Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-9.x/5433/

All tests passed

Build Log:
[...truncated 1332 lines...]
#   ERROR: IOException occurred when talking to server at: 
https://localhost:8983/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: 
/tmp/src/solr/solr/packaging/build/test-output/failure-snapshots/59-2
# Last output:
# INFO  - 2023-09-13 08:25:37.457; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-09-13 08:25:37.463; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: 
IOException occurred when talking to server at: 
https://localhost:8983/solr/admin/info/system
#       at 
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
#       at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
#       at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
#       at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
#       at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
#       at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
#       at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative DNS 
name matching localhost found.
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
#       at 
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
#       at 
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
#       at java.base/java.security.AccessController.doPrivileged(Native Method)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#       Suppressed: java.io.IOException: Broken pipe
#               at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
#               at 
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#               at 
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#               at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#               at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#               at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#               ... 11 more
# Caused by: java.security.cert.CertificateException: No subject alternative 
DNS name matching localhost found.
#       at 
java.base/sun.security.util.HostnameChecker.matchDNS(HostnameChecker.java:212)
#       at 
java.base/sun.security.util.HostnameChecker.match(HostnameChecker.java:103)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
#       ... 22 more
ok 60 start solr with ssl and auth in 22857ms
ok 61 start solr with client truststore and security manager in 24860ms
not ok 62 start solr with mTLS needed in 56418ms
# (from function `assert_output' in file 
/tmp/src/solr/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, 
line 247,
#  in test file test/test_ssl.bats, line 321)
#   `assert_output --partial 'Server refused connection'' failed
# /tmp/bats-run-c1iN9y/test/62/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# NOTE: Please install lsof as this script needs it to determine if Solr is 
listening on port 8983.
#
# Started Solr server on port 8983 (pid=199897). Happy searching!
#
# NOTE: Please install lsof as this script needs it to determine if Solr is 
listening on port 8984.
#
# Started Solr server on port 8984 (pid=200316). Happy searching!
#
# INFO  - 2023-09-13 08:27:01.265; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-09-13 08:27:01.271; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-09-13 08:27:01.643; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@550a1967(client,h=[localhost],a=[],w=[]) for 
Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-13 08:27:01.646; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@5d9b7a8a(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-13 08:27:01.646; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@1e8ce150(ca,h=[localhost],a=[],w=[]) for 
Client@55dfebeb[provider=null,keyStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:01.677 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE A4 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:37.000 UTC",
#     "not  after"         : "2023-12-12 08:26:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#         0010: 31 9E D0 7B                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD 62 E6 EF C3 27 AF AC   7E D1 D0 6E 0D C2 DA C9  
.b...'.....n....
#         0010: EB E3 8E FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:01.681 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 93 08 F5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:31.000 UTC",
#     "not  after"         : "2023-12-12 08:26:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#         0010: AA 22 9D B9                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#         0010: 31 9E D0 7B                                        1...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 3D A8 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:29.000 UTC",
#     "not  after"         : "2023-12-12 08:26:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#         0010: AA 22 9D B9                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:01.697 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:01.917 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:01.917 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:01.919 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:01.919 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:01.925 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:01.936 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:01.936 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:01.936 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:01.939 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 A7 F3 76 71 15 01 9F F0 2F A6 8A 81 07 6F FD 75 
B2 A9 82 04 1C A8 0A 0F 11 0B F5 5F 6E CE C1",
#   "session id"          : "69 C7 F7 DD 01 CD A9 D8 75 67 1A E5 23 2E F8 1A BE 
3F 7C E9 1B A1 EE 20 F9 DA F6 EB 0D 6F A3 C9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BD 73 C9 12 60 D1 75 AF   9F C3 BA 02 04 D5 C5 84  
.s..`.u.........
#             0010: 34 6D F4 3F FE C6 0E EF   14 11 6A 70 49 CD FD 76  
4m.?......jpI..v
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.045 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "86 FD B8 E7 A4 45 51 9D BF BB 94 4D 6E 96 14 4B C0 
86 8C D5 F1 AC AD 1D 5F 1E E5 8A D5 21 DF 48",
#   "session id"          : "69 C7 F7 DD 01 CD A9 D8 75 67 1A E5 23 2E F8 1A BE 
3F 7C E9 1B A1 EE 20 F9 DA F6 EB 0D 6F A3 C9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8F D4 67 5E 4A CF 9C E7   55 5D 61 04 BB CC BB 7E  
..g^J...U]a.....
#           0010: A0 9D 3D D9 63 0C F2 54   D4 AD 3D BA 14 8D 92 11  
..=.c..T..=.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.046 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.046 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.047 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.047 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.047 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.047 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.047 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.048 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.048 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.048 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.050 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.050 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.050 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.050 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.050 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.050 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.051 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.051 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.051 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.051 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.051 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.051 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.051 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.052 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.059 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.060 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.061 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.065 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.065 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.065 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.065 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.066 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.066 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.066 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.066 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.066 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.067 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.068 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.068 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.068 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.069 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.069 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.070 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.072 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 91 0B 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-13 08:26:33.000 UTC",
#       "not  after"         : "2023-12-12 08:26:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#           0010: 31 9E D0 7B                                        1...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AB 62 33 9A 31 E2 D6 B7   BD 8A 14 82 30 EB 19 F8  
.b3.1.......0...
#           0010: B7 B3 40 93                                        ..@.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.073 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:02.140 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:02.140 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:02.141 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:02.141 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.163 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 93 08 F5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:31.000 UTC",
#     "not  after"         : "2023-12-12 08:26:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#         0010: AA 22 9D B9                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#         0010: 31 9E D0 7B                                        1...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.167 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 DC 9D A9 3B 1D 8B C3   77 57 B7 67 CA 0C 41 0E  3...;...wW.g..A.
#     0010: 12 80 D9 5A 24 D6 BE 5B   E1 1E 7E 65 32 A6 D2 79  ...Z$..[...e2..y
#     0020: 1C 25 E9 85 56 24 9D 96   09 37 2F 7B 44 71 F0 6A  .%..V$...7/.Dq.j
#     0030: 7A 26 80 80 B5 00 B3 E3   CD 3F 35 C2 93 A3 38 55  z&.......?5...8U
#     0040: 6B 3B E7 CC 27 64 07 98   F4 05 8F E0 32 B1 9B C1  k;..'d......2...
#     0050: 3E ED AB A7 A7 D9 37 9C   6C 22 33 97 CD EE D4 BB  >.....7.l"3.....
#     0060: 48 9B 30 C4 47 CB 62 F7   2E 66 1A BF 75 6D 4E 7F  H.0.G.b..f..umN.
#     0070: 71 32 2F C2 7A F8 DF CC   41 93 21 32 4B FB A5 6D  q2/.z...A.!2K..m
#     0080: E0 62 84 4D 00 6A 3D 9A   A8 4A 78 1E B2 20 1C 58  .b.M.j=..Jx.. .X
#     0090: 8C FE 00 D8 A4 F7 1B 00   84 F2 A3 E2 87 7D F5 81  ................
#     00A0: E0 12 E1 D5 03 1C BD D2   36 50 A0 1B BA A4 D8 CE  ........6P......
#     00B0: FC 24 F4 BA 2C 56 8D 6D   21 3F 04 10 53 AA 4F EF  .$..,V.m!?..S.O.
#     00C0: 82 E4 85 5D F2 B8 E8 03   BF EC 70 C5 4E 14 73 B8  ...]......p.N.s.
#     00D0: B0 55 04 D5 4B 82 84 0E   12 A8 6A 8D 6E 9F B1 D6  .U..K.....j.n...
#     00E0: 94 E1 87 CD EC 4B 8E AC   D9 7C EE F1 71 32 50 77  .....K......q2Pw
#     00F0: B3 6F 4B 7F 88 B0 9B D9   4F B1 CC 25 06 37 87 59  .oK.....O..%.7.Y
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.169 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2F 50 1A F3 04 18 ED 01   C7 48 9A 31 38 C1 36 88  /P.......H.18.6.
#     0010: 32 B3 40 65 D8 64 F4 F0   2A 92 3E A9 5E 40 CB 7E  [email protected]..*.>.^@..
#     0020: D2 8D 13 CE BA 83 94 54   B9 F3 8F 34 FC 3C 24 21  .......T...4.<$!
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.171 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-13 08:27:02.172 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.172 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-13 08:27:02.172 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.173 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-13 08:27:02.173 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:02.173 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.173 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.175 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 BE A4 67",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-13 08:26:37.000 UTC",
#       "not  after"         : "2023-12-12 08:26:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#           0010: 31 9E D0 7B                                        1...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DD 62 E6 EF C3 27 AF AC   7E D1 D0 6E 0D C2 DA C9  
.b...'.....n....
#           0010: EB E3 8E FB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.201 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 E0 B3 DC 69 90 B2 77   7E 20 61 2D 85 38 B7 07  ....i..w. a-.8..
#     0010: 9D 82 8A 0B 8C F4 D6 0B   9C D7 B0 67 B9 4E A5 AE  ...........g.N..
#     0020: EB F5 30 DB 14 0E E8 8A   08 66 31 6F BC D5 9D 09  ..0......f1o....
#     0030: BC 64 49 51 30 6C 76 21   AA E2 30 1D 00 61 49 2D  .dIQ0lv!..0..aI-
#     0040: 97 63 94 61 5F 91 D1 A0   CC 2C 2C 29 F3 4E 39 41  .c.a_....,,).N9A
#     0050: 27 3C 31 A8 C7 35 1F 1C   54 F0 3A 9D 4F 6B AC C1  '<1..5..T.:.Ok..
#     0060: 10 64 51 AF 86 52 AD 65   32 2F 16 D6 F6 35 8D F3  .dQ..R.e2/...5..
#     0070: 19 A1 5E 11 D4 BC F9 E6   29 90 99 35 63 66 C2 15  ..^.....)..5cf..
#     0080: 91 39 55 01 ED AD C7 36   A9 62 E0 A5 BB 48 A5 54  .9U....6.b...H.T
#     0090: 11 BF FF CF FB 2F 27 71   C4 F3 2B 44 EB 16 1B E2  ...../'q..+D....
#     00A0: F7 33 AA 84 AE F4 5E 58   55 7C 2C FA 02 5F AF 81  .3....^XU.,.._..
#     00B0: 9E 94 E2 25 23 FB 00 0A   98 61 CE D9 D1 6A 62 2A  ...%#....a...jb*
#     00C0: 8A EC F4 63 90 D3 B6 0E   7E 16 DB 81 9D 84 FB D7  ...c............
#     00D0: C6 E0 DA C4 93 CF 81 E6   FC 31 84 54 D8 53 8F 66  .........1.T.S.f
#     00E0: 35 A1 FE 2F 48 60 B0 F9   C8 DF C8 1A B4 0A 89 D0  5../H`..........
#     00F0: 44 0C D9 39 CE 5F DF 11   D8 43 C6 C3 3A 07 B7 90  D..9._...C..:...
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.202 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 B8 AC 5A BB EF F3 FA   13 BD AF 0C E2 3F DE EE  @..Z.........?..
#     0010: 24 5C 99 4F 15 47 C1 D7   97 C4 90 09 0E F4 32 E0  $\.O.G........2.
#     0020: F6 11 FE 4A B2 DF 56 F2   6F 5D 0A A0 D4 21 07 BF  ...J..V.o]...!..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.202 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:02.250 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "8C 17 A0 0D 72 01 8B 1A 5B EE 59 60 31 42 12 FD 
84 97 CE 06 15 8D 3C 09 73 52 15 83 82 12 40 C8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-13 08:27:02.638 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-13 08:27:02.639 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# INFO  - 2023-09-13 08:27:03.552; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-09-13 08:27:03.558; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-09-13 08:27:03.920; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@ebaa6cb(client,h=[localhost],a=[],w=[]) for 
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-13 08:27:03.922; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@2dca0d64(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-13 08:27:03.923; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@f80945f(ca,h=[localhost],a=[],w=[]) for 
Client@52851b44[provider=null,keyStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c1iN9y/test/62/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:03.953 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "47 BE A4 67",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:37.000 UTC",
#     "not  after"         : "2023-12-12 08:26:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#         0010: 31 9E D0 7B                                        1...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DD 62 E6 EF C3 27 AF AC   7E D1 D0 6E 0D C2 DA C9  
.b...'.....n....
#         0010: EB E3 8E FB                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:03.958 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 93 08 F5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:31.000 UTC",
#     "not  after"         : "2023-12-12 08:26:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#         0010: AA 22 9D B9                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#         0010: 31 9E D0 7B                                        1...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "23 3D A8 CC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:29.000 UTC",
#     "not  after"         : "2023-12-12 08:26:29.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#         0010: AA 22 9D B9                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:03.973 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:04.069 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:04.070 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:04.070 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:04.071 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:04.207 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:04.207 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:04.209 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:04.209 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:04.214 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:04.226 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:04.226 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:04.226 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:04.228 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "78 09 D2 E1 3A 69 CC 7C 2E C9 29 91 02 3E CF 49 77 
B4 D6 D4 20 A3 78 42 77 BC D8 8B 9C 26 4D CD",
#   "session id"          : "BD 92 CA B9 01 ED D1 EC EC D0 34 84 DD F8 BF 5E 81 
F5 F6 F0 CF 62 E1 09 5D A1 AC D7 F1 F6 A4 F0",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 18 53 C6 11 77 EF 19 4D   2F DF B5 DF 45 2F D6 8C  
.S..w..M/...E/..
#             0010: 96 14 48 DC A6 0F 1D DA   A1 46 8B 61 36 C1 A7 0D  
..H......F.a6...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.333 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2D B1 31 EF 5F 77 67 00 08 C4 14 0B A5 79 A7 11 EC 
AD E0 31 A6 7F 3A 1A 06 D5 C5 F2 B3 C3 82 3E",
#   "session id"          : "BD 92 CA B9 01 ED D1 EC EC D0 34 84 DD F8 BF 5E 81 
F5 F6 F0 CF 62 E1 09 5D A1 AC D7 F1 F6 A4 F0",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F2 A3 DB DC 14 DB 33 03   F1 24 2C D9 CE 10 8E ED  
......3..$,.....
#           0010: A2 2E B9 14 CA 9F C5 BC   C4 7A 0D 6E AB C4 98 00  
.........z.n....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.334 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.334 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.335 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.335 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.336 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.336 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.336 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.336 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.336 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.336 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.338 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.338 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.339 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.339 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.339 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.339 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.339 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.339 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.340 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.340 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.340 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.340 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.340 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.340 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.348 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.349 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.350 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.354 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.354 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.354 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.355 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.355 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.355 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.355 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.355 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.355 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.357 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.357 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.357 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.358 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.359 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.359 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.359 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.362 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 91 0B 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-13 08:26:33.000 UTC",
#       "not  after"         : "2023-12-12 08:26:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#           0010: 31 9E D0 7B                                        1...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AB 62 33 9A 31 E2 D6 B7   BD 8A 14 82 30 EB 19 F8  
.b3.1.......0...
#           0010: B7 B3 40 93                                        ..@.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.362 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.449 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 93 08 F5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-13 08:26:31.000 UTC",
#     "not  after"         : "2023-12-12 08:26:31.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#         0010: AA 22 9D B9                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#         0010: 31 9E D0 7B                                        1...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.453 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 05 0F 7D B3 49 AB AA 09   19 8C 7C B5 63 BA AC 88  ....I.......c...
#     0010: FB 3E D8 D0 3E 70 FF 96   F7 F9 7D 8C 38 C1 1D 3A  .>..>p......8..:
#     0020: DA 29 3D CE 7B 3D 4F FB   B6 41 86 0D 3A 63 59 9D  .)=..=O..A..:cY.
#     0030: E3 C4 F4 82 9B 8F 2A C5   0F 56 93 50 9D FB 9B 7C  ......*..V.P....
#     0040: 49 DE CF 79 16 12 84 D3   94 BC A4 F6 48 70 60 15  I..y........Hp`.
#     0050: F3 35 E1 E5 6C AC C4 04   D3 05 20 61 8E C6 E4 72  .5..l..... a...r
#     0060: 9A 83 74 4C 77 89 9D 6B   15 40 E9 D2 14 A8 B9 2E  ..tLw..k.@......
#     0070: 3A 8F 7D 1C 49 16 25 0E   37 FF 0B E3 E1 43 44 26  :...I.%.7....CD&
#     0080: 8F 34 34 A0 D6 4E A1 28   72 BA 24 95 57 9D 7B F8  .44..N.(r.$.W...
#     0090: AA F8 6C A1 1E AC 48 1D   72 A6 72 AB 1A 39 84 32  ..l...H.r.r..9.2
#     00A0: D9 2B 15 62 1E 9E DA F8   31 61 F4 86 65 23 63 23  .+.b....1a..e#c#
#     00B0: CC E8 9F 78 42 50 3C 68   46 4C FB 7E 18 5B E7 6D  ...xBP<hFL...[.m
#     00C0: D9 C0 D4 48 5E BD 3D AB   9C 4D BE CF 91 12 55 2E  ...H^.=..M....U.
#     00D0: BB 4A 62 8C 0B 25 C0 31   2B AB F4 C7 B6 08 26 17  .Jb..%.1+.....&.
#     00E0: 07 C8 2C 5A BA CD 6B C6   F6 50 BB D7 2C B0 25 41  ..,Z..k..P..,.%A
#     00F0: BA 67 05 1C 79 C8 B9 D2   BE 07 A9 74 C0 AC CA 0B  .g..y......t....
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.455 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 93 53 B6 87 FC D1 DC B6   AD 07 66 70 98 44 F3 E7  .S........fp.D..
#     0010: 40 32 2A 06 47 92 D4 6C   71 E9 15 71 54 7A 8D 83  @2*.G..lq..qTz..
#     0020: 8A 53 52 8D AE 99 B4 50   9C CF 49 98 FD 63 E8 1B  .SR....P..I..c..
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.457 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-13 08:27:04.458 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.458 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-13 08:27:04.458 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.458 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|21|h2sc-1-thread-5|2023-09-13 08:27:04.459 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:04.459 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.459 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.461 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "47 BE A4 67",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-13 08:26:37.000 UTC",
#       "not  after"         : "2023-12-12 08:26:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#           0010: 31 9E D0 7B                                        1...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DD 62 E6 EF C3 27 AF AC   7E D1 D0 6E 0D C2 DA C9  
.b...'.....n....
#           0010: EB E3 8E FB                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.487 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 4D 50 6A 8C D4 11 F9   55 A2 5C BE A8 BC B1 FC  QMPj....U.\.....
#     0010: FB CD 69 FD 83 00 6B 4A   E5 F3 B3 8E 4A 6F BA EB  ..i...kJ....Jo..
#     0020: A7 79 F1 BB EA F0 37 9F   02 63 DE 37 CA BC 73 4B  .y....7..c.7..sK
#     0030: 0A DC D0 4E 3C 24 F2 90   07 2B D6 8B 25 18 32 83  ...N<$...+..%.2.
#     0040: 52 40 08 18 43 5E 0D F7   8C 4B 37 8A F3 BF 02 50  [email protected]^...K7....P
#     0050: 93 72 C4 F2 B7 15 7B F1   54 97 24 84 DF C8 19 45  .r......T.$....E
#     0060: 3D B7 F2 FD 6B 34 0E 28   4D 65 58 E8 E9 7F 1C FF  =...k4.(MeX.....
#     0070: B4 65 B3 5C 7B 55 75 AA   02 CC 5D A0 FB 78 E6 8F  .e.\.Uu...]..x..
#     0080: 09 D3 4C 02 7E 7D 5C B9   7C 6E 38 2E E2 02 50 4C  ..L...\..n8...PL
#     0090: 5C 71 22 17 73 C5 74 00   87 AD C1 19 9B D5 9C A3  \q".s.t.........
#     00A0: FE 12 E7 50 F0 A5 A4 A7   25 43 1F 2B F6 1C 4D 4A  ...P....%C.+..MJ
#     00B0: 3C 1E 85 5A C4 54 A1 45   CB 87 EA A1 DA 23 7C 3A  <..Z.T.E.....#.:
#     00C0: 14 40 9B CA 6A D1 8B DC   99 CC A0 C4 19 7D F4 0C  [email protected]...........
#     00D0: 74 22 17 AB 83 AA CC 0E   A2 D1 49 BA 18 35 FD 9A  t"........I..5..
#     00E0: 2A 45 C4 65 71 77 22 A3   7A DD CC 50 6D FF 15 ED  *E.eqw".z..Pm...
#     00F0: 74 30 15 4B DC F6 3B 07   49 CC D2 84 E6 DE C3 A7  t0.K..;.I.......
#   }
# }
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.488 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C 9E B5 59 E2 A5 9C 94   33 C4 52 3C B6 1A 7F 28  ,..Y....3.R<...(
#     0010: 57 9D 48 F2 55 0B 2D BE   E8 24 BC C6 87 BB 43 C8  W.H.U.-..$....C.
#     0020: A9 36 EF 45 79 43 35 E1   5B 9D 76 0A EC 8E 11 C9  .6.EyC5.[.v.....
#   }'}
# )
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.489 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:04.536 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "32 14 60 D4 40 3E 29 96 3F 6F 6A 4F A6 84 D1 E9 
56 4F F9 59 DA 18 9E 20 D5 3B 38 B9 39 D0 0B 5F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-13 08:27:04.748 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-13 08:27:04.749 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (484 lines):
#   INFO  - 2023-09-13 08:27:15.416; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:15.744 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 93 08 F5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-13 08:26:31.000 UTC",
#       "not  after"         : "2023-12-12 08:26:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#           0010: AA 22 9D B9                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D5 F7 B6 96 12 56 5B E9   68 EE 66 4F 90 EF E2 B5  
.....V[.h.fO....
#           0010: 31 9E D0 7B                                        1...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "23 3D A8 CC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-13 08:26:29.000 UTC",
#       "not  after"         : "2023-12-12 08:26:29.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 76 2A C0 15 3F 5E 2E 75   99 13 8A D5 0E CA A8 D2  
v*..?^.u........
#           0010: AA 22 9D B9                                        ."..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-13 08:27:15.762 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:16.169 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:16.170 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:16.170 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-09-13 08:27:16.170 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:16.261 
UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:16.261 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:16.263 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
#   javax.net.ssl|WARNING|20|h2sc-1-thread-4|2023-09-13 08:27:16.263 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:16.269 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:16.280 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:16.280 
UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:16.281 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|20|h2sc-1-thread-4|2023-09-13 08:27:16.283 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6B 5B 25 1C A3 6A 61 0D 70 43 0D 3E A8 84 8C C4 
66 DD EB E5 05 04 ED 5E A0 0F 8D CE A8 17 CF 0F",
#     "session id"          : "62 DC 44 F1 7D E1 E6 79 BE 02 35 48 04 37 FE 20 
4D 4E A8 BA 32 18 53 83 F1 AD BA 5A 16 F3 D7 20",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, 
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 40 20 AB 26 E2 68 1C 85   E9 AB AE B6 94 C8 ED A5  @ 
.&.h..........
#               0010: 96 0E CB 06 E3 9E FB 30   E0 01 50 F9 B1 5C B2 1C  
.......0..P..\..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.304 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "EC 78 53 0F FB 2F E7 32 90 65 96 D4 F5 82 21 7F 
A7 B6 69 65 C7 F7 C5 58 C3 3F B6 CE F5 FD 11 D0",
#     "session id"          : "62 DC 44 F1 7D E1 E6 79 BE 02 35 48 04 37 FE 20 
4D 4E A8 BA 32 18 53 83 F1 AD BA 5A 16 F3 D7 20",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0E 60 F0 9C BE 96 25 46   DC 68 A0 C4 09 5C 70 35  
.`....%F.h...\p5
#             0010: 8E 75 2E 75 CB 36 C2 48   A9 FC 60 FA F3 F3 6C 1E  
.u.u.6.H..`...l.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.304 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.304 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.305 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.306 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.306 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.306 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.306 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.306 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.306 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.307 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.309 
UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.309 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.309 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.309 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:16.310 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.311 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.311 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.318 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.320 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.321 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.324 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.325 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.325 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.325 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.325 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.325 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.325 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:16.325 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:16.326 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.327 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.327 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.328 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.328 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.329 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.330 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|21|h2sc-1-thread-5|2023-09-13 08:27:16.330 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
#   javax.net.ssl|DEBUG|21|h2sc-1-thread-5|2023-09-13 08:27:16.334 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "66 91 0B 04",
#         "signature algorithm": "SHA256withRSA",


[...truncated too long message...]

Impl.java:681)
#       at 
java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:636)
#       at 
java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:454)
#       at 
java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:433)
#       at java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:637)
#       at org.eclipse.jetty.io.ssl.SslConnection.unwrap(SslConnection.java:398)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:721)
#       at 
org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#       at 
org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#       at 
org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#       at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.succeeded(HTTP2ClientConnectionFactory.java:174)
#       at org.eclipse.jetty.util.Callback$Nested.succeeded(Callback.java:392)
#       at 
org.eclipse.jetty.util.CountingCallback.succeeded(CountingCallback.java:63)
#       at org.eclipse.jetty.util.Callback$Nested.succeeded(Callback.java:392)
#       at 
org.eclipse.jetty.http2.HTTP2Session$ControlEntry.succeeded(HTTP2Session.java:1377)
#       at java.base/java.util.ArrayList.forEach(ArrayList.java:1541)
#       at org.eclipse.jetty.http2.HTTP2Flusher.finish(HTTP2Flusher.java:323)
#       at org.eclipse.jetty.http2.HTTP2Flusher.succeeded(HTTP2Flusher.java:315)
#       at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:291)
#       at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#       at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#       at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#       at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#       at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#       at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#       at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#       at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#       at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: 
IOException occurred when talking to server at: 
https://localhost:8984/solr/admin/info/system
#       at 
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
#       at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1192)
#       at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
#       at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:481)
#       at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:438)
#       at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:158)
#       at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:153)
# Caused by: java.nio.channels.ClosedChannelException
#       at 
org.eclipse.jetty.http2.HTTP2Session$StreamsState.onShutdown(HTTP2Session.java:1865)
#       at 
org.eclipse.jetty.http2.HTTP2Session.onShutdown(HTTP2Session.java:1036)
#       at 
org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:385)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#       at 
org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#       at 
org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#       at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.succeeded(HTTP2ClientConnectionFactory.java:174)
#       at org.eclipse.jetty.util.Callback$Nested.succeeded(Callback.java:392)
#       at 
org.eclipse.jetty.util.CountingCallback.succeeded(CountingCallback.java:63)
#       at org.eclipse.jetty.util.Callback$Nested.succeeded(Callback.java:392)
#       at 
org.eclipse.jetty.http2.HTTP2Session$ControlEntry.succeeded(HTTP2Session.java:1377)
#       at java.base/java.util.ArrayList.forEach(ArrayList.java:1541)
#       at org.eclipse.jetty.http2.HTTP2Flusher.finish(HTTP2Flusher.java:323)
#       at org.eclipse.jetty.http2.HTTP2Flusher.succeeded(HTTP2Flusher.java:315)
#       at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:291)
#       at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#       at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#       at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#       at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#       at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#       at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#       at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#       at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#       at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
ok 63 start solr with mTLS wanted in 54687ms
ok 64 SOLR-11740 check 'solr stop' connection in 28561ms
ok 65 stop command for single port in 31537ms
ok 66 status detects locally running solr in 14383ms
ok 67 status does not expose cli parameters to end user in 209ms
ok 68 listing out files in 2182ms
ok 69 copying files around in 6559ms
ok 70 upconfig in 2610ms
ok 71 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1200ms
ok 72 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1210ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/tmp/src/solr/solr/packaging/build.gradle' line: 286

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command 
> '/tmp/src/solr/.gradle/node/packaging/node_modules/bats/bin/bats'' finished 
> with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Run with --scan to get full insights.

* Get more help at https://help.gradle.org

BUILD FAILED in 20m 43s
673 actionable tasks: 658 executed, 15 up-to-date
[?12l[?25h
------------------------------------------------------------------------
Build Failed: returned 1

Total time: 21m6.5s
------------------------------------------------------------------------
+ status=1
+ ./crave pull '**/build/**/test/TEST-*.xml' '**/*.events' 'heapdumps/**' 
'**/hs_err_pid*'
Error: rsync: [sender] change_dir "/tmp/src/solr/heapdumps" failed: No such 
file or directory (2)
rsync error: some files/attrs were not transferred (see previous errors) (code 
23) at main.c(1675) [Receiver=3.1.2]
rsync: [Receiver] write error: Broken pipe (32)

+ exit 1
Build step 'Execute shell' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to