Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8264/

1 tests failed.
FAILED:  org.apache.solr.bench.DockMakerTest.testRealisticUnicode

Error Message:
java.lang.AssertionError: expected:<6> but was:<7>

Stack Trace:
java.lang.AssertionError: expected:<6> but was:<7>
        at 
__randomizedtesting.SeedInfo.seed([FA88941386C6714:5F440D92EBD730BD]:0)
        at org.junit.Assert.fail(Assert.java:89)
        at org.junit.Assert.failNotEquals(Assert.java:835)
        at org.junit.Assert.assertEquals(Assert.java:647)
        at org.junit.Assert.assertEquals(Assert.java:633)
        at 
org.apache.solr.bench.DockMakerTest.testRealisticUnicode(DockMakerTest.java:189)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:566)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
        at 
com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
        at org.junit.rules.RunRules.evaluate(RunRules.java:20)
        at 
org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
        at 
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
        at 
org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
        at 
org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
        at 
org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
        at org.junit.rules.RunRules.evaluate(RunRules.java:20)
        at 
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
        at 
com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
        at 
com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
        at 
com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
        at 
com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
        at 
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
        at 
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
        at 
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
        at 
com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
        at org.junit.rules.RunRules.evaluate(RunRules.java:20)
        at 
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
        at 
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
        at 
org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
        at 
com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
        at 
com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
        at 
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
        at 
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
        at 
org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
        at 
org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
        at 
org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
        at 
org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
        at 
org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
        at org.junit.rules.RunRules.evaluate(RunRules.java:20)
        at 
com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
        at 
com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
        at 
com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
        at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2267 lines...]
#   ERROR: IOException occurred when talking to server at: 
https://localhost:46023/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: 
/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-28 11:49:56.932; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 11:49:56.937; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. 
"/solr"). Such URLs are deprecated and support for them will be removed in a 
future release. Correcting from [https://127.0.0.1:46023/solr] to 
[https://127.0.0.1:46023].
# WARN  - 2023-10-28 11:49:57.829; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it 
creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to 
Zookeeper nodes
# WARN  - 2023-10-28 11:49:57.864; org.apache.solr.common.cloud.SolrZkClient; 
Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 
'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16729ms
ok 74 start solr with client truststore and security manager in 19823ms
not ok 75 start solr with mTLS needed in 52169ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Cumoee/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 46023 [|]   [/]  
 [-]   [\]   [|]
# Started Solr server on port 46023 (pid=2249509). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 46024 [|] 
  [/]   [-]   [\]   [|]   [/]   [-]   
[\]   [|]   [/]
# Started Solr server on port 46024 (pid=2249631). Happy searching!
#
#     INFO  - 2023-10-28 11:51:00.317; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 11:51:00.323; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 11:51:01.015; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@44c79f32(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 11:51:01.020; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@475835b1(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 11:51:01.020; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@6326d182(ca,h=[localhost],a=[],w=[]) for 
Client@fd0e5b6[provider=null,keyStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:01.088 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 24 74 AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:46.000 UTC",
#     "not  after"         : "2024-01-26 11:50:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 F2 6E 81 3F ED 5F 5A   2C B6 02 3F A8 94 B6 84  
1.n.?._Z,..?....
#         0010: E8 DE 28 D3                                        ..(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 49 01 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:39.000 UTC",
#     "not  after"         : "2024-01-26 11:50:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:01.099 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 0C 39 9C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:37.000 UTC",
#     "not  after"         : "2024-01-26 11:50:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 49 01 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:39.000 UTC",
#     "not  after"         : "2024-01-26 11:50:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:01.133 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:01.931 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:01.931 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:01.933 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:01.933 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:01.938 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:01.948 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:01.949 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:01.949 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:01.951 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "78 3F C2 E7 24 B2 E2 E3 B8 09 A3 4A D2 97 78 A5 0E 
0E 65 73 FB 8F 95 F1 F6 F2 4D AC B3 DA 70 F8",
#   "session id"          : "F4 5F 81 07 46 1D EF CE 1A BA 4A DA 7F E7 0E 44 15 
EA C6 5D 77 2F 6C 94 B3 8E C9 D6 F0 76 52 D1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BA D8 83 D8 97 BA A0 17   8E C5 57 79 AD 49 3D 06  
..........Wy.I=.
#             0010: 74 CC D8 0A 55 C7 59 06   C4 94 02 DE 1F D6 77 4D  
t...U.Y.......wM
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.126 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B9 B4 97 43 6F 7C 22 94 A7 DD 43 1B C1 B3 8E 58 34 
41 89 12 0F A1 4D AC 70 23 5D 56 DD 56 E7 00",
#   "session id"          : "F4 5F 81 07 46 1D EF CE 1A BA 4A DA 7F E7 0E 44 15 
EA C6 5D 77 2F 6C 94 B3 8E C9 D6 F0 76 52 D1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AA 60 50 6B 66 93 0B B8   77 FF B5 C8 9C 0A D6 3E  
.`Pkf...w......>
#           0010: 96 C0 C3 47 3E 25 20 5A   FD 19 23 FC F8 76 81 71  ...G>% 
Z..#..v.q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.127 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.128 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.133 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.133 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.133 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.133 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.133 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.133 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.133 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.134 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.136 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.136 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.136 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.136 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.136 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.136 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.136 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.139 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.139 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.140 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.140 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.140 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.140 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.140 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.167 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.169 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.170 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.178 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.178 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.178 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.179 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.179 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.179 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.179 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.179 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.179 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.181 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.181 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.181 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.181 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.191 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.192 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.192 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.203 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 06 D1 24",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:42.000 UTC",
#       "not  after"         : "2024-01-26 11:50:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#           0010: FB 8B D2 1B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D E5 9C D1 71 03 7E 8F   1B 5D 7E D8 82 E0 15 D6  
m...q....]......
#           0010: 3C 3B 84 68                                        <;.h
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.203 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.368 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 49 01 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:39.000 UTC",
#     "not  after"         : "2024-01-26 11:50:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.384 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0C E3 C9 46 14 17 7C 1E   43 7B 8F 44 AF A0 7F A5  ...F....C..D....
#     0010: A9 D7 20 41 1A 78 B3 DB   90 BC 5C 90 B0 6A 7F 16  .. A.x....\..j..
#     0020: 64 BF 0A 6E A4 16 47 9C   FC B2 7D B1 9F 12 9C 6E  d..n..G........n
#     0030: 77 53 26 47 14 28 1E 79   00 AB D6 09 87 8E 61 3E  wS&G.(.y......a>
#     0040: 63 39 B5 F3 B8 D9 2B FC   C6 9A A9 BF E7 88 4A 51  c9....+.......JQ
#     0050: CA A3 E7 59 DF 35 7B 60   07 1D AD DF 5B 2C CF BE  ...Y.5.`....[,..
#     0060: 51 7E 0C 8D F3 F7 37 48   92 EC 9B 2E 94 56 BE A5  Q.....7H.....V..
#     0070: 7D 09 F3 F8 3B E6 5F FC   7C 84 69 A9 1D F4 C0 F3  ....;._...i.....
#     0080: 25 B7 38 1F 37 8B 4B D1   58 06 63 63 EB C0 A7 3C  %.8.7.K.X.cc...<
#     0090: CD 03 55 77 62 19 C0 7B   BE A5 B5 DC 09 88 90 73  ..Uwb..........s
#     00A0: BA 07 55 1B AC BF 78 6A   44 BA 34 38 60 2A 97 EA  ..U...xjD.48`*..
#     00B0: 93 E6 7C 50 33 EC 6B F6   B1 51 8E 78 70 85 4A CA  ...P3.k..Q.xp.J.
#     00C0: FC C8 78 2F 7F D3 BB 24   2E 7E 2A CB 0E 60 38 3C  ..x/...$..*..`8<
#     00D0: 98 D7 A2 CF 8A 7F A3 5E   59 0A CF 78 19 A0 F4 BF  .......^Y..x....
#     00E0: 03 B7 1B F5 CA D6 F9 75   1D C6 74 49 1A 0E FC EB  .......u..tI....
#     00F0: 73 00 18 12 FD 21 14 3F   CB 24 B5 FA B6 1D E1 34  s....!.?.$.....4
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.386 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 85 78 87 E9 61 85 1B   B4 A8 BC 26 CF AB 81 7D  ..x..a.....&....
#     0010: 87 BA 3C 36 23 37 92 FD   02 7F 24 32 48 E6 C8 38  ..<6#7....$2H..8
#     0020: 21 EF 95 7F 50 2E 43 CC   D3 0B 85 B9 2F 23 39 05  !...P.C...../#9.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.387 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-28 11:51:02.388 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.388 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-28 11:51:02.388 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.389 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-28 11:51:02.389 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:02.389 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.389 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.407 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 24 74 AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:46.000 UTC",
#       "not  after"         : "2024-01-26 11:50:46.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#           0010: FB 8B D2 1B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 F2 6E 81 3F ED 5F 5A   2C B6 02 3F A8 94 B6 84  
1.n.?._Z,..?....
#           0010: E8 DE 28 D3                                        ..(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 49 01 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:39.000 UTC",
#       "not  after"         : "2024-01-26 11:50:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#           0010: 74 A9 37 DC                                        t.7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#           0010: FB 8B D2 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.661 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 94 B4 95 99 CE D6 C8 B8   37 81 56 82 9E B3 80 53  ........7.V....S
#     0010: 51 1C 87 8C 71 E2 F8 FB   3F 38 A6 75 4D A7 3A 3F  Q...q...?8.uM.:?
#     0020: A6 E1 88 62 C4 95 BB 25   A9 11 D4 62 F2 38 9C F8  ...b...%...b.8..
#     0030: BC CE 6D 4E 06 5D 04 A3   DE EF A8 ED 7D 26 3B 75  ..mN.].......&;u
#     0040: 59 6A BC F8 3A B5 49 A0   AB A3 02 92 5F 48 80 84  Yj..:.I....._H..
#     0050: 82 4F 72 0B D2 36 F6 93   10 88 42 6B 0C 3E F4 AC  .Or..6....Bk.>..
#     0060: 72 6B FB 41 07 B6 9B 5E   0A DC 43 64 BB 34 19 96  rk.A...^..Cd.4..
#     0070: 38 F5 A6 A3 AF 06 26 45   71 AC 6A 4D 4A C7 4D 99  8.....&Eq.jMJ.M.
#     0080: 86 5C 04 F0 93 D0 DB C1   77 99 CD B6 A9 E5 53 67  .\......w.....Sg
#     0090: BC 45 0E 1F 38 A1 AC 6C   6B E1 AB 8B 72 03 D6 CE  .E..8..lk...r...
#     00A0: ED 48 38 07 C1 23 FB 35   06 F7 0C 03 26 F6 0E 02  .H8..#.5....&...
#     00B0: 76 74 11 A0 E3 E4 E9 BD   3A A8 1F 91 DA C1 84 80  vt......:.......
#     00C0: 40 F4 14 52 73 22 B0 20   D4 94 18 31 E6 2A AB BC  @..Rs". ...1.*..
#     00D0: AD 8E 59 17 F8 26 77 DB   BE 5D 7F 84 94 E2 57 31  ..Y..&w..]....W1
#     00E0: F4 CE C1 F4 74 AD 39 1C   7A F4 DC 9D 75 59 58 98  ....t.9.z...uYX.
#     00F0: 38 51 DF 90 41 84 D3 ED   27 69 84 C3 FB FB 4E 2C  8Q..A...'i....N,
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.682 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF 1E 34 68 15 27 6F 66   32 ED BB 5B 13 56 01 C1  ..4h.'of2..[.V..
#     0010: 90 3F D4 1A BF BC AD CE   79 03 BA 91 A9 96 F1 D5  .?......y.......
#     0020: 0F AD 4E 12 33 15 79 4E   86 80 86 D7 B3 49 D5 F4  ..N.3.yN.....I..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.683 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:02.794 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9E C2 F9 AB 3F 38 E9 AD A9 36 B1 1D 4E A0 E8 B1 
E4 1F 47 E9 7C 74 5B 69 27 5E FD 77 A9 39 7C E3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 11:51:03.339 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 11:51:03.339 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 11:51:03.339 
UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-28 11:51:03.339 
UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-28 11:51:03.366 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 11:51:03.367 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# INFO  - 2023-10-28 11:51:04.292; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.keyStorePassword
# INFO  - 2023-10-28 11:51:04.297; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
# INFO  - 2023-10-28 11:51:04.649; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for 
Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 11:51:04.651; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for 
Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-28 11:51:04.652; 
org.eclipse.jetty.util.ssl.SslContextFactory; 
x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for 
Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Cumoee/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:04.764 
UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "38 24 74 AD",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:46.000 UTC",
#     "not  after"         : "2024-01-26 11:50:46.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 31 F2 6E 81 3F ED 5F 5A   2C B6 02 3F A8 94 B6 84  
1.n.?._Z,..?....
#         0010: E8 DE 28 D3                                        ..(.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 49 01 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:39.000 UTC",
#     "not  after"         : "2024-01-26 11:50:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:04.767 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 0C 39 9C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:37.000 UTC",
#     "not  after"         : "2024-01-26 11:50:37.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 49 01 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:39.000 UTC",
#     "not  after"         : "2024-01-26 11:50:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:04.779 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:04.940 
UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:04.940 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:04.943 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:04.943 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:04.947 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:04.960 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:04.960 
UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:04.961 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:04.963 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EB 8C 69 D6 11 36 2F 8B 36 94 C3 20 50 A8 D4 BC B0 
83 14 37 13 90 8A 6D 54 CD 21 2E E1 AE 52 7E",
#   "session id"          : "AA 35 CE F0 57 9C D9 49 35 25 BF 4D AD B8 E2 63 32 
AA 87 F9 EA 6C A7 FB 46 5D 5C FE 5B 26 92 3E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: AB 0D B8 7E B0 4D 3E BB   E4 0B 51 59 FB 64 1D E2  
.....M>...QY.d..
#             0010: 3F 1B 5C 53 F7 1A BD 5A   96 B7 91 C8 17 B0 6A 1A  
?.\S...Z......j.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.066 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "50 8A E5 16 F9 E3 54 0A E8 BC 70 73 F0 12 7F 3D DD 
CF 93 27 2D 6C 97 93 47 CF D3 99 9A 34 34 CB",
#   "session id"          : "AA 35 CE F0 57 9C D9 49 35 25 BF 4D AD B8 E2 63 32 
AA 87 F9 EA 6C A7 FB 46 5D 5C FE 5B 26 92 3E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 24 80 52 AF 56 6A 92 78   1F AF EA A0 42 FD 19 DA  
$.R.Vj.x....B...
#           0010: 9A AF E9 13 BA AB D1 0B   B9 D7 5B D5 47 FB 88 28  
..........[.G..(
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.067 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.067 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.067 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.068 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.068 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.068 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.068 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.068 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.068 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.068 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.070 
UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.070 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.070 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.070 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.070 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.071 
UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.082 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.085 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.086 
UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.089 
UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake 
message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, 
ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.089 
UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.089 
UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.089 
UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.089 
UTC|SSLExtensions.java:192|Consumed extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.090 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.090 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.090 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.090 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.097 
UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, 
ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.098 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.098 
UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.098 
UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.098 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.099 
UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.099 
UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: 
certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.105 
UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message 
(
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 06 D1 24",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:42.000 UTC",
#       "not  after"         : "2024-01-26 11:50:42.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#           0010: FB 8B D2 1B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D E5 9C D1 71 03 7E 8F   1B 5D 7E D8 82 E0 15 D6  
m...q....]......
#           0010: 3C 3B 84 68                                        <;.h
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.111 
UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.181 
UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "67 49 01 B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-28 11:50:39.000 UTC",
#     "not  after"         : "2024-01-26 11:50:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#         0010: 74 A9 37 DC                                        t.7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#         0010: FB 8B D2 1B                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.183 
UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 37 1C 44 68 6B 27 C1 17   DB 33 4D 44 D1 04 51 EB  7.Dhk'...3MD..Q.
#     0010: 37 D6 CA D5 A6 0C 80 A4   BB 92 D8 C4 30 0E 33 22  7...........0.3"
#     0020: F3 FD D4 6A 24 AD 87 7B   F0 39 87 0B E8 B7 F4 D6  ...j$....9......
#     0030: 34 D0 EE B5 70 65 BE 43   55 BA 1F 63 4B 3E 97 BC  4...pe.CU..cK>..
#     0040: AC 3E A5 7D 1E D7 64 87   E9 F2 3B 74 E4 55 31 82  .>....d...;t.U1.
#     0050: CD 1C 9B D9 C8 9A C5 34   DF A1 C0 B8 C6 E3 09 68  .......4.......h
#     0060: EC 49 85 E9 56 99 CC 8E   26 CF BA 91 22 42 9D 01  .I..V...&..."B..
#     0070: 88 9B BD CD D8 0F 42 DF   31 E2 36 07 CA 33 6B 2D  ......B.1.6..3k-
#     0080: BB 9A 70 74 70 5D A2 CF   FB 20 33 D5 54 D5 45 2C  ..ptp]... 3.T.E,
#     0090: 22 9F 8B 9E B1 C5 64 8E   1A 80 27 D4 FE 47 BF CD  ".....d...'..G..
#     00A0: D1 30 B2 9A FE 7A 6B 6A   4B 37 15 5E 1C C5 8A 60  .0...zkjK7.^...`
#     00B0: 87 61 65 10 65 69 69 39   6B F3 94 A0 84 5B 40 AA  .ae.eii9k....[@.
#     00C0: 57 CE 0C 26 76 E7 F9 F5   C0 C0 AA 05 8B E3 80 93  W..&v...........
#     00D0: 65 66 D9 A2 88 2E D6 FE   2B 4C 23 EA D9 6D A2 75  ef......+L#..m.u
#     00E0: 04 DB ED 78 3B 7C DA 1A   5B 48 34 5A 6F DB 58 47  ...x;...[H4Zo.XG
#     00F0: A7 45 8C E0 0D 5B F9 E3   AC 72 EB E8 EF EE 37 1F  .E...[...r....7.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.185 
UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 83 61 0A 7B 57 65 71 72   17 27 6D 92 FA 89 DB A9  .a..Weqr.'m.....
#     0010: 6F E6 39 6D 43 80 21 1C   9B A8 98 6D BE 40 45 FB  o.9mC.!....m.@E.
#     0020: 21 AA A0 3D FC 22 16 D8   AB A4 4B 58 71 FB 0C 6C  !..=."....KXq..l
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.187 
UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-28 11:51:05.187 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.188 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-28 11:51:05.188 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.188 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-28 11:51:05.188 
UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:51:05.188 
UTC|CertificateMessage.java:1084|Unavailable authentication scheme: 
ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.188 
UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.459 
UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "38 24 74 AD",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:46.000 UTC",
#       "not  after"         : "2024-01-26 11:50:46.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational 
Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#           0010: FB 8B D2 1B                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 31 F2 6E 81 3F ED 5F 5A   2C B6 02 3F A8 94 B6 84  
1.n.?._Z,..?....
#           0010: E8 DE 28 D3                                        ..(.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 49 01 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:39.000 UTC",
#       "not  after"         : "2024-01-26 11:50:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#           0010: 74 A9 37 DC                                        t.7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#           0010: FB 8B D2 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.679 
UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake 
message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 5B B0 87 02 5E 80 89   73 AF 34 C7 A3 6D 23 94  r[...^..s.4..m#.
#     0010: 17 30 3F BF A8 09 11 FA   34 84 23 9D 1D 93 79 03  .0?.....4.#...y.
#     0020: 42 1B E6 06 D9 F3 EE 77   75 AB 6C 7F 03 9F 8D 24  B......wu.l....$
#     0030: 0D A4 29 1F C8 67 51 39   99 1E F3 19 35 EF 85 00  ..)..gQ9....5...
#     0040: E8 49 1E 9C 36 C4 54 9B   EF B9 44 E1 77 40 E6 F1  .I..6.T...D.w@..
#     0050: 24 9A B2 31 41 B9 E5 93   1D 58 39 AF 70 53 9C F3  $..1A....X9.pS..
#     0060: 01 FF FA E1 A0 81 14 17   66 F3 F5 C3 C9 18 EF 5D  ........f......]
#     0070: 2D EC 27 60 C8 18 9C F0   04 3E 8E 06 F6 74 34 36  -.'`.....>...t46
#     0080: D1 C9 0C 20 59 9A 6E 8B   A7 3F 47 08 38 B0 2C EC  ... Y.n..?G.8.,.
#     0090: B1 F7 DD 2A 4A 23 AE 99   BC B4 C3 15 67 18 D5 01  ...*J#......g...
#     00A0: C0 8D 33 F2 8F 94 7B 98   8D 73 D3 D9 30 C3 4A 2C  ..3......s..0.J,
#     00B0: 02 E7 B6 1F E4 69 6E 24   EB CE 0A E5 2D 68 BD 47  .....in$....-h.G
#     00C0: 85 93 BE CE B0 49 A6 3E   FC 59 17 F6 15 37 6A 0B  .....I.>.Y...7j.
#     00D0: 21 3A A0 65 A3 E7 23 E8   8B 09 C7 58 2F 82 40 6B  !:.e..#....X/.@k
#     00E0: 85 25 E8 4E 7B 32 B3 18   52 B0 B3 C9 5F D0 47 F5  .%.N.2..R..._.G.
#     00F0: 02 7A AD BD E5 20 D2 65   98 C2 DF 07 3D A3 F5 89  .z... .e....=...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.680 
UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 41 3E 3F 9F F7 49 F3 20   8D 43 38 8D 43 9E 58 F3  A>?..I. .C8.C.X.
#     0010: C6 F0 92 21 E2 81 60 96   CA 22 1D C7 8C 55 AA 48  ...!..`.."...U.H
#     0020: D6 77 09 FE 3A 70 B0 E4   24 FE 27 30 58 EA 99 95  .w..:p..$.'0X...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.681 
UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = 
AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:05.750 
UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5C BC 16 3F 1E CC 99 EE 61 6D 49 8B 26 FB 16 34 
50 83 EE E6 C0 52 95 49 D8 AC BD FB 4B 9E 84 85",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-28 11:51:06.056 
UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-28 11:51:06.058 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-28 11:51:06.060 
UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-28 11:51:18.947; 
org.apache.solr.util.configuration.SSLConfigurations; Setting 
javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:19.334 
UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 0C 39 9C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:37.000 UTC",
#       "not  after"         : "2024-01-26 11:50:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#           0010: 74 A9 37 DC                                        t.7.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "67 49 01 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-28 11:50:39.000 UTC",
#       "not  after"         : "2024-01-26 11:50:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, 
O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 93 23 C7 66 DF 89 24 AF   F2 38 B0 00 4A D1 B1 C9  
.#.f..$..8..J...
#           0010: 74 A9 37 DC                                        t.7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0B 47 1A 99 16 0D 02 D0   88 D9 56 8A 81 E5 FD 6D  
.G........V....m
#           0010: FB 8B D2 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-28 11:51:19.348 
UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 
2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:19.547 
UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:19.547 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:19.549 
UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by 
the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-28 11:51:19.549 
UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by 
the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:19.553 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:19.564 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: 
renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:19.564 
UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:19.565 
UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-28 11:51:19.567 
UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "4A BA DE 96 2B 9C 45 11 C0 D0 1B E8 F1 58 33 C0 
D9 BB F8 49 4F 66 7B 3A 2D DF 09 42 E6 13 F8 1A",
#     "session id"          : "0A 47 54 D0 3B 92 2C F7 EF 60 AD C2 C8 EA 96 70 
98 AA E4 EB DA D9 BF 5F 3C C1 40 92 AC B0 FE C4",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), 
TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), 
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), 
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), 
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), 
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), 
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), 
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), 
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), 
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), 
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), 
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), 
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), 
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), 
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), 
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), 
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), 
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), 
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), 
TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), 
TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), 
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), 
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), 
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), 
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), 
TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, 
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, 
ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, 
rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, 
rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, 
dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, 
dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E7 5D 1E C2 57 56 3F D2   39 17 66 1F F2 89 5D A0  
.]..WV?.9.f...].
#               0010: F3 FA 5E 9B 97 D1 E7 D3   82 D8 FC DC 5F 28 2E 30  
..^........._(.0
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.586 
UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "6F A5 96 0D 1B 88 64 B5 19 0F 02 30 6D 07 8F EC 
2B AC 32 1B 2A E7 06 43 05 E2 35 5D 14 3B 2A B8",
#     "session id"          : "0A 47 54 D0 3B 92 2C F7 EF 60 AD C2 C8 EA 96 70 
98 AA E4 EB DA D9 BF 5F 3C C1 40 92 AC B0 FE C4",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 22 32 2A FD E2 32 21 7B   1A 40 C6 8C A1 63 F4 D3  
"2*[email protected]..
#             0010: 23 CC B7 B1 67 C1 E2 23   25 E5 DA 84 25 59 E6 3E  
#...g..#%...%Y.>
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.586 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.586 
UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.587 
UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.587 
UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.587 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.587 
UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.588 
UTC|SSLExtensions.java:163|Ignore unsupported extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.588 
UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.588 
UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.588 
UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.589 
UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|SSLExtensions.java:207|Ignore unavailable extension: 
application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.590 
UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-28 11:51:19.591 
UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28

[...truncated too long message...]

n$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: 
unable to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-28 11:52:33.014 
UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound 
application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: 
IOException occurred when talking to server at: 
https://localhost:46024/solr/admin/info/system
#       at 
org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
#       at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
#       at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
#       at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
#       at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
#       at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
#       at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: 
sun.security.provider.certpath.SunCertPathBuilderException: unable to find 
valid certification path to requested target
#       at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#       at 
java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
#       at 
java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
#       at 
java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
#       at java.base/java.security.AccessController.doPrivileged(Native Method)
#       at 
java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#       at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#       at 
org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#       at 
org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#       at 
org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#       at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#       at 
org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#       at 
org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#       at 
java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#       at java.base/java.lang.Thread.run(Thread.java:829)
#       Suppressed: java.io.IOException: Broken pipe
#               at 
org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
#               at 
org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
#               at 
org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
#               at 
org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
#               at 
org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
#               at 
org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
#               at 
org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
#               at 
org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
#               at 
org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
#               at 
org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
#               ... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building 
failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to 
find valid certification path to requested target
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
#       at 
java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
#       at 
java.base/sun.security.validator.Validator.validate(Validator.java:264)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
#       at 
java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
#       at 
java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
#       ... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable 
to find valid certification path to requested target
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#       at 
java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#       at 
java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#       at 
java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#       ... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14461ms
ok 78 stop command for single port in 17868ms
ok 79 status detects locally running solr in 9319ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 
7663ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 
1154ms
ok 82 listing out files in 3520ms
ok 83 copying files around in 6860ms
ok 84 upconfig in 2785ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1258ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1245ms
ok 87 Cleanup in 2142ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.bench.DockMakerTest.testRealisticUnicode (:solr:benchmark)
    Test output: 
/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/benchmark/build/test-results/test/outputs/OUTPUT-org.apache.solr.bench.DockMakerTest.txt
    Reproduce with: gradlew :solr:benchmark:test --tests 
"org.apache.solr.bench.DockMakerTest.testRealisticUnicode" -Ptests.jvms=4 
-Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 
-XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" 
-Ptests.seed=FA88941386C6714 -Ptests.multiplier=2 -Ptests.badapples=false 
-Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file 
'/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle'
 line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command 
> '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats''
>  finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with 
Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings 
and determine if they come from your own scripts or plugins.

For more on this, please refer to 
https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings
 in the Gradle documentation.

BUILD FAILED in 1h 5m 27s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ibho3aum3tclw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to