* Trying 10.23.176.87:3128... * Connected to (nil) (10.23.176.87) port 3128 (#0) * allocate connect buffer * Establish HTTP proxy tunnel to console.stage.redhat.com:443 * Server auth using Basic with user 'insights-qa' > CONNECT console.stage.redhat.com:443 HTTP/1.1 > Host: console.stage.redhat.com:443 > User-Agent: curl/7.85.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection established < * Proxy replied 200 to CONNECT request * CONNECT phase completed * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/pki/tls/certs/ca-bundle.crt * CApath: none * TLSv1.0 (OUT), TLS header, Certificate Status (22): * TLSv1.3 (OUT), TLS handshake, Client hello (1): * TLSv1.2 (IN), TLS header, Certificate Status (22): * TLSv1.3 (IN), TLS handshake, Server hello (2): * TLSv1.2 (IN), TLS header, Finished (20): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Certificate (11): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, CERT verify (15): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Finished (20): * TLSv1.2 (OUT), TLS header, Finished (20): * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.3 (OUT), TLS handshake, Finished (20): * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN: server accepted h2 * Server certificate: * subject: C=US; ST=North Carolina; L=Raleigh; O=Red Hat, Inc.; CN=*.stage.redhat.com * start date: Oct 3 00:00:00 2022 GMT * expire date: Oct 4 23:59:59 2023 GMT * subjectAltName: host "console.stage.redhat.com" matched cert's "*.stage.redhat.com" * issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS RSA SHA256 2020 CA1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * Server auth using Basic with user 'insights-qa' * h2h3 [:method: GET] * h2h3 [:path: //cost-management/cost-models] * h2h3 [:scheme: https] * h2h3 [:authority: console.stage.redhat.com] * h2h3 [authorization: Basic aW5zaWdodHMtcWE6cmVkaGF0cWE=] * h2h3 [user-agent: curl/7.85.0] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x5629c9401c00) * TLSv1.2 (OUT), TLS header, Supplemental data (23): > GET //cost-management/cost-models HTTP/2 > Host: console.stage.redhat.com > authorization: Basic aW5zaWdodHMtcWE6cmVkaGF0cWE= > user-agent: curl/7.85.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.2 (IN), TLS header, Supplemental data (23): < HTTP/2 301 < server: AkamaiGHost < content-length: 0 < location: https://console.redhat.com/openshift/cost-management/cost-models < date: Mon, 07 Aug 2023 20:59:24 GMT < x-rh-edge-request-id: 10908fbb < x-rh-edge-reference-id: 0.6ff02217.1691441964.10908fbb < x-rh-edge-cache-status: Redirect from child < x-content-type-options: nosniff < x-frame-options: SAMEORIGIN < strict-transport-security: max-age=31536000; includeSubDomains < * TLSv1.2 (IN), TLS header, Supplemental data (23): * Connection #0 to host (nil) left intact * Issue another request to this URL: 'https://console.redhat.com/openshift/cost-management/cost-models' * Hostname squid.corp.redhat.com was found in DNS cache * Trying 10.23.176.87:3128... * Connected to (nil) (10.23.176.87) port 3128 (#1) * allocate connect buffer * Establish HTTP proxy tunnel to console.redhat.com:443 > CONNECT console.redhat.com:443 HTTP/1.1 > Host: console.redhat.com:443 > User-Agent: curl/7.85.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection established < * Proxy replied 200 to CONNECT request * CONNECT phase completed * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/pki/tls/certs/ca-bundle.crt * CApath: none * TLSv1.0 (OUT), TLS header, Certificate Status (22): * TLSv1.3 (OUT), TLS handshake, Client hello (1): * TLSv1.2 (IN), TLS header, Certificate Status (22): * TLSv1.3 (IN), TLS handshake, Server hello (2): * TLSv1.2 (IN), TLS header, Finished (20): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Certificate (11): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, CERT verify (15): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Finished (20): * TLSv1.2 (OUT), TLS header, Finished (20): * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.3 (OUT), TLS handshake, Finished (20): * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN: server accepted h2 * Server certificate: * subject: C=US; ST=North Carolina; L=Raleigh; O=Red Hat, Inc.; CN=prod1.redhat.com * start date: Jan 11 00:00:00 2023 GMT * expire date: Nov 7 23:59:59 2023 GMT * subjectAltName: host "console.redhat.com" matched cert's "console.redhat.com" * issuer: C=US; O=DigiCert Inc; CN=DigiCert TLS RSA SHA256 2020 CA1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * h2h3 [:method: GET] * h2h3 [:path: /openshift/cost-management/cost-models] * h2h3 [:scheme: https] * h2h3 [:authority: console.redhat.com] * h2h3 [user-agent: curl/7.85.0] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x5629c9401c00) * TLSv1.2 (OUT), TLS header, Supplemental data (23): > GET /openshift/cost-management/cost-models HTTP/2 > Host: console.redhat.com > user-agent: curl/7.85.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.2 (OUT), TLS header, Supplemental data (23): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.2 (IN), TLS header, Supplemental data (23): < HTTP/2 200 < content-type: text/html; charset=utf-8 < etag: "ry515x19j" < last-modified: Fri, 21 Jul 2023 08:34:45 GMT < server: Caddy < cache-control: private, max-age=469 < date: Mon, 07 Aug 2023 20:59:24 GMT < content-length: 1639 < x-rh-edge-request-id: 2a463d5 < x-rh-edge-reference-id: 0.66f02217.1691441964.2a463d5 < x-rh-edge-cache-status: Hit from child < x-content-type-options: nosniff < x-frame-options: SAMEORIGIN < strict-transport-security: max-age=31536000; includeSubDomains < * TLSv1.2 (IN), TLS header, Supplemental data (23): * Connection #1 to host (nil) left intact