)


FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([6B1E8E1597B8FEF6:5C857A0BAF742352]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 7440 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35529/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-20 05:35:43.624; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:35:43.629; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35529/solr] to [https://127.0.0.1:35529].
# WARN  - 2023-10-20 05:35:44.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 05:35:44.529; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 18386ms
ok 74 start solr with client truststore and security manager in 20546ms
not ok 75 start solr with mTLS needed in 53346ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-44C8sf/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35529 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35529 (pid=2314723). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35530 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35530 (pid=2314845). Happy searching!
#
#     INFO  - 2023-10-20 05:36:49.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:36:49.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 05:36:50.758; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:50.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:50.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.802 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 BB BA 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:35.000 UTC",
#     "not  after"         : "2024-01-18 05:36:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#         0010: 05 67 A1 A9                                        .g..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.806 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 83 73 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:26.000 UTC",
#     "not  after"         : "2024-01-18 05:36:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.820 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.288 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.375 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.379 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.380 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.401 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.429 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.430 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.430 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.436 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1F 8A 53 C5 7A 80 60 A6 28 80 D6 63 98 EE 52 F6 7F 4C 60 56 B1 0D 78 FC AC A8 AE 2C AF 63 A9 B4",
#   "session id"          : "42 74 40 00 C4 90 8C DC 0A D0 D2 B0 86 81 BB 1E 1C C8 DB B2 22 2D AA 53 F4 C4 03 48 C3 70 40 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 85 20 5B 1B 53 D4 0A C6   0E 84 1F 3A 80 00 8D CF  . [.S......:....
#             0010: 8C 72 99 4A 01 0D A5 E5   14 E7 5C B2 CC 8B 43 5F  .r.J......\...C_
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.652 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "89 ED 1E 3A 1A 1B 6C FC F6 37 88 FA 94 B2 DB 3C 28 20 08 48 49 CF B5 3F 97 4F 38 60 EE D3 B4 B5",
#   "session id"          : "42 74 40 00 C4 90 8C DC 0A D0 D2 B0 86 81 BB 1E 1C C8 DB B2 22 2D AA 53 F4 C4 03 48 C3 70 40 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 47 B0 81 91 4D D8 A6 A5   FF F5 45 2D 4F BE EB E4  G...M.....E-O...
#           0010: 51 F4 C6 56 65 EA 1E 05   DF 8D BA 34 14 DB D9 40  Q..Ve......4...@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.653 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.653 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.669 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.711 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.713 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.718 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.727 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.740 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.749 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.750 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.750 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.758 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 78 03 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:31.000 UTC",
#       "not  after"         : "2024-01-18 05:36:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 34 B4 36 7D DE 2F 2E   40 3A B6 2A 39 B7 EB C3  .4.6../.@:.*9...
#           0010: 11 D0 02 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.876 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.890 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 7C EA 68 A7 09 35 DD   6F D4 DB 2F 97 6D 0E 0D  ...h..5.o../.m..
#     0010: A1 A5 7E 40 14 C6 1D E3   C9 B3 46 45 45 49 CA 8F  ...@......FEEI..
#     0020: 8D 1B 3B D9 92 E2 F9 6D   75 6B F8 76 60 63 F6 88  ..;....muk.v`c..
#     0030: 49 B0 D8 E4 EF 8F 0D D9   01 46 6D 3E BD E9 45 63  I........Fm>..Ec
#     0040: 09 F6 93 AD E1 28 18 4D   10 C1 CA 93 38 62 8F C5  .....(.M....8b..
#     0050: 1C 3A 31 B9 26 4E 17 2E   CA 11 D8 80 E4 13 8A 3F  .:1.&N.........?
#     0060: CA 11 BD 5D 07 8F AE 05   19 6A 5E FF 83 90 F0 DA  ...].....j^.....
#     0070: 28 BC 30 1A D8 EE 02 F0   58 98 30 ED CE 68 21 57  (.0.....X.0..h!W
#     0080: 47 B4 9E D8 53 B0 A2 50   2A 11 F2 9D 66 12 27 6A  G...S..P*...f.'j
#     0090: 68 32 D8 67 A2 0D 92 C4   AF 2B 79 23 6D C7 C5 31  h2.g.....+y#m..1
#     00A0: 13 A6 A9 B8 DB 55 34 26   71 5C 2A AB F8 45 A0 F2  .....U4&q\*..E..
#     00B0: CF 97 B5 BE AC D7 88 33   7B A6 04 C7 D6 BF FB 03  .......3........
#     00C0: 81 D1 13 68 30 D8 0B 4F   18 F7 77 8F 2D AF 1C 26  ...h0..O..w.-..&
#     00D0: 0A A3 FF BD A9 E4 C7 EA   CE 9F 25 C8 64 7B 6E 7A  ..........%.d.nz
#     00E0: BB 9B 34 A8 34 1A 89 20   2B 03 46 F2 E2 BB F9 CF  ..4.4.. +.F.....
#     00F0: 33 F0 74 CE 76 3D 5F 52   FC A0 B3 A3 CA EB 55 CE  3.t.v=_R......U.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.893 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A0 8D 29 A6 49 01 5D CC   9C 0D 0B D4 10 4D EA CF  ..).I.]......M..
#     0010: 9B 5A 6F BC CF 62 6F EF   5B B8 34 52 E3 9D 48 18  .Zo..bo.[.4R..H.
#     0020: 04 49 B6 BF 21 4B A7 46   0D 11 77 50 03 D8 34 69  .I..!K.F..wP..4i
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.897 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.898 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.899 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.899 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.900 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.901 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.903 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.904 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.906 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 BB BA 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:35.000 UTC",
#       "not  after"         : "2024-01-18 05:36:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#           0010: 05 67 A1 A9                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.059 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 06 A3 EC FB 08 78 26   17 51 49 24 E8 91 33 0B  _.....x&.QI$..3.
#     0010: 1F D7 F1 65 56 9D 31 1E   60 6C 48 80 C9 C7 B4 20  ...eV.1.`lH....
#     0020: 6D D0 42 BC B8 EF B2 78   6C 60 F3 2E 28 95 57 92  m.B....xl`..(.W.
#     0030: BF FB 7E A7 0F FE C1 E7   F2 30 66 1C F9 BE 2C 0D  .........0f...,.
#     0040: C5 29 9E F8 5A 70 A6 F8   D5 00 F9 34 44 26 8B 2E  .)..Zp.....4D&..
#     0050: 11 F3 CE 1B 41 2B 0A 2A   16 62 19 2F 3F 5C DF 84  ....A+.*.b./?\..
#     0060: C6 AE 33 F8 12 EF 3B BF   5A 3D FC 7A 76 E8 D9 34  ..3...;.Z=.zv..4
#     0070: CA A2 97 CD DA BB 52 D1   E5 6C AA A8 1E 1E 1F C3  ......R..l......
#     0080: 4C 2B DF DA B7 10 45 D1   93 6B 79 1F 37 75 62 8F  L+....E..ky.7ub.
#     0090: C5 F9 08 32 A3 C3 D0 CC   78 FB 2F 0A 67 77 06 C4  ...2....x./.gw..
#     00A0: BA 95 5D BD 46 4D 02 91   CD F6 0A 2D 33 56 00 6A  ..].FM.....-3V.j
#     00B0: D4 4B 2E DD 66 B5 3A B3   47 90 BB 85 58 DA 98 A0  .K..f.:.G...X...
#     00C0: 4E 97 C2 B8 9B CF 56 C9   E9 24 1D B6 5C 6B BC 54  N.....V..$..\k.T
#     00D0: AF 6B 96 56 BF BD 4A DB   E1 EA 55 92 BC 4A 95 98  .k.V..J...U..J..
#     00E0: 15 C9 77 B5 19 D8 93 34   8D CA 10 77 7F 40 9A 06  ..w....4...w.@..
#     00F0: DA 1E FF E6 61 AF E6 85   64 0C B3 7B 32 D1 50 65  ....a...d...2.Pe
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.061 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B4 CD 2D 54 92 10 02 80   C4 1C BA 06 5E 75 FE E2  ..-T........^u..
#     0010: CC D2 E7 FB 19 F8 4C 2A   80 0F 44 35 BD C5 1C EE  ......L*..D5....
#     0020: 6B 87 6D E5 9A 82 D7 72   EA B5 74 D7 07 7C 82 9C  k.m....r..t.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.061 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.135 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0D FE 4F 3E 80 92 ED BB 1F 10 5E 5C 66 F7 4C 8C A6 B3 D4 27 72 29 6C AA E4 10 0B 13 23 44 DC 76",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 05:36:52.940 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 05:36:52.941 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 05:36:54.321; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:36:54.326; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 05:36:54.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:54.749; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:54.749; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.787 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 BB BA 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:35.000 UTC",
#     "not  after"         : "2024-01-18 05:36:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#         0010: 05 67 A1 A9                                        .g..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.791 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 83 73 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:26.000 UTC",
#     "not  after"         : "2024-01-18 05:36:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.804 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.089 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.091 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.092 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.096 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.107 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.108 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.108 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.110 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "44 49 50 B9 AB 0C 33 B9 E3 5E D2 11 83 78 38 6B 80 7A 9E 3E 6F 47 D4 7A CF 54 5A 0D 8B 4E 66 03",
#   "session id"          : "60 48 98 DE 33 F3 59 75 D5 AB 0F 7B 95 FB 67 40 47 2D D7 8D FF A6 92 DF 10 43 57 5F CA B9 63 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B5 3C 90 96 87 88 65 D3   12 A6 6B 2E 6D 66 61 29  .<....e...k.mfa)
#             0010: 2A F3 2F 9B 1B E2 6B 73   E1 BD 81 17 73 86 21 43  *./...ks....s.!C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.228 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "ED F9 AA D5 A9 F7 D4 37 EA 80 95 AB FE CE 91 0B A5 E5 B3 BC 48 3A 8E 24 62 6B 25 25 C4 CD D9 A5",
#   "session id"          : "60 48 98 DE 33 F3 59 75 D5 AB 0F 7B 95 FB 67 40 47 2D D7 8D FF A6 92 DF 10 43 57 5F CA B9 63 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7A D5 25 C3 96 39 94 78   B3 D7 32 31 F0 9F 2B F9  z.%..9.x..21..+.
#           0010: CF F3 63 37 B6 8A 73 9B   F8 E6 A0 EB E2 D1 95 0C  ..c7..s.........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.237 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.249 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.254 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.256 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.271 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.272 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.273 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.273 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.284 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 78 03 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:31.000 UTC",
#       "not  after"         : "2024-01-18 05:36:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 34 B4 36 7D DE 2F 2E   40 3A B6 2A 39 B7 EB C3  .4.6../.@:.*9...
#           0010: 11 D0 02 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.285 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.343 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.346 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 C7 AB C2 52 BA E3 17   D4 F3 6A CC CF 31 7C 19  0...R.....j..1..
#     0010: 04 1B 1E 4C 0B DC 6F FF   83 CB B4 A5 E4 27 63 68  ...L..o......'ch
#     0020: 5D AB E7 76 6E 7E B9 D6   D1 F7 C4 99 A2 FB 9C 7B  ]..vn...........
#     0030: B8 40 63 3F 96 02 8C 80   3A DA A5 EC ED 65 E5 EB  .@c?....:....e..
#     0040: 9A 69 D7 6C 05 2D AC 52   30 51 B0 5A 7F B7 70 72  .i.l.-.R0Q.Z..pr
#     0050: FA 3F F8 EF 41 00 25 83   DE 00 7D EE EB 6F 31 C2  .?..A.%......o1.
#     0060: 61 EF 8C 54 74 6B F0 C6   82 52 31 99 26 D0 18 C4  a..Ttk...R1.&...
#     0070: 9B A6 D6 4D 8B 37 64 6E   49 92 77 45 BD 93 CB 52  ...M.7dnI.wE...R
#     0080: D8 E7 A0 E5 FA 85 2B 57   CF 55 90 AE 84 97 D8 FE  ......+W.U......
#     0090: B7 B5 A0 80 8F A4 33 D6   F9 56 29 F8 5E 9B E5 4A  ......3..V).^..J
#     00A0: FE E4 A6 3C D0 DE 01 97   E4 6D B3 36 E2 B6 6F 3A  ...<.....m.6..o:
#     00B0: 96 5D 61 F7 F9 B9 C2 20   C6 D9 01 90 95 D5 03 9E  .]a.... ........
#     00C0: 47 E5 18 05 90 5F 06 16   0F 31 67 0C 7B 76 F8 97  G...._...1g..v..
#     00D0: B7 DD 9C 7D 79 C8 4E FE   8B DB 75 89 BF E2 79 63  ....y.N...u...yc
#     00E0: 0D 22 6F 6C F8 66 5A E2   D0 0B 92 20 34 EF EA 45  ."ol.fZ.... 4..E
#     00F0: 66 6B 9E D7 09 07 94 43   C1 40 25 81 FC FB 84 B7  fk.....C.@%.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.347 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 6F 1E 9D C0 89 4E 44   D0 B1 D9 88 A4 65 DA C7  .o....ND.....e..
#     0010: 96 A1 7A C8 2D 34 1A ED   BA 7F 16 2D CE AB 82 D1  ..z.-4.....-....
#     0020: 5F 17 5D 4B 66 FD 81 49   D0 7B D7 1C 5F 2C AA 62  _.]Kf..I...._,.b
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.349 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.351 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.353 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 BB BA 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:35.000 UTC",
#       "not  after"         : "2024-01-18 05:36:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#           0010: 05 67 A1 A9                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.376 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8A 58 3C 82 B3 BA 06 67   05 C6 DD 03 98 99 DC 21  .X<....g.......!
#     0010: 04 6C 93 8D C5 A3 44 3B   67 02 89 67 6C 91 4E 9B  .l....D;g..gl.N.
#     0020: D6 74 55 74 A2 0C 85 54   0E 02 B1 44 4F 94 0E 62  .tUt...T...DO..b
#     0030: 3A BA 32 78 98 45 C3 ED   23 66 06 11 E9 81 40 99  :.2x.E..#f....@.
#     0040: CE C0 00 71 C4 60 8D 11   78 C1 9B 3D F2 DB D4 A2  ...q.`..x..=....
#     0050: 4E 3C 49 E5 B1 A3 91 31   D7 18 2C 26 47 C5 6D CA  N<I....1..,&G.m.
#     0060: 60 B8 33 39 CD 3F 92 63   A0 98 46 4A EA 5E 15 2C  `.39.?.c..FJ.^.,
#     0070: 76 D4 74 80 08 18 DA EF   24 81 CD 34 F0 E5 3F 59  v.t.....$..4..?Y
#     0080: 61 C9 49 A3 6B 54 A3 2C   AF 61 E4 FF 04 40 88 40  a.I.kT.,.a...@.@
#     0090: 31 8D 66 C9 FD 60 89 4E   4F 6E 7B 64 5A 7A B5 49  1.f..`.NOn.dZz.I
#     00A0: AE 31 12 F0 1F 8F B5 64   31 5E 08 49 B9 09 BE 77  .1.....d1^.I...w
#     00B0: C8 20 1C CD F9 3B 73 AA   DA 45 39 EC B0 C0 68 4B  . ...;s..E9...hK
#     00C0: 2E 04 84 E8 43 C4 20 07   65 2E 9D 45 ED CE 86 8F  ....C. .e..E....
#     00D0: 26 72 3F D6 1B 87 38 AF   49 1A 0D 7E B5 1E DD 2A  &r?...8.I......*
#     00E0: 0E 16 2D FA DF D1 E8 E6   3C C4 CC A2 24 62 B0 D0  ..-.....<...$b..
#     00F0: 44 8D 32 0E 11 C7 B4 66   02 6A D5 13 88 57 7E 9E  D.2....f.j...W..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.378 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B4 DC 7B A8 F1 8E 87 49   F1 E4 DE C6 EC D5 B5 80  .......I........
#     0010: EE E0 05 4C BC B2 15 0D   B8 AC 78 84 47 C5 6B 8D  ...L......x.G.k.
#     0020: 28 EA 62 B1 6E 78 20 4D   10 3C A6 A1 3A BC 1B BA  (.b.nx M.<..:...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.378 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.432 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1F F3 E2 FE 81 E1 1E AF 16 AA 51 23 11 E9 EB 96 86 AB E6 7A 75 B2 42 12 BE 7B 45 AE 42 12 3D 96",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.785 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-20 05:36:55.844 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 05:36:55.845 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-20 05:37:07.821; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 05:37:08.182 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 83 73 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:26.000 UTC",
#       "not  after"         : "2024-01-18 05:36:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 05:37:08.196 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.352 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.353 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.354 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.354 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.358 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.371 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "39 E8 61 85 BB 9A F5 1E 1D 65 DE F1 AF B7 53 65 F2 E0 CA AC 08 98 B1 69 DE 0C 08 46 68 3B E9 71",
#     "session id"          : "A1 89 71 38 F2 9A 06 D6 FE 5F 88 4C 09 85 42 37 22 A6 33 0D AC 97 CF 21 11 54 3D 5E D7 53 CB 9D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4D 78 56 30 26 D5 74 D9   42 E8 91 BB 2E C3 50 05  MxV0&.t.B.....P.
#               0010: D0 35 3D 54 54 D6 C4 FA   E7 03 EB BD 1A 8A BB 56  .5=TT..........V
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "33 49 48 44 66 5B 22 EF 24 E6 F7 7A 5E F7 96 21 3C 71 C7 68 32 F8 D1 3E 81 B3 68 13 81 6B 59 C5",
#     "session id"          : "A1 89 71 38 F2 9A 06 D6 FE 5F 88 4C 09 85 42 37 22 A6 33 0D AC 97 CF 21 11 54 3D 5E D7 53 CB 9D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A3 89 9F 46 07 A9 24 2D   84 CE 49 7D 35 D3 E2 30  ...F..$-..I.5..0
#             0010: BC AE 9E 3E 35 BC 47 6D   B0 92 50 93 ED 12 EA 06  ...>5.Gm..P.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.396 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.398 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|202

[...truncated too long message...]

28)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14810ms
ok 78 stop command for single port in 17995ms
not ok 79 status detects locally running solr in 1551ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7739ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1545ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3119ms
ok 83 copying files around in 6658ms
ok 84 upconfig in 2768ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1242ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1255ms
not ok 87 Cleanup in 2548ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6B1E8E1597B8FEF6 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII

  - org.apache.solr.HelloWorldSolrCloudTestCase.classMethod (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.HelloWorldSolrCloudTestCase.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.HelloWorldSolrCloudTestCase.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6B1E8E1597B8FEF6 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 2h 40m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2ufy5pasw4gmc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8225 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8225/

All tests passed

Build Log:
[...truncated 1433 lines...]
BUILD FAILED in 1h 4m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/clkcyatxuvrcg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8224 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8224/

All tests passed

Build Log:
[...truncated 1472 lines...]
BUILD FAILED in 1h 2m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/54ylzj7m3jjfa

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8223 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8223/

All tests passed

Build Log:
[...truncated 1264 lines...]
# ERROR: Error from server at http://localhost:38115/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16033ms
ok 60 Check help command in 4557ms
ok 61 basic post with a type specified in 5751ms
ok 62 basic post WITHOUT a type specified in 11647ms
ok 63 crawling a directory in 4536ms
ok 64 crawling a web site in 4724ms
ok 65 commit and optimize and delete in 4001ms
ok 66 args mode in 6412ms
ok 67 stdin mode in 3403ms
ok 68 post solr log into solr via script in 10163ms
ok 69 post solr log into solr via cli in 7188ms
ok 70 allowPaths - backup in 16231ms
ok 71 start solr with ssl in 19073ms
not ok 72 use different hostname when not checking peer-name in 20806ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 38115 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38115 (pid=1341639). Happy searching!
#
#     INFO  - 2023-10-19 18:56:21.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:56:21.105; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:56:21.609; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 18:56:21.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 18:56:21.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 18:56:31.631; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 18:56:31.637; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 18:56:32.014; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:38115/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 18:56:33.594; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:56:33.602; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:38115/solr] to [https://127.0.0.1:38115].
# WARN  - 2023-10-19 18:56:34.369; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 18:56:34.405; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17600ms
ok 74 start solr with client truststore and security manager in 19802ms
not ok 75 start solr with mTLS needed in 51518ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rl5LBQ/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38115 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38115 (pid=1344380). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38116 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38116 (pid=1344495). Happy searching!
#
#     INFO  - 2023-10-19 18:57:37.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:57:37.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:57:37.826; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:37.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:37.830; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.878 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 A0 09 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:23.000 UTC",
#     "not  after"         : "2024-01-17 18:57:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#         0010: 70 CB 1A F8                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.882 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 2C 14 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:15.000 UTC",
#     "not  after"         : "2024-01-17 18:57:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.897 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.266 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.267 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.270 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.270 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.277 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.350 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.350 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.352 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2D 9C 6A FB 99 1A 45 9F 11 AF 9B 39 DB FE 2B 50 BB 0B 12 A0 B4 91 04 0A A0 6D 8A B9 3A D5 49 FF",
#   "session id"          : "F1 ED 64 DF 41 08 D6 0F 13 A3 11 12 BA 2C 0D 1B 87 9D 39 98 FA D5 7E FE FF 46 0D F3 FE 58 77 0C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C1 B8 B6 12 73 25 58 72   97 8C AB 55 9C 73 8B EA  ....s%Xr...U.s..
#             0010: 46 3C EF BA CC 7F D4 62   64 E3 4C 58 88 8A 88 03  F<.....bd.LX....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 84 1C E8 3E E0 C4 AF 4F CD 1C 9A 25 6E 1D E4 F9 52 2E AF BB F6 AC 0A 84 53 E0 6B CE E4 97 CE",
#   "session id"          : "F1 ED 64 DF 41 08 D6 0F 13 A3 11 12 BA 2C 0D 1B 87 9D 39 98 FA D5 7E FE FF 46 0D F3 FE 58 77 0C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4C F9 3E AC 83 ED 01 3A   EA 7E C3 70 1C AD 3A 34  L.>....:...p..:4
#           0010: 71 9F AA AA 59 2F 07 FF   3C 01 AC AA 05 5B 0C 27  q...Y/..<....[.'
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.794 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.794 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.799 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.850 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.865 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.892 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.901 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.901 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.905 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.907 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.907 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.923 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 9D 21 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:19.000 UTC",
#       "not  after"         : "2024-01-17 18:57:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 5D 75 BC F6 1E 50 51   58 E4 30 2C C2 73 6A 2A  q]u...PQX.0,.sj*
#           0010: 15 39 61 15                                        .9a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.924 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.436 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.440 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 49 1D 05 7C F1 55 CC   35 7A 08 9A F7 ED 55 A5  .I....U.5z....U.
#     0010: 46 92 0C 67 A8 7B 1A DB   08 9F CC 5F 68 FD 0C CF  F..g......._h...
#     0020: 0A 3A 9C F8 74 86 22 6B   E9 6B 2E 00 1C F5 51 F8  .:..t."k.k....Q.
#     0030: F2 4F 7B BE 07 E1 5B CD   3A 67 CE 8D 83 1B 85 72  .O....[.:g.....r
#     0040: 67 43 0A A4 67 0E 09 5A   48 E0 D8 81 8F F7 E9 D9  gC..g..ZH.......
#     0050: 39 E2 09 3C EE F9 15 73   91 6E EC EB 51 0B F2 D1  9..<...s.n..Q...
#     0060: C5 57 84 C9 62 E6 F5 63   6B 3B E4 49 8C CE C2 21  .W..b..ck;.I...!
#     0070: A8 3C E9 33 D6 52 26 17   FE BB 4A 6A 6C D5 E8 65  .<.3.R&...Jjl..e
#     0080: D9 DD 5F 18 3A 23 5C EF   60 C5 80 58 1A E1 28 79  .._.:#\.`..X..(y
#     0090: AF 9F 81 E9 81 EE 91 B8   47 1F 15 E3 30 CC F6 6E  ........G...0..n
#     00A0: 39 0E 25 03 88 34 DC 8E   C6 46 52 70 BA 2A 5C B9  9.%..4...FRp.*\.
#     00B0: 35 93 1A 46 79 49 4D 7A   15 93 7E 09 4B A5 41 77  5..FyIMz....K.Aw
#     00C0: 37 81 BB 28 57 A2 43 B0   B2 00 E0 49 8B 1F 53 17  7..(W.C....I..S.
#     00D0: 21 C5 5F C2 C7 23 04 07   DF 07 2A FB BF 40 C5 2A  !._..#....*..@.*
#     00E0: EC 5E 78 BE C0 79 38 08   13 F6 63 45 01 AD 3A 44  .^x..y8...cE..:D
#     00F0: 7B 3C A3 40 16 E9 32 8C   94 66 07 F9 2A 7D B8 97  .<.@..2..f..*...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.442 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B 4A 73 5E B1 83 81 3A   F8 60 86 65 9D 49 8E 6B  .Js^...:.`.e.I.k
#     0010: 08 3A 01 D2 C5 D5 3E 64   5B 61 40 AC CF 72 22 5E  .:....>d[a@..r"^
#     0020: 6A 0B 08 B2 80 F6 12 3F   14 73 55 3B 13 FC BC F1  j......?.sU;....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.444 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.446 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.448 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 A0 09 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:23.000 UTC",
#       "not  after"         : "2024-01-17 18:57:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#           0010: 70 CB 1A F8                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.506 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 96 CB 55 CF 6A A6 9E   DE 4C A7 78 CF 69 DA BB  E..U.j...L.x.i..
#     0010: 47 57 CB A9 73 B8 1F 5D   44 21 03 D1 6A DB 04 AE  GW..s..]D!..j...
#     0020: 0F 4D 4A 83 1E 3D 4E 7C   48 E4 D1 C6 F4 6F 97 C2  .MJ..=N.H....o..
#     0030: 3B A9 68 9C 8A 64 1A 83   12 78 03 2E 7E A0 5F BE  ;.h..d...x...._.
#     0040: AE A7 ED 2A C4 77 24 CB   D0 2C 50 B7 DD 7B 47 DA  ...*.w$..,P...G.
#     0050: 7F 42 BF FF 88 D5 79 83   87 B2 A2 11 69 53 B4 23  .B....y.....iS.#
#     0060: FD C5 DA D2 DE 9D 53 BB   C2 53 9E 54 E1 DD 27 88  ......S..S.T..'.
#     0070: 47 FA 40 F3 70 DF 4A 5C   3D 46 5B DB 44 8E BF F5  G.@.p.J\=F[.D...
#     0080: 7B 20 87 75 1C 58 85 2C   00 3D B9 7A EC A0 0D 7B  . .u.X.,.=.z....
#     0090: C0 2A 17 4B 55 C6 4D 05   22 15 18 68 49 F3 FE CC  .*.KU.M."..hI...
#     00A0: FF 69 88 F9 AE 44 89 B0   D7 37 70 2A 32 FE E7 7E  .i...D...7p*2...
#     00B0: E1 AC 33 24 E6 D8 A6 3F   E0 DF 49 4B 43 B1 25 AD  ..3$...?..IKC.%.
#     00C0: 4C 69 9F F2 BB 09 1B 50   31 0E 92 6F 51 D0 96 7C  Li.....P1..oQ...
#     00D0: 6C 68 3B 92 16 82 FB 9F   70 2E 74 02 B9 E7 A1 20  lh;.....p.t....
#     00E0: 12 9B 4E 6A C1 3A B3 9F   9D BB 62 59 44 2D 74 59  ..Nj.:....bYD-tY
#     00F0: 42 4A A6 13 67 64 DC 8B   35 29 F9 C9 F5 F4 56 08  BJ..gd..5)....V.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.511 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D7 CF 5E E4 D5 E3 ED 75   08 2B 9B 83 C5 44 BA C5  ..^....u.+...D..
#     0010: 77 F0 5B E7 5C 97 B2 D3   34 0C 92 E9 A4 EA BE 2B  w.[.\...4......+
#     0020: 52 90 09 6B 07 F8 20 E6   C3 D1 FF 50 A2 4D 53 06  R..k.. ....P.MS.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.515 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.603 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1C AC 6B DE CE E3 D8 18 3A CE 9E 80 01 A1 85 B1 CF B6 A1 8D 2D 28 13 8D 43 5B 38 67 01 DE 5B 60",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 18:57:40.061 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 18:57:40.061 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 18:57:41.822; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:57:41.826; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:57:42.190; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@43b4fe19(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:42.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:42.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(ca,h=[localhost],a=[],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.224 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 A0 09 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:23.000 UTC",
#     "not  after"         : "2024-01-17 18:57:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#         0010: 70 CB 1A F8                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.228 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 2C 14 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:15.000 UTC",
#     "not  after"         : "2024-01-17 18:57:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.240 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.408 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.409 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.410 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.410 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.425 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.426 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.426 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.428 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "85 3A C8 10 19 94 5A 74 AF C5 1B 39 B3 58 24 9F 05 B4 6B 25 38 CC 11 41 CA 5D 29 D0 4D 2E 67 51",
#   "session id"          : "15 7A DE 21 1A CC 65 79 25 04 0D 09 08 F1 0C 25 45 18 97 C3 38 7B 52 B9 3C EC 1B E3 0F 4F 38 2E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 42 00 B9 1B BD A4 A1 CC   35 4F E7 41 40 B2 97 94  B.......5O.A@...
#             0010: B4 B8 A8 1F 15 7C C5 38   0B FB 59 F0 E1 8F 3D 61  .......8..Y...=a
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "62 02 4C F4 DD DE 7F B4 FD 68 40 44 53 F1 05 97 02 91 38 D5 7B 34 C6 07 28 9A 2C 4E BD 59 7F A4",
#   "session id"          : "15 7A DE 21 1A CC 65 79 25 04 0D 09 08 F1 0C 25 45 18 97 C3 38 7B 52 B9 3C EC 1B E3 0F 4F 38 2E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B6 7A 15 C2 14 77 7E E0   E8 B2 8B AF 02 82 5E D1  .z...w........^.
#           0010: 42 45 12 FA C8 B7 03 94   C8 FF FC D1 99 F8 D5 07  BE..............
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.538 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.540 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.542 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.562 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 9D 21 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:19.000 UTC",
#       "not  after"         : "2024-01-17 18:57:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 5D 75 BC F6 1E 50 51   58 E4 30 2C C2 73 6A 2A  q]u...PQX.0,.sj*
#           0010: 15 39 61 15                                        .9a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.562 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.615 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.618 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 60 18 34 B9 D5 69 20   CF 00 F0 34 F3 33 7A C7  8`.4..i ...4.3z.
#     0010: 61 FE 77 DF CD 49 80 F6   0D 96 06 DF A8 7F 19 0B  a.w..I..........
#     0020: 83 B1 03 61 63 B2 1E DC   3E 26 C5 18 28 40 40 CE  ...ac...>&..(@@.
#     0030: D4 C9 D8 A5 AF B0 B3 70   A4 62 14 7E FB C1 80 8A  .......p.b......
#     0040: 71 3E 16 30 54 90 6F EB   26 FE 86 53 A2 B0 29 1B  q>.0T.o.&..S..).
#     0050: 38 3B B5 A7 15 46 60 DE   E6 66 0E 69 BA 92 AF 5F  8;...F`..f.i..._
#     0060: F9 27 B4 AB CC 2B 17 E4   F5 4C 5E 73 CC F9 B4 18  .'...+...L^s....
#     0070: 9A BE FE 0A B5 F0 BD 41   69 C6 3F EE 05 CC F2 D6  .......Ai.?.....
#     0080: CA 99 FA 66 3B AE 59 B7   CC 1C 9C E9 FD B8 D1 80  ...f;.Y.........
#     0090: 2C F0 07 67 67 A3 8E 62   41 57 18 33 01 C4 F5 6A  ,..gg..bAW.3...j
#     00A0: C6 82 3C AE 6C 09 0F C1   A3 61 7A 78 21 7B 73 2C  ..<.l....azx!.s,
#     00B0: A7 C2 96 12 96 AE D1 1F   3E B0 85 3E 4E C1 09 AD  ........>..>N...
#     00C0: 2B 62 48 D1 4C 4E 82 04   4C F1 8B 6D DE 65 89 CC  +bH.LN..L..m.e..
#     00D0: 28 D1 CD 24 38 73 64 48   65 44 0E 93 C3 BA 18 3F  (..$8sdHeD.....?
#     00E0: 9A 2C A5 27 D8 49 87 7D   AB 94 19 60 03 79 0B 27  .,.'.I.....`.y.'
#     00F0: 64 35 03 9D 8E 54 17 58   A5 4F F1 4A CC A5 75 2E  d5...T.X.O.J..u.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.619 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C C3 35 FF CC 37 D8 99   DD 26 86 2E C9 B3 43 B0  ,.5..7...&....C.
#     0010: 6E 11 3F CA 62 C1 58 76   F4 74 33 E1 0A C2 70 0F  n.?.b.Xv.t3...p.
#     0020: 07 F8 65 6F D2 52 D8 F6   4E A3 D0 22 95 D6 E4 8E  ..eo.R..N.."....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.621 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.624 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 A0 09 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:23.000 UTC",
#       "not  after"         : "2024-01-17 18:57:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#           0010: 70 CB 1A F8                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.647 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 DE 2F 2C CE CA C1 BF   45 00 02 49 90 5F 42 77  D./,....E..I._Bw
#     0010: 88 DE DD 75 02 BD 1A 70   33 2E FB 35 28 2C 83 0D  ...u...p3..5(,..
#     0020: 8F F5 D6 B4 52 4D 2F 6E   40 8C 46 6C BA 49 ED CA  ....RM/n@.Fl.I..
#     0030: 3F E9 13 4C AB 2B 83 D4   53 29 DE 94 91 14 CD BD  ?..L.+..S)......
#     0040: E0 03 8B 9A ED 3A 3F D6   58 60 7C D7 6F BB 43 52  .....:?.X`..o.CR
#     0050: 04 3D 2A 92 30 27 D1 64   56 86 B9 A3 43 DA ED E7  .=*.0'.dV...C...
#     0060: 21 DC F5 72 BC 3E E1 D5   12 84 F7 F0 33 A6 F4 8F  !..r.>......3...
#     0070: 56 5D 8F 65 D8 FA AA C6   7E 3C 9C 9E 46 C2 EE 38  V].e.....<..F..8
#     0080: 7B 47 D3 21 D8 3F 45 93   46 4A 24 E6 0A F3 F7 31  .G.!.?E.FJ$....1
#     0090: 10 FF 9A E7 F5 C0 FD D1   A6 97 E4 6A 0C 59 7B A4  ...........j.Y..
#     00A0: 71 75 11 AD 89 51 7D 35   13 5D 70 7B 90 87 C0 F6  qu...Q.5.]p.....
#     00B0: 56 AC 46 CF 64 99 99 E7   D5 2A 0E DB BC C9 92 56  V.F.d....*.....V
#     00C0: 0A 16 C7 85 E4 5A 92 2A   BE A7 78 8E DD AD E3 7C  .....Z.*..x.....
#     00D0: D7 C7 ED BC F4 0C 48 7A   BF 38 79 4A E9 03 37 0D  ......Hz.8yJ..7.
#     00E0: 23 75 01 2E 7D 0D 4D 4F   01 1D 67 E6 4C 15 86 54  #u....MO..g.L..T
#     00F0: CE 48 7D B5 91 CD 6A 1B   6B 92 63 8F 28 70 01 06  .H....j.k.c.(p..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.648 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 85 BB 9C C4 10 31 78   E4 D7 20 4A 1E 1A A1 C0  D.....1x.. J....
#     0010: B8 EC 50 EB 79 09 24 8B   AE FD 34 23 91 B4 AE 5C  ..P.y.$...4#...\
#     0020: F8 B3 FF 8A 4D 5B C4 71   3D B9 3E 6B 45 4E 71 A3  ....M[.q=.>kENq.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.648 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.943 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "80 C0 FE EE 9F 76 5A 00 B5 DE 34 D5 B3 68 1A B4 56 77 11 AA 97 DC DB 34 A4 95 A7 E8 CB DB 8D A3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 18:57:43.202 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 18:57:43.203 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-19 18:57:56.260; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:56.839 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 2C 14 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:15.000 UTC",
#       "not  after"         : "2024-01-17 18:57:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:56.853 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.008 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.010 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.010 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.028 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C7 AF 7E D9 D8 71 02 B2 19 A4 6C BD 96 26 62 8B 58 71 FF D2 78 F0 D5 D4 5E 61 82 57 A4 FA 2F 79",
#     "session id"          : "60 DE F9 89 88 57 D8 9C 08 29 57 4F 4B 80 2B 83 F3 7A 4E 56 52 C2 5B B4 D5 C1 50 DE 35 13 59 AB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 74 B4 C8 33 D2 20 23 77   C7 2E 7F 10 51 2F 06 BC  t..3. #w....Q/..
#               0010: 35 67 92 F4 00 93 A9 31   EC 03 84 0B 10 B5 7F 37  5g.....1.......7
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.049 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D3 CC AF CE 13 91 52 FC A2 DA C1 7D E7 8C 3F 45 7B 18 D9 19 A7 DC 6D 2B F6 2F D0 91 80 AC 60 DF",
#     "session id"          : "60 DE F9 89 88 57 D8 9C 08 29 57 4F 4B 80 2B 83 F3 7A 4E 56 52 C2 5B B4 D5 C1 50 DE 35 13 59 AB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD 6F A3 1F D5 F7 39 B0   9F 58 70 19 62 32 A2 54  .o....9..Xp.b2.T
#             0010: 68 3D 35 1A 52 81 8C 01   1A 72 B6 8D 97 21 09 7E  h=5.R....r...!..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.049 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.052 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.060 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.062 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.063 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UT

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14738ms
ok 78 stop command for single port in 17603ms
not ok 79 status detects locally running solr in 1536ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7454ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1562ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3378ms
ok 83 copying files around in 7639ms
ok 84 upconfig in 2626ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1247ms
not ok 87 Cleanup in 2477ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ieg3ecbumkyzk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8222 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8222/

All tests passed

Build Log:
[...truncated 1261 lines...]
# ERROR: Error from server at http://localhost:35609/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16252ms
ok 60 Check help command in 4565ms
ok 61 basic post with a type specified in 5653ms
ok 62 basic post WITHOUT a type specified in 11672ms
ok 63 crawling a directory in 4402ms
ok 64 crawling a web site in 5133ms
ok 65 commit and optimize and delete in 3805ms
ok 66 args mode in 6535ms
ok 67 stdin mode in 3435ms
ok 68 post solr log into solr via script in 9763ms
ok 69 post solr log into solr via cli in 7244ms
ok 70 allowPaths - backup in 16700ms
ok 71 start solr with ssl in 18831ms
not ok 72 use different hostname when not checking peer-name in 20342ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 35609 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35609 (pid=878658). Happy searching!
#
#     INFO  - 2023-10-19 15:43:41.540; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:43:41.546; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:43:42.082; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 15:43:42.163; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 15:43:42.164; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 15:43:51.961; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 15:43:51.966; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 15:43:52.374; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:35609/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 15:43:53.729; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:43:53.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35609/solr] to [https://127.0.0.1:35609].
# WARN  - 2023-10-19 15:43:54.595; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 15:43:54.630; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16583ms
ok 74 start solr with client truststore and security manager in 19456ms
not ok 75 start solr with mTLS needed in 52314ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-HRwwlx/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35609 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35609 (pid=881353). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35610 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 35610 (pid=881523). Happy searching!
#
#     INFO  - 2023-10-19 15:44:56.245; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:44:56.258; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:44:57.099; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:44:57.102; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:44:57.104; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.189 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 0B 8E 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:42.000 UTC",
#     "not  after"         : "2024-01-17 15:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#         0010: BC B5 F1 5B                                        ...[
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.199 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 6B CB 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:33.000 UTC",
#     "not  after"         : "2024-01-17 15:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.225 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.713 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.713 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.721 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.722 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.753 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 DD BE 42 80 BC 41 49 2A 15 2E 8A 71 74 D3 FB 28 52 A1 39 38 F3 00 18 A2 08 68 94 86 08 60 19",
#   "session id"          : "BB BD 62 A9 2B 83 3E E6 72 1F 8D 9D 88 ED 14 0B 03 C3 92 26 FE 53 B6 C4 64 58 84 36 56 D8 24 7B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 34 A7 9F 12 D9 5C 7A   E8 7B A3 D5 95 C9 D3 BA  .4....\z........
#             0010: 08 80 83 7A 46 54 34 0F   B3 04 72 95 9A 88 36 5B  ...zFT4...r...6[
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.312 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "20 41 09 C9 D5 F7 0B 8B AC 20 FE 71 7D 07 F6 4E 56 5D 9F 0F 4B 63 59 0E A6 7B 9E 4F 2F B8 16 F9",
#   "session id"          : "BB BD 62 A9 2B 83 3E E6 72 1F 8D 9D 88 ED 14 0B 03 C3 92 26 FE 53 B6 C4 64 58 84 36 56 D8 24 7B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DE 6E B7 20 F5 F5 FB 63   EC 7E 75 74 96 79 76 4F  .n. ...c..ut.yvO
#           0010: AA B1 EC 82 80 6B 4C DA   49 76 C8 89 6E 85 D9 2D  .....kL.Iv..n..-
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.313 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.316 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.339 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.340 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.345 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.351 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.351 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.352 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.354 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C F1 6B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:38.000 UTC",
#       "not  after"         : "2024-01-17 15:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 38 5F 50 7C F3 B4 44   AD AA CA 2D B2 08 F1 8A  .8_P...D...-....
#           0010: C8 6B 9B C5                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.354 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.493 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.502 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 53 1A 73 17 C7 57 34   52 40 92 40 97 E1 BE 6D  QS.s..W4R@.@...m
#     0010: 58 7A 5C 54 13 29 45 D1   EF 1B E1 A3 24 F9 74 BC  Xz\T.)E.....$.t.
#     0020: CC 31 EF 89 0E 49 64 86   C0 BE 30 7E 0B 1F FC 70  .1...Id...0....p
#     0030: 67 6C 4C BE 1B 6E 91 E0   58 94 55 07 3B 29 B3 C5  glL..n..X.U.;)..
#     0040: 26 9E 9A 1D 40 82 48 DF   A5 EB 18 33 A1 56 44 AD  &...@.H....3.VD.
#     0050: DB 99 FB 17 FB DB 66 BE   AC 7F 02 D7 05 4F A9 9D  ......f......O..
#     0060: 80 84 F1 C5 1A BE C6 4E   D8 36 61 13 80 EB B1 D4  .......N.6a.....
#     0070: 1E 42 5C F5 8E 71 8F EF   09 AC 02 0A 90 B9 04 AB  .B\..q..........
#     0080: 10 56 8F AC A7 6E 43 2D   D5 B2 EF 33 B9 5B 6B 41  .V...nC-...3.[kA
#     0090: AE C2 6B 1A DC 42 9A 2D   89 5E 61 DE 78 58 AC AD  ..k..B.-.^a.xX..
#     00A0: B9 D6 83 8B 9F 00 DF 2A   7B 3D 0A DA 57 B6 60 FD  .......*.=..W.`.
#     00B0: BD 71 D4 20 C2 4B 00 05   8A C7 00 A8 C0 EC 3C 99  .q. .K........<.
#     00C0: AE 42 8B CD 17 A0 4C 21   B3 EE 7F A4 6B A8 17 17  .B....L!....k...
#     00D0: 0F 1C 5E 3B 91 91 FA 96   DD CE ED B4 9C BA 73 3A  ..^;..........s:
#     00E0: BD A7 0F 56 3C 92 27 D3   1A 00 D8 D2 D9 83 03 41  ...V<.'........A
#     00F0: 5D DE FC 84 AC 82 ED 7A   BE 29 4D F2 37 E9 F9 EF  ]......z.)M.7...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.504 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C 7B 5C 9A D6 13 23 79   FC 48 85 9A 51 F0 67 34  <.\...#y.H..Q.g4
#     0010: 78 00 45 58 26 25 31 96   0A A2 37 D5 74 2E CF 0E  x.EX&%1...7.t...
#     0020: D4 86 CD 59 37 1A 97 30   2B 1B F2 A0 20 35 19 8F  ...Y7..0+... 5..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.506 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.507 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.507 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.513 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 0B 8E 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:42.000 UTC",
#       "not  after"         : "2024-01-17 15:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#           0010: BC B5 F1 5B                                        ...[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.552 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 6F E3 C0 85 26 CE A3   DD 95 E1 51 9E 47 D2 9B  Vo...&.....Q.G..
#     0010: 67 C3 80 3D 71 57 3D 60   BA D2 91 03 85 47 D9 8E  g..=qW=`.....G..
#     0020: BB 0B A5 A3 F2 05 D1 9A   12 11 94 B9 CC F3 DF BD  ................
#     0030: 63 A6 61 9B 02 6F A7 08   9D BB 96 08 74 72 A9 5E  c.a..o......tr.^
#     0040: 3A 8C 07 C4 FF F0 44 37   C4 99 64 BB DA C9 CD DE  :.....D7..d.....
#     0050: 8E A3 CB 61 BE 1D F6 66   34 0F 5D 3C E6 BF 5B D5  ...a...f4.]<..[.
#     0060: 62 0B 47 3A D9 86 04 02   F2 B6 37 00 3C 5A 38 2E  b.G:......7.<Z8.
#     0070: B3 89 56 2A 53 13 9A 04   2A 4D 47 5B 4C 85 7F FF  ..V*S...*MG[L...
#     0080: 1E 32 D9 CB 3E 1E D4 74   A5 4F F6 DC A6 F5 C4 46  .2..>..t.O.....F
#     0090: E7 51 12 6E 20 41 F1 F4   99 DE 19 CF 11 3B 3A 12  .Q.n A.......;:.
#     00A0: 02 D2 0B 3A 49 AF 68 EE   44 0D 91 98 1A 64 F9 7B  ...:I.h.D....d..
#     00B0: F3 51 80 3F 83 68 C7 15   A6 E7 7D 50 8C 76 22 7C  .Q.?.h.....P.v".
#     00C0: 93 2B 14 42 5E 9D DE 7B   4A 75 2F F7 80 82 5F 58  .+.B^...Ju/..._X
#     00D0: 94 C2 BD EB 13 38 B0 42   30 76 C9 48 1D 25 D7 00  .....8.B0v.H.%..
#     00E0: 1A F1 AC B3 AE A3 33 FD   AD BD 5A A1 01 D9 1B DA  ......3...Z.....
#     00F0: A2 30 92 3C 2C 2A 88 F7   90 6F 35 12 0A 04 FF 50  .0.<,*...o5....P
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.555 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E3 22 33 6B 76 07 CF 7F   E1 01 AB 84 19 37 85 94  ."3kv........7..
#     0010: 68 80 BC B0 DD 1B 8E A9   8A F3 C2 E5 E8 03 BC DD  h...............
#     0020: D9 BD 90 18 B2 96 EF A4   49 59 1C A9 88 B9 6B FF  ........IY....k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.560 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.708 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E3 66 A4 EF 46 3E 81 4D B0 BC 65 35 C9 FD 84 DA 3A 11 88 3E 4B 98 EC E5 28 F3 00 1E 25 09 C9 A1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 15:44:59.581 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 15:44:59.582 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 15:44:59.594 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-19 15:45:01.121; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:45:01.126; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:45:01.536; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:45:01.538; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:45:01.539; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.583 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 0B 8E 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:42.000 UTC",
#     "not  after"         : "2024-01-17 15:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#         0010: BC B5 F1 5B                                        ...[
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.587 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 6B CB 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:33.000 UTC",
#     "not  after"         : "2024-01-17 15:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.600 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.781 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.781 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.783 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.783 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.788 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.800 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.801 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.803 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "55 F1 03 31 5A 18 84 E3 12 7D 9C 6A 23 2B 3C 0D B5 2D BE D8 B6 00 CE 4C 63 44 4D 8F F9 D5 6E 67",
#   "session id"          : "E5 85 93 5E 91 C0 06 1C 6E F6 86 13 11 BF C6 B4 EC 12 59 B0 CE 83 AA 0D A1 49 D8 95 D1 9A 5F 21",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 7A 19 0C 42 95 94 E7   CC D9 73 73 06 BE 36 2C  .z..B.....ss..6,
#             0010: 71 E4 CC B3 64 DF 71 44   18 AF 19 D5 24 99 38 35  q...d.qD....$.85
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.928 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "68 22 63 4C E4 08 08 0F 56 50 33 A6 7E E8 2B E5 F8 7B 61 C1 F9 DC 11 15 9C 69 34 AD 9C 88 EF B4",
#   "session id"          : "E5 85 93 5E 91 C0 06 1C 6E F6 86 13 11 BF C6 B4 EC 12 59 B0 CE 83 AA 0D A1 49 D8 95 D1 9A 5F 21",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B3 6C EC 8D 17 5A F3 22   71 98 59 94 DA 2D 88 5B  .l...Z."q.Y..-.[
#           0010: C0 D6 A9 79 84 F3 29 89   95 0E 80 CA 49 C0 A1 6F  ...y..).....I..o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.929 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.929 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.933 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.935 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.942 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.946 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.974 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.985 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.986 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.993 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.993 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.997 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.997 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.998 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.998 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.000 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C F1 6B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:38.000 UTC",
#       "not  after"         : "2024-01-17 15:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 38 5F 50 7C F3 B4 44   AD AA CA 2D B2 08 F1 8A  .8_P...D...-....
#           0010: C8 6B 9B C5                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.000 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.072 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.075 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D 01 69 FF 50 26 14 A4   39 1B 01 2B E9 38 D2 9A  m.i.P&..9..+.8..
#     0010: 8D 16 FB D3 77 59 F0 45   23 C9 E2 C7 2A E0 AF D1  ....wY.E#...*...
#     0020: 29 BE 83 8B 39 01 60 56   BE 11 4D AB 99 C1 61 CC  )...9.`V..M...a.
#     0030: 85 C3 12 8D 0A 0D 60 F0   96 47 8D B4 C1 BB CB 9A  ......`..G......
#     0040: 8A 1F BE 60 C2 11 6A D6   33 02 BA B5 2D 08 15 59  ...`..j.3...-..Y
#     0050: F3 D4 3E 17 95 32 4A D6   73 8F 12 BF 2D 37 2B 4B  ..>..2J.s...-7+K
#     0060: F5 78 1D 09 E0 F2 8C 3D   02 70 30 42 AA 38 88 6D  .x.....=.p0B.8.m
#     0070: 5E C5 3B 91 8F 70 14 1C   8C A9 C5 57 0F AA AD 59  ^.;..p.....W...Y
#     0080: 08 E3 7D B8 21 9B A2 B2   81 34 2B F2 30 CF 8D 5A  ....!....4+.0..Z
#     0090: D2 79 2E 5E 8A E1 40 B8   EE BF F9 54 8A C4 80 0C  .y.^..@....T....
#     00A0: F6 21 1F 78 42 39 08 5D   93 C3 F9 5C 80 49 5E 4E  .!.xB9.]...\.I^N
#     00B0: 9F 14 80 4C 72 72 B3 C6   98 0F 4C 6C BF 9C D6 80  ...Lrr....Ll....
#     00C0: 9F 45 09 B5 DE F6 D0 E3   41 F0 3C 26 A9 7D 9B 1A  .E......A.<&....
#     00D0: C6 9D 83 B0 94 48 6E FE   70 F0 02 32 02 36 54 12  .....Hn.p..2.6T.
#     00E0: 4C AE BE 31 20 93 E5 FB   0B 10 CE 3D 33 DA 97 0F  L..1 ......=3...
#     00F0: 16 CF 1E 7E 21 4F F7 CE   73 7F BD A8 FF D4 7C 5C  ....!O..s......\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.077 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 77 13 1F 54 BA C7 40 50   DF 73 A4 F1 24 1F 1B E4  w..T..@P.s..$...
#     0010: 49 51 A9 44 23 24 7B 7A   39 30 71 6C 22 AF 94 7A  IQ.D#$.z90ql"..z
#     0020: 7C 4B D5 B1 C4 F9 E3 E4   4B 93 A9 39 DD 92 81 40  .K......K..9...@
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.078 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.079 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.079 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.083 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 0B 8E 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:42.000 UTC",
#       "not  after"         : "2024-01-17 15:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#           0010: BC B5 F1 5B                                        ...[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.107 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E DD 02 CB F3 D0 EF C2   26 77 1D 38 96 58 23 F2  ........&w.8.X#.
#     0010: 35 9A 4C A5 42 D7 81 7C   9A 4A 2A D9 B2 F7 BD 21  5.L.B....J*....!
#     0020: 23 A4 54 C9 8B 30 6F AA   28 6A A7 92 33 B1 88 94  #.T..0o.(j..3...
#     0030: 19 67 39 25 ED CB 04 E0   00 A9 B7 85 94 66 CE 60  .g9%.........f.`
#     0040: 7B 52 53 9E A2 40 A0 46   67 B7 3C 4B 32 8F 86 F3  .RS..@.Fg.<K2...
#     0050: 18 56 2B B5 CE 2A 3F 04   8E FD 29 82 E0 05 C7 03  .V+..*?...).....
#     0060: 01 FF FB F7 0F C4 56 0C   C1 3C 72 22 69 68 2A 0C  ......V..<r"ih*.
#     0070: 01 94 C8 FD F3 E2 94 D2   1B A7 E3 A2 A2 FE 68 FA  ..............h.
#     0080: C9 45 21 05 D0 4B 99 0F   48 57 F4 53 9A 2E 7B 10  .E!..K..HW.S....
#     0090: B4 F4 87 9F E9 8F 9E 2B   F6 7F 8B 92 7A 6A D3 99  .......+....zj..
#     00A0: 42 F8 F8 EF C8 10 2A 69   36 F7 14 A4 21 84 83 FA  B.....*i6...!...
#     00B0: 31 C7 00 98 08 80 0E 9D   8E F8 C8 2F A3 5B 57 F5  1........../.[W.
#     00C0: AB B5 CF 30 30 38 19 01   C9 AA 46 D0 E1 F1 60 DC  ...008....F...`.
#     00D0: 08 BE 8C 40 C2 53 A7 60   BB F5 F5 42 D0 9B 7A EC  ...@.S.`...B..z.
#     00E0: BF D6 5E 8A EA 17 90 E5   A2 45 A2 54 1A D5 92 86  ..^......E.T....
#     00F0: 5F 44 96 C8 C1 B1 33 CA   66 FF A3 0D 57 51 EF D9  _D....3.f...WQ..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.108 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D8 23 EB 93 46 C4 B1 C2   3F 73 37 E5 0E B4 35 BC  .#..F...?s7...5.
#     0010: E9 8D D6 62 2C 05 A1 A9   88 C5 EC 01 F2 C4 7E 0D  ...b,...........
#     0020: E7 F4 4D BF 87 28 A4 F2   8B 77 60 DD 11 2F FE BD  ..M..(...w`../..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.108 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.164 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6B 9C F1 EA 57 FC C6 DC 8C 41 64 FA 86 75 3E 1B F9 2A F5 42 99 08 FC 84 99 0E D8 B6 09 DC D5 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.201 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-19 15:45:02.478 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 15:45:02.479 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 15:45:13.965; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:14.314 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 6B CB 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:33.000 UTC",
#       "not  after"         : "2024-01-17 15:44:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:14.327 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.485 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.485 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.488 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.488 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.505 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C4 3D CF BD DD B9 AA 99 33 3E 0F 57 B0 0A 52 06 1E CC BD C2 6D C4 97 AD BF 1B 07 57 15 BD B6 E1",
#     "session id"          : "EE D1 B9 82 D8 11 02 26 0E 42 68 03 C7 D4 36 B0 AA 2B 59 57 79 1D 9E A7 51 61 D4 4F 64 D8 19 F3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: EB E6 32 CC FA D1 43 47   C0 23 CA A0 64 27 FA FC  ..2...CG.#..d'..
#               0010: 08 A7 53 59 AC E2 E5 13   DF 49 72 83 6C E1 7F 0E  ..SY.....Ir.l...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 3C C0 E8 92 E8 55 33 C1 12 C2 A6 C2 E3 2F 2D 44 16 FB 71 08 F6 E7 1C A7 B6 4A C8 8E 97 49 BC",
#     "session id"          : "EE D1 B9 82 D8 11 02 26 0E 42 68 03 C7 D4 36 B0 AA 2B 59 57 79 1D 9E A7 51 61 D4 4F 64 D8 19 F3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 35 25 2E 68 12 14 B8 08   AB 5D F1 15 3F 6C 65 D0  5%.h.....]..?le.
#             0010: D8 BF B5 9E 48 16 BF DC   01 C3 D3 A6 BA CC B0 2E  ....H...........
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.532 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.534 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.535 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.538 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions hands

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14536ms
ok 78 stop command for single port in 17486ms
not ok 79 status detects locally running solr in 1535ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7490ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1525ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3020ms
ok 83 copying files around in 6581ms
ok 84 upconfig in 2584ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1248ms
not ok 87 Cleanup in 2500ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/huduz46q6gnru

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8221 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8221/

All tests passed

Build Log:
[...truncated 1476 lines...]
BUILD FAILED in 1h 1m 34s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7zuyr6vafsynm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8220 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8220/

All tests passed

Build Log:
[...truncated 1263 lines...]
# ERROR: Error from server at http://localhost:33669/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16323ms
ok 60 Check help command in 4829ms
ok 61 basic post with a type specified in 5850ms
ok 62 basic post WITHOUT a type specified in 11494ms
ok 63 crawling a directory in 4638ms
ok 64 crawling a web site in 4589ms
ok 65 commit and optimize and delete in 3836ms
ok 66 args mode in 6432ms
ok 67 stdin mode in 3308ms
ok 68 post solr log into solr via script in 10186ms
ok 69 post solr log into solr via cli in 7089ms
ok 70 allowPaths - backup in 16274ms
ok 71 start solr with ssl in 19119ms
not ok 72 use different hostname when not checking peer-name in 20566ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 33669 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33669 (pid=281217). Happy searching!
#
#     INFO  - 2023-10-19 10:46:20.895; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:46:20.900; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:46:21.378; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 10:46:21.501; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 10:46:21.501; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 10:46:31.423; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 10:46:31.428; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 10:46:31.792; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:33669/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 10:46:33.231; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:46:33.235; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:33669/solr] to [https://127.0.0.1:33669].
# WARN  - 2023-10-19 10:46:34.069; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 10:46:34.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16894ms
ok 74 start solr with client truststore and security manager in 20073ms
not ok 75 start solr with mTLS needed in 51663ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-inB6hc/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33669 [|]   [/]   [-]   [\]
# Started Solr server on port 33669 (pid=283958). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33670 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 33670 (pid=284065). Happy searching!
#
#     INFO  - 2023-10-19 10:47:37.089; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:47:37.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:47:37.633; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:37.635; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:37.636; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.119 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 CB 36 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:22.000 UTC",
#     "not  after"         : "2024-01-17 10:47:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#         0010: E3 90 C4 1B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.123 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 8A B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:14.000 UTC",
#     "not  after"         : "2024-01-17 10:47:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.155 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.484 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.485 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.489 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.509 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "52 A4 87 C4 A0 22 69 1C CD 20 A7 E6 5B AE B0 F6 9F FA F2 1C 91 4F EF 44 80 52 EE C2 AC 02 24 C9",
#   "session id"          : "A6 3F FB 15 75 BC 74 44 31 0C FD FE ED E3 E0 93 FB CD F0 D7 A4 0B 47 DD 73 D0 ED 34 4E 9C 3C 1D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 49 FC C3 0A 04 18 07   FB F7 0F 4F 79 47 BB B8  YI.........OyG..
#             0010: 90 58 0E E9 35 4B 5C A9   90 DA 70 FF B8 0D 28 1A  .X..5K\...p...(.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CB E3 7D 6F 3D 44 AD F9 7B 45 E1 8A 8C DA A5 22 A8 D2 CC 5B 4C 7B 55 94 CD 80 C4 85 0C F6 D6 39",
#   "session id"          : "A6 3F FB 15 75 BC 74 44 31 0C FD FE ED E3 E0 93 FB CD F0 D7 A4 0B 47 DD 73 D0 ED 34 4E 9C 3C 1D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7C 7D 22 45 75 5E 8C 9B   8B AD 22 E2 57 37 25 21  .."Eu^....".W7%!
#           0010: 5C 4C 8C 3D BE C9 40 A0   88 D4 93 8C 7A D6 B9 75  \L.=..@.....z..u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.687 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.687 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.706 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.710 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.711 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.714 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.714 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.717 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.717 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.718 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.731 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 09 A4 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:18.000 UTC",
#       "not  after"         : "2024-01-17 10:47:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 9F 68 EE A5 4B EE B9   8B 57 47 FD 68 75 D3 98  ..h..K...WG.hu..
#           0010: 88 3B 98 3B                                        .;.;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.731 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.819 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.831 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 47 CF 3F 11 C2 1C 81   F2 BA 22 87 85 90 1C 45  2G.?......"....E
#     0010: 79 E2 A9 D4 A5 6A CC 1B   73 4D EE C0 BA CE F7 D8  y....j..sM......
#     0020: A7 5F 93 B4 24 4C B0 30   AF 03 D8 C8 99 3D 64 D0  ._..$L.0.....=d.
#     0030: FE 48 1F A2 B4 29 4D ED   9B 32 B5 47 2B D8 B4 85  .H...)M..2.G+...
#     0040: F7 DE 07 66 E3 4D B9 9B   76 AC 60 6B 49 AE 5D C0  ...f.M..v.`kI.].
#     0050: 35 98 68 31 1F 1E 9B FB   A4 62 82 E5 C6 A6 94 DD  5.h1.....b......
#     0060: 6D 3E 4A 32 8D 9B BF DD   16 7D 79 5D 2E 79 AE 76  m>J2......y].y.v
#     0070: 6D 11 F9 B7 74 CC 7B 10   C6 3C D3 A5 19 2A B9 2C  m...t....<...*.,
#     0080: E8 B4 D3 94 69 95 C9 79   25 8C 02 0F 2B 41 3D FD  ....i..y%...+A=.
#     0090: C1 4D 7A 1B A9 E6 38 91   F8 78 7C 81 72 37 7D 48  .Mz...8..x..r7.H
#     00A0: 0D E1 9D 50 35 10 24 C8   84 FB 72 9F 8D 93 36 08  ...P5.$...r...6.
#     00B0: 87 5E F3 EA 1B 23 B9 49   F9 ED 21 03 AB 49 35 69  .^...#.I..!..I5i
#     00C0: 8E 60 1C 09 D5 DB 9C 62   3F D3 EF BA 6E EB 33 BF  .`.....b?...n.3.
#     00D0: 4D 04 4C 3E 8F F3 89 D0   A3 29 33 BE DB E0 ED D2  M.L>.....)3.....
#     00E0: F3 85 47 F0 BF 27 05 FE   73 6A E7 88 3A 83 19 B5  ..G..'..sj..:...
#     00F0: 89 EB 34 74 C3 5B F7 99   73 9B 50 D6 14 3D 71 64  ..4t.[..s.P..=qd
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.835 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BD 29 34 BC 63 81 EE 0B   9F AF CF D2 6A 7A E9 89  .)4.c.......jz..
#     0010: 06 CA E8 EF 2C 64 36 C5   AF C8 62 8F 89 7B DA B9  ....,d6...b.....
#     0020: 37 85 2C 71 71 3D 16 F0   17 15 9D 20 3E 1B C0 20  7.,qq=..... >..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.840 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.261 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 CB 36 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:22.000 UTC",
#       "not  after"         : "2024-01-17 10:47:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#           0010: E3 90 C4 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.325 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8F E6 6F C7 6F 1B 45 F4   57 01 64 9B C2 89 00 08  ..o.o.E.W.d.....
#     0010: FC 04 CF ED 93 A8 49 A2   89 D0 CD CD C1 79 FE 03  ......I......y..
#     0020: B3 F5 5E 5C 19 7D FF 68   A7 CA 40 33 7B AF D2 34  ..^\...h..@3...4
#     0030: 59 C4 44 77 24 5E 61 E0   7C E4 CE A0 85 E5 10 8F  Y.Dw$^a.........
#     0040: 5E ED 02 83 6E 04 5A 0F   24 88 85 7A 98 52 2B DE  ^...n.Z.$..z.R+.
#     0050: 56 3B 09 C8 6E FE 35 91   AC 03 54 E5 C2 D1 BC C3  V;..n.5...T.....
#     0060: 4C C3 9F 51 32 5C 19 2B   BD 3C 20 61 90 22 18 95  L..Q2\.+.< a."..
#     0070: 16 1E 8A 88 79 98 A8 3D   06 9D D0 7A 1E 41 BF 8A  ....y..=...z.A..
#     0080: E0 22 9D 1B D0 E3 2D C5   AD 44 55 30 C6 C2 2C 93  ."....-..DU0..,.
#     0090: C8 18 B5 B7 DA 00 5C 1E   9E 4B BE D8 8E 98 2D 36  ......\..K....-6
#     00A0: 59 01 82 35 4A 3D E7 57   79 75 0E 12 FE 55 A1 8C  Y..5J=.Wyu...U..
#     00B0: 1E 13 53 D0 B0 09 A1 25   9F C7 B5 6B 2E A7 3A 49  ..S....%...k..:I
#     00C0: 9B 11 54 25 64 9F F7 65   CA A0 3E 32 78 96 35 1D  ..T%d..e..>2x.5.
#     00D0: 48 F9 E9 E1 86 2D CE C8   15 B2 26 99 E4 65 46 98  H....-....&..eF.
#     00E0: EE 53 2E D2 7D 69 6E CF   46 F5 93 87 E3 BC 39 C2  .S...in.F.....9.
#     00F0: A9 B2 09 80 C6 40 60 59   53 C6 2F 9C 1A FB 5D EF  .....@`YS./...].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.329 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D5 D0 F4 E1 87 14 A8 B1   82 D9 43 82 56 03 92 6D  ..........C.V..m
#     0010: 1F 11 AD 9F B4 B5 19 09   6D F5 A7 67 C5 8E 44 97  ........m..g..D.
#     0020: 1F 42 5F A4 56 AF 1E E0   27 E3 9F 56 F8 4C CE 9D  .B_.V...'..V.L..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.333 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 10:47:39.408 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "12 ED 3E BA 28 1D 8A DB DC 65 14 ED 27 15 D6 48 87 18 9A 50 5A 92 9C 6C 5B 75 49 C1 F9 53 B2 54",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:47:39.731 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:47:39.732 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-19 10:47:39.736 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-19 10:47:39.737 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
# INFO  - 2023-10-19 10:47:40.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:47:40.857; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:47:41.179; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:41.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:41.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.215 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 CB 36 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:22.000 UTC",
#     "not  after"         : "2024-01-17 10:47:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#         0010: E3 90 C4 1B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.219 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 8A B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:14.000 UTC",
#     "not  after"         : "2024-01-17 10:47:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.231 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.393 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.394 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.395 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.395 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.413 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "08 F7 BE 37 A8 66 14 CD 02 1D D9 FE B8 34 E1 C9 0D 13 FE D0 97 7F DA DA B6 0D 94 36 53 28 50 22",
#   "session id"          : "1F DE 15 6C 08 F5 46 42 77 66 30 B2 E4 0E CA 79 62 77 0A A1 EC 6A DD 58 8A F8 2A B2 CD FA 9F 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C 41 EC AB 28 A2 44 DF   47 DA 5F 3E 20 70 0E 88  .A..(.D.G._> p..
#             0010: 5C D9 CA 10 4E B8 44 65   75 78 7B 9A 11 8E 4A 20  \...N.Deux....J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A8 FC 50 D0 B5 6A 16 21 98 81 A8 00 5D D8 11 51 D0 17 CE AF 36 8C 66 9F 1E B0 28 7A 09 3B F6 6E",
#   "session id"          : "1F DE 15 6C 08 F5 46 42 77 66 30 B2 E4 0E CA 79 62 77 0A A1 EC 6A DD 58 8A F8 2A B2 CD FA 9F 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 23 72 32 DB 05 36 FC BD   F4 22 8D 7C 40 79 BE 80  #r2..6..."..@y..
#           0010: 28 48 73 84 0F 08 5E 73   48 14 32 91 06 D8 90 7D  (Hs...^sH.2.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.927 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.929 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.930 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.939 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.939 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.946 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.947 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.948 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.948 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.956 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 09 A4 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:18.000 UTC",
#       "not  after"         : "2024-01-17 10:47:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 9F 68 EE A5 4B EE B9   8B 57 47 FD 68 75 D3 98  ..h..K...WG.hu..
#           0010: 88 3B 98 3B                                        .;.;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.959 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.035 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.037 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A D6 B0 FE A7 63 B7 CC   F8 99 50 99 EB 64 FE A3  J....c....P..d..
#     0010: 60 23 73 61 39 1C 08 1B   CD BD 2C 07 37 78 FA D9  `#sa9.....,.7x..
#     0020: 3B 6D BC C3 68 3D 4A 1B   AF 39 D1 AA FF DF AF C2  ;m..h=J..9......
#     0030: 7F 96 56 56 7E 9C 71 D4   6D 15 ED 6F AC C3 21 01  ..VV..q.m..o..!.
#     0040: 6C B5 7F BC 13 DB 27 61   3E F1 EA CA 0A 15 FA C5  l.....'a>.......
#     0050: 59 E6 4D 33 F2 3D D0 97   16 CE CF D8 E8 1D AF D3  Y.M3.=..........
#     0060: 19 A8 54 3E 19 C9 03 DC   1D 93 4D A1 CF 5C E3 D3  ..T>......M..\..
#     0070: C9 90 7B 12 FC C7 74 32   33 B9 97 C5 6C E1 6A BA  ......t23...l.j.
#     0080: A9 6B 36 47 DE 78 58 D9   1D C6 20 78 CA 64 B0 7F  .k6G.xX... x.d..
#     0090: 28 A0 AD 50 9E 20 8F C6   7D 1D 84 E3 60 5B 93 3E  (..P. ......`[.>
#     00A0: C3 AF 0A 97 BE 0D B9 1E   0C 11 23 C8 28 6C 04 B0  ..........#.(l..
#     00B0: 97 A5 B7 F7 A1 35 B2 C3   98 17 68 E4 3C D3 05 D9  .....5....h.<...
#     00C0: 86 3C 77 9C 2C EC 8D F5   69 26 B9 34 92 D2 2B DE  .<w.,...i&.4..+.
#     00D0: 89 9B A6 16 A8 F6 C2 09   BA CE 65 E7 D7 87 0C BF  ..........e.....
#     00E0: 5E 01 6D 34 B6 5D C5 4E   D6 02 DE 9E B0 17 33 A2  ^.m4.].N......3.
#     00F0: 53 56 A7 BA 06 96 42 86   14 8C 4E 29 4A AB A6 E9  SV....B...N)J...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.039 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2D C5 D5 01 31 4C 38 04   5E 1D D0 3F B8 AF C0 77  -...1L8.^..?...w
#     0010: 28 BD 9B BE 7E FE 65 16   C1 AA 36 4A FA 37 30 89  (.....e...6J.70.
#     0020: A1 AC 9E D6 78 D9 3C 9E   49 82 A6 E6 B7 79 B6 AE  ....x.<.I....y..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.040 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.042 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.042 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.044 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 CB 36 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:22.000 UTC",
#       "not  after"         : "2024-01-17 10:47:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#           0010: E3 90 C4 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.067 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C AE 0B 70 09 82 04 E6   60 88 F9 1A 09 F4 32 07  ...p....`.....2.
#     0010: 9C A9 E7 D6 27 48 B8 C7   5D E9 0B F2 C2 8B 8B EF  ....'H..].......
#     0020: 93 07 75 16 F2 C6 AA 43   CD 4A 1A 93 7B C8 B5 E8  ..u....C.J......
#     0030: EB 7E 2B FD 23 E1 73 F3   AE A0 67 47 03 2F 25 F7  ..+.#.s...gG./%.
#     0040: 27 61 1A 1D 95 6C D2 2B   6C 80 73 82 51 8F 03 16  'a...l.+l.s.Q...
#     0050: 3B 95 F5 5F D4 09 61 CC   60 BC DA 88 79 F2 1E 0F  ;.._..a.`...y...
#     0060: E6 C4 5E 2B AA C8 B5 53   82 28 04 CC 7F E1 A2 91  ..^+...S.(......
#     0070: 28 C0 0F 77 6B 1D 5A 96   FF 0C 23 F2 A4 7F 30 51  (..wk.Z...#...0Q
#     0080: E1 B7 D4 D6 59 EC 99 81   50 9E 15 67 00 C2 DC 69  ....Y...P..g...i
#     0090: 85 B6 5C E3 29 C5 ED 5A   AC 2B 5D 8D BD FD 7A A6  ..\.)..Z.+]...z.
#     00A0: F8 39 9F F1 D2 E5 AB 01   84 14 2B E8 6A E1 BD 25  .9........+.j..%
#     00B0: CB D9 D4 F9 31 20 BF A6   F5 2F 0E 84 0E FA B8 B0  ....1 .../......
#     00C0: 80 E0 5D 93 AD E2 66 E0   F3 03 5C 6D 92 63 44 D0  ..]...f...\m.cD.
#     00D0: 2D 74 00 F2 B8 27 8D D2   B4 2B 18 67 69 67 70 D0  -t...'...+.gigp.
#     00E0: 0F 1A D6 6B 79 44 55 C4   22 EB 35 3F 66 D5 D3 4D  ...kyDU.".5?f..M
#     00F0: 88 83 39 DF D0 3F C1 E0   1C 67 A5 35 7C B4 AF AD  ..9..?...g.5....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.068 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 43 8C 88 1F 97 CD AD   25 D5 5C 58 38 41 B0 0C  .C......%.\X8A..
#     0010: C0 B8 C7 FB CC AA 75 7B   CA F9 38 F8 02 9B 7F E2  ......u...8.....
#     0020: 12 F5 75 12 30 BE 59 B6   F3 4F 77 FD 0A 96 55 78  ..u.0.Y..Ow...Ux
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.069 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.124 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "43 77 DF 85 64 EF 54 A1 E8 32 A0 D7 61 00 9D 3A 55 F2 F4 B2 3F F1 0A 4F D4 79 0A C4 23 D6 E2 DE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:47:42.384 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:47:42.385 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-19 10:47:55.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:56.169 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 C8 8A B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:14.000 UTC",
#       "not  after"         : "2024-01-17 10:47:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:56.182 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.400 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.402 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.402 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.406 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.419 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "0A 49 EB 31 3F 1A AB 89 EB D1 11 80 EA B8 B8 52 75 08 80 24 24 B6 D1 AA E1 1E 99 AB 17 D0 A3 D1",
#     "session id"          : "88 8C A3 6D E3 6A 99 FA DF BF 03 40 22 00 BE 87 CE F9 47 6A 75 D1 A4 98 E7 6F 46 62 57 2D F5 77",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6B 79 85 2B DD 69 0C D2   17 6A 7C 0E 97 26 4F D3  ky.+.i...j...&O.
#               0010: 4B CD 31 A4 68 E4 2A 22   73 6F 62 F3 89 45 B1 0E  K.1.h.*"sob..E..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.438 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "09 4E 29 9C 5E 04 FE 9A B9 55 40 6D 5E 9A 06 67 98 E5 BB 64 2D 45 9B DE 37 DA EA 64 AD 71 7E C9",
#     "session id"          : "88 8C A3 6D E3 6A 99 FA DF BF 03 40 22 00 BE 87 CE F9 47 6A 75 D1 A4 98 E7 6F 46 62 57 2D F5 77",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 82 59 8C 61 D4 32 E8   EE 5C 7F C4 FA E7 F9 FC  D.Y.a.2..\......
#             0010: F5 34 D8 63 64 98 FF 62   56 E9 1F 89 3E 5B 05 5F  .4.cd..bV...>[._
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:192|Consume

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14234ms
ok 78 stop command for single port in 18005ms
not ok 79 status detects locally running solr in 1474ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7385ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1462ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2537ms
ok 83 copying files around in 7054ms
ok 84 upconfig in 2540ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
not ok 87 Cleanup in 2498ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 22s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5vkpepstawt6a

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any