mirror of
https://github.com/elastic/kibana.git
synced 2025-04-23 17:28:26 -04:00
# Backport This will backport the following commits from `main` to `7.17`: - [Fix broken test by updating test certs (#148733)](https://github.com/elastic/kibana/pull/148733) <!--- Backport version: 8.9.7 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Thomas Watson","email":"watson@elastic.co"},"sourceCommit":{"committedDate":"2023-01-11T17:12:44Z","message":"Fix broken test by updating test certs (#148733)","sha":"afbdfa51127ee0f274ff69acb7995d3b6c57526a","branchLabelMapping":{"^v8.7.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v8.7.0","v8.6.1","v8.5.4","v7.17.9"],"number":148733,"url":"https://github.com/elastic/kibana/pull/148733","mergeCommit":{"message":"Fix broken test by updating test certs (#148733)","sha":"afbdfa51127ee0f274ff69acb7995d3b6c57526a"}},"sourceBranch":"main","suggestedTargetBranches":["8.6","8.5","7.17"],"targetPullRequestStates":[{"branch":"main","label":"v8.7.0","labelRegex":"^v8.7.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/148733","number":148733,"mergeCommit":{"message":"Fix broken test by updating test certs (#148733)","sha":"afbdfa51127ee0f274ff69acb7995d3b6c57526a"}},{"branch":"8.6","label":"v8.6.1","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.5","label":"v8.5.4","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"7.17","label":"v7.17.9","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Thomas Watson <watson@elastic.co>
This commit is contained in:
parent
c3cd9e6b04
commit
336bdb6675
4 changed files with 75 additions and 76 deletions
Binary file not shown.
|
@ -5,75 +5,75 @@ Certificate:
|
|||
Signature Algorithm: sha256WithRSAEncryption
|
||||
Issuer: CN=Test Root CA
|
||||
Validity
|
||||
Not Before: Jan 9 15:50:00 2020 GMT
|
||||
Not After : Dec 27 15:50:00 2069 GMT
|
||||
Not Before: Jan 11 15:02:45 2023 GMT
|
||||
Not After : Dec 29 15:02:45 2072 GMT
|
||||
Subject: CN=Test Intermediate CA
|
||||
Subject Public Key Info:
|
||||
Public Key Algorithm: rsaEncryption
|
||||
Public-Key: (2048 bit)
|
||||
RSA Public-Key: (2048 bit)
|
||||
Modulus:
|
||||
00:ba:bb:d5:d7:5a:0a:b0:95:43:63:73:bc:1f:3f:
|
||||
a4:71:3c:3f:69:96:8c:5d:e1:5b:82:95:2c:d1:b3:
|
||||
3b:7a:5c:f0:54:c9:d2:be:37:c7:81:ce:db:90:fa:
|
||||
c0:0c:e8:b7:e5:51:18:29:0b:47:89:0f:b1:e3:7f:
|
||||
06:f0:fe:f6:a7:e8:42:36:58:4b:c7:04:81:48:5b:
|
||||
20:11:be:95:6b:bd:8c:0b:1b:21:2d:26:47:0b:c5:
|
||||
98:59:d7:a2:35:09:4f:1a:eb:74:d4:bc:fd:df:41:
|
||||
45:5d:fd:a6:0e:dd:02:7e:52:a4:21:9d:ac:c7:0e:
|
||||
73:50:2d:7b:6e:30:05:20:a2:ee:60:fa:0e:80:7d:
|
||||
d0:0c:fd:24:ae:ef:96:70:7e:a3:bc:87:e4:fc:50:
|
||||
43:a7:a6:ef:dc:0d:7d:9e:02:73:3d:6b:b1:b3:e9:
|
||||
d5:98:42:2b:ed:63:c1:a2:bb:49:19:a4:5b:d6:6e:
|
||||
33:54:44:19:f3:51:db:a4:ea:92:67:13:5e:80:bf:
|
||||
6d:1f:59:e4:f0:8c:93:10:38:54:37:8f:a6:4a:42:
|
||||
56:5f:db:d6:d5:2c:12:58:4c:42:aa:2c:19:8c:f7:
|
||||
30:51:b2:2c:29:c1:6b:29:73:bc:c6:45:63:41:90:
|
||||
80:0a:84:d5:02:0c:9c:67:cf:73:4e:62:40:51:ee:
|
||||
67:03
|
||||
00:8e:2a:7d:75:9d:f6:b0:d1:87:bb:33:f9:52:ee:
|
||||
9f:d4:fe:c1:1f:d4:c1:ef:5c:36:7f:15:27:0b:9b:
|
||||
d9:4e:c9:6a:31:6c:5c:79:39:db:40:8c:58:7d:cb:
|
||||
b2:91:78:5c:1e:9d:b8:20:5a:28:b1:85:b3:c5:d6:
|
||||
8f:0d:40:db:8f:9e:f5:15:2b:82:d0:7f:bf:99:3a:
|
||||
86:7d:83:ce:53:9e:04:ba:15:69:f5:d0:a7:22:36:
|
||||
72:db:4e:b4:9c:2d:8f:0c:5f:46:c4:75:14:c0:82:
|
||||
24:b5:2b:94:c5:b2:59:25:c0:19:28:90:be:73:f1:
|
||||
7c:d3:8c:c9:49:89:fb:15:19:b8:7f:5c:02:65:6e:
|
||||
93:a5:b8:56:3b:33:1b:0c:23:7a:f0:ba:a4:07:c5:
|
||||
54:9f:c8:f3:19:d3:94:07:6c:a3:c1:04:40:49:5c:
|
||||
4c:4f:26:e4:5b:d7:08:4b:64:d2:a9:ff:cc:b5:99:
|
||||
8a:b8:c0:66:a7:30:d4:29:28:d2:d6:25:0d:fa:61:
|
||||
cd:e2:ec:03:29:e5:fa:a5:21:7e:65:48:8a:47:27:
|
||||
20:15:3e:a6:09:90:7a:4d:79:8f:c5:88:f0:a3:40:
|
||||
3f:fc:ce:f7:ef:25:4b:be:d4:51:15:1d:13:d9:1b:
|
||||
a5:71:82:01:2e:54:d4:c0:98:79:9c:74:02:79:a3:
|
||||
bd:43
|
||||
Exponent: 65537 (0x10001)
|
||||
X509v3 extensions:
|
||||
X509v3 Subject Key Identifier:
|
||||
B4:48:6A:C8:21:77:A5:03:CF:48:C4:62:74:26:03:3F:BC:88:8C:92
|
||||
47:A3:6D:34:23:13:C6:4E:62:BA:48:0B:23:75:08:7E:B8:F2:D0:97
|
||||
X509v3 Authority Key Identifier:
|
||||
keyid:03:9B:FF:88:CA:33:A2:71:C5:31:51:A6:DA:15:EF:44:C2:CB:D3:9F
|
||||
keyid:DE:52:F2:C0:B2:99:22:C2:CE:93:B6:F9:07:9C:87:45:4F:C0:69:E8
|
||||
DirName:/CN=Test Root CA
|
||||
serial:78:77:49:60:3B:E7:73:18:06:75:45:A7:8E:8E:B4:4E:E4:9A:E3:B0
|
||||
serial:A1:4C:C1:A1:D9:F6:FE:83:07:F7:97:6D:1C:D4:8C:B1:1B:63:0D:D6
|
||||
|
||||
X509v3 Basic Constraints:
|
||||
CA:TRUE
|
||||
Signature Algorithm: sha256WithRSAEncryption
|
||||
a3:10:97:ab:dd:43:8a:5b:c7:a6:b9:33:92:7b:61:fb:f0:3f:
|
||||
54:05:50:46:9e:62:11:d3:60:59:77:93:53:48:0b:c9:cf:bc:
|
||||
c0:3c:b4:47:f4:f6:66:2c:86:76:38:3b:5d:13:77:41:ce:d7:
|
||||
16:ca:5e:29:33:1f:a7:ea:82:e4:0c:ad:f8:50:1d:54:cd:28:
|
||||
a9:22:59:a8:e1:3f:05:b8:fb:5e:54:72:58:fa:a1:3e:f8:99:
|
||||
bf:d6:50:99:8b:12:52:37:41:be:5f:c9:7d:04:46:8b:fd:8f:
|
||||
7f:64:a1:0d:b8:2b:ca:e9:4a:54:e2:bb:8b:39:b7:87:6f:8b:
|
||||
17:46:b4:5d:16:aa:75:5c:fb:33:29:52:51:24:7b:f2:d9:b3:
|
||||
9b:99:bf:08:6c:2c:43:8a:74:63:c1:32:ed:6b:4a:53:88:51:
|
||||
c2:10:dd:92:f2:6f:af:65:f1:08:5a:cc:a6:2b:54:95:2b:2a:
|
||||
a1:90:f2:eb:08:91:26:18:44:b7:49:11:09:c1:1c:aa:2d:b2:
|
||||
d6:56:02:34:7a:97:fb:60:c5:1e:66:84:c0:40:6f:26:52:77:
|
||||
85:a3:ab:d5:8e:f0:d0:d0:2e:e0:6f:8a:de:72:e0:ee:96:e5:
|
||||
5d:4a:e9:c1:4c:c6:45:c7:36:6b:7a:1a:a6:64:71:9b:7c:7e:
|
||||
59:93:bd:b6
|
||||
1b:d9:a2:a1:4c:25:a1:57:1f:98:36:e9:61:e8:19:33:12:49:
|
||||
d8:8c:96:07:45:10:f7:82:6a:1c:fc:69:3d:0b:84:6f:8e:13:
|
||||
db:3e:5c:fd:ec:a3:64:2d:26:49:2e:02:0a:5e:55:b5:d5:a4:
|
||||
cf:02:11:59:22:d9:f8:75:5d:42:31:17:62:c7:3f:b7:da:40:
|
||||
a7:a3:9f:99:8a:b2:59:6b:f8:2c:ef:7d:b8:c3:fc:90:48:7e:
|
||||
cf:67:9a:b2:d5:de:f4:73:06:69:23:0b:7e:06:20:dc:70:b1:
|
||||
ce:97:9b:f6:5f:99:18:73:b6:b3:94:7f:9b:2d:2f:a7:a3:b0:
|
||||
2d:a2:05:1f:9a:b4:81:22:e2:e9:23:31:09:61:08:2f:90:d8:
|
||||
9f:ba:a6:1e:2d:8a:ed:2a:db:a6:7e:f6:75:50:1f:ff:6b:99:
|
||||
88:7d:b0:c4:8c:c1:d6:58:26:5b:a0:1a:c8:75:a2:99:9d:c1:
|
||||
66:5d:60:9f:3a:e3:ab:40:d9:d2:10:2c:94:70:b6:13:be:bb:
|
||||
00:33:24:c8:0e:fc:0d:36:06:71:d6:51:99:81:16:63:38:47:
|
||||
53:48:69:0f:2c:68:f3:ac:e5:57:5c:bb:92:8e:fe:46:dc:db:
|
||||
f2:7c:91:e4:c5:68:a3:a2:f0:ba:70:fb:d8:a2:25:49:13:3c:
|
||||
18:4d:a1:62
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDODCCAiCgAwIBAgIBATANBgkqhkiG9w0BAQsFADAXMRUwEwYDVQQDEwxUZXN0
|
||||
IFJvb3QgQ0EwIBcNMjAwMTA5MTU1MDAwWhgPMjA2OTEyMjcxNTUwMDBaMB8xHTAb
|
||||
MIIDOTCCAiGgAwIBAgIBATANBgkqhkiG9w0BAQsFADAXMRUwEwYDVQQDEwxUZXN0
|
||||
IFJvb3QgQ0EwIBcNMjMwMTExMTUwMjQ1WhgPMjA3MjEyMjkxNTAyNDVaMB8xHTAb
|
||||
BgNVBAMTFFRlc3QgSW50ZXJtZWRpYXRlIENBMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
||||
AQ8AMIIBCgKCAQEAurvV11oKsJVDY3O8Hz+kcTw/aZaMXeFbgpUs0bM7elzwVMnS
|
||||
vjfHgc7bkPrADOi35VEYKQtHiQ+x438G8P72p+hCNlhLxwSBSFsgEb6Va72MCxsh
|
||||
LSZHC8WYWdeiNQlPGut01Lz930FFXf2mDt0CflKkIZ2sxw5zUC17bjAFIKLuYPoO
|
||||
gH3QDP0kru+WcH6jvIfk/FBDp6bv3A19ngJzPWuxs+nVmEIr7WPBortJGaRb1m4z
|
||||
VEQZ81HbpOqSZxNegL9tH1nk8IyTEDhUN4+mSkJWX9vW1SwSWExCqiwZjPcwUbIs
|
||||
KcFrKXO8xkVjQZCACoTVAgycZ89zTmJAUe5nAwIDAQABo4GEMIGBMB0GA1UdDgQW
|
||||
BBS0SGrIIXelA89IxGJ0JgM/vIiMkjBSBgNVHSMESzBJgBQDm/+IyjOiccUxUaba
|
||||
Fe9EwsvTn6EbpBkwFzEVMBMGA1UEAxMMVGVzdCBSb290IENBghR4d0lgO+dzGAZ1
|
||||
RaeOjrRO5JrjsDAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCjEJer
|
||||
3UOKW8emuTOSe2H78D9UBVBGnmIR02BZd5NTSAvJz7zAPLRH9PZmLIZ2ODtdE3dB
|
||||
ztcWyl4pMx+n6oLkDK34UB1UzSipIlmo4T8FuPteVHJY+qE++Jm/1lCZixJSN0G+
|
||||
X8l9BEaL/Y9/ZKENuCvK6UpU4ruLObeHb4sXRrRdFqp1XPszKVJRJHvy2bObmb8I
|
||||
bCxDinRjwTLta0pTiFHCEN2S8m+vZfEIWsymK1SVKyqhkPLrCJEmGES3SREJwRyq
|
||||
LbLWVgI0epf7YMUeZoTAQG8mUneFo6vVjvDQ0C7gb4recuDuluVdSunBTMZFxzZr
|
||||
ehqmZHGbfH5Zk722
|
||||
AQ8AMIIBCgKCAQEAjip9dZ32sNGHuzP5Uu6f1P7BH9TB71w2fxUnC5vZTslqMWxc
|
||||
eTnbQIxYfcuykXhcHp24IFoosYWzxdaPDUDbj571FSuC0H+/mTqGfYPOU54EuhVp
|
||||
9dCnIjZy2060nC2PDF9GxHUUwIIktSuUxbJZJcAZKJC+c/F804zJSYn7FRm4f1wC
|
||||
ZW6TpbhWOzMbDCN68LqkB8VUn8jzGdOUB2yjwQRASVxMTybkW9cIS2TSqf/MtZmK
|
||||
uMBmpzDUKSjS1iUN+mHN4uwDKeX6pSF+ZUiKRycgFT6mCZB6TXmPxYjwo0A//M73
|
||||
7yVLvtRRFR0T2RulcYIBLlTUwJh5nHQCeaO9QwIDAQABo4GFMIGCMB0GA1UdDgQW
|
||||
BBRHo200IxPGTmK6SAsjdQh+uPLQlzBTBgNVHSMETDBKgBTeUvLAspkiws6TtvkH
|
||||
nIdFT8Bp6KEbpBkwFzEVMBMGA1UEAxMMVGVzdCBSb290IENBghUAoUzBodn2/oMH
|
||||
95dtHNSMsRtjDdYwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAG9mi
|
||||
oUwloVcfmDbpYegZMxJJ2IyWB0UQ94JqHPxpPQuEb44T2z5c/eyjZC0mSS4CCl5V
|
||||
tdWkzwIRWSLZ+HVdQjEXYsc/t9pAp6OfmYqyWWv4LO99uMP8kEh+z2eastXe9HMG
|
||||
aSMLfgYg3HCxzpeb9l+ZGHO2s5R/my0vp6OwLaIFH5q0gSLi6SMxCWEIL5DYn7qm
|
||||
Hi2K7Srbpn72dVAf/2uZiH2wxIzB1lgmW6AayHWimZ3BZl1gnzrjq0DZ0hAslHC2
|
||||
E767ADMkyA78DTYGcdZRmYEWYzhHU0hpDyxo86zlV1y7ko7+Rtzb8nyR5MVoo6Lw
|
||||
unD72KIlSRM8GE2hYg==
|
||||
-----END CERTIFICATE-----
|
||||
|
|
|
@ -1,24 +1,24 @@
|
|||
Bag Attributes
|
||||
friendlyName: ca
|
||||
localKeyID: 54 69 6D 65 20 31 35 37 38 35 38 34 39 34 35 33 30 37
|
||||
localKeyID: 54 69 6D 65 20 31 36 37 33 34 34 39 31 31 30 31 33 33
|
||||
subject=/CN=Test Root CA
|
||||
issuer=/CN=Test Root CA
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDETCCAfmgAwIBAgIUeHdJYDvncxgGdUWnjo60TuSa47AwDQYJKoZIhvcNAQEL
|
||||
BQAwFzEVMBMGA1UEAxMMVGVzdCBSb290IENBMCAXDTIwMDEwOTE1NDkwNVoYDzIw
|
||||
NjkxMjI3MTU0OTA1WjAXMRUwEwYDVQQDEwxUZXN0IFJvb3QgQ0EwggEiMA0GCSqG
|
||||
SIb3DQEBAQUAA4IBDwAwggEKAoIBAQC2G9Bmax5yFvdWEMleXcFK7G0ir04/sd4v
|
||||
pRuqYhg+LhxlDOnd7HFtSsI2GGZaBktpL4eWOA8sAZ+eL89P3JV5WFDAuvlK8RZt
|
||||
ECnPzl7Yar3nhPjNO5F1xbyHCPNSiQVYx7avkLJu3sv/okA65ON+BHYijbNNwS0/
|
||||
YtZYZWF7qR6rygXiLHcCIwWwZntBAKHGsBzxZv+28xRMUGsYWHq1PI25CRfDuVub
|
||||
jC3LpAiJUTkrN5cE8Mpy6R9EH3c/qCk1I2daUKJVJhIzrUrsyNYwpCpbtrE605lK
|
||||
qsRVkxoAK5i3zZRqiQ/m4FEmr0rTmbLJw09u+jIzfye2ivNiC7PZAgMBAAGjUzBR
|
||||
MB0GA1UdDgQWBBQDm/+IyjOiccUxUabaFe9EwsvTnzAfBgNVHSMEGDAWgBQDm/+I
|
||||
yjOiccUxUabaFe9EwsvTnzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUA
|
||||
A4IBAQBclwdYhVNp3I4gTzxl0kbjya28auokp1+NUhAJ++eGGeTySEzbggHWkSSw
|
||||
jXhzbwri1T+80smvj4XkbSvLzPurSxT1if4kmUDh+XApx/pQb/2l88lRdLqBCcSn
|
||||
UxrdeDGPGMAYsxH/+/s2rMoaagBb4n8dayBesqIa+Nt+Mf8cqfM30pRGqk5HtoI/
|
||||
ZUZDOQ7JJc3mg1usjA3mtgsUQ88zAH9C3fMpf/I3sr2UQqaXYZlzmh3r5U9yNYyw
|
||||
SV0NnaDd3BVJ4qOumTjlYalRJFDrvn+aNkyPN6XiwxA1qd/uVW5mIJhkoxPYWkG4
|
||||
M1b0sea/9IVucYYyXI+GyFNI7B5N
|
||||
MIIDEjCCAfqgAwIBAgIVAKFMwaHZ9v6DB/eXbRzUjLEbYw3WMA0GCSqGSIb3DQEB
|
||||
CwUAMBcxFTATBgNVBAMTDFRlc3QgUm9vdCBDQTAgFw0yMzAxMTExNDU4MzBaGA8y
|
||||
MDcyMTIyOTE0NTgzMFowFzEVMBMGA1UEAxMMVGVzdCBSb290IENBMIIBIjANBgkq
|
||||
hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2LBEaZX4ym+/Q0ibZAst2sFMdv3kuxwH
|
||||
TjYudmbae36GTGKXdMMBYzhnMTJdmoMALt+ItpJ4ATD1HgMtlcV+7/Z1xZai0Kk1
|
||||
6OgweYruR4NxDhx/rUI9XAkNtW+Nz0BTcB5PkD5eDdcEWEHyt086CfGEN+hOIqIK
|
||||
dftWwLHnSnqcv9D1c+QN1dQTdwsnQoJ2LHtcTQSAoCmDb1f9oAMYdKp6xjCKE/bv
|
||||
YaXZkFXsh6GR3HM/o9P0v0CLe+C8SeJbxFztg6Qfs4t4Hsn9fXqyhRgOdq9WSnoF
|
||||
/dNwUQKWWgWXvcoMyY3ORk8bDAR277bfUTnzARzqlxZspAPvFOdKqwIDAQABo1Mw
|
||||
UTAdBgNVHQ4EFgQU3lLywLKZIsLOk7b5B5yHRU/AaegwHwYDVR0jBBgwFoAU3lLy
|
||||
wLKZIsLOk7b5B5yHRU/AaegwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsF
|
||||
AAOCAQEASfiIJ8v8nsoi6PCKF8BhFFWhZn/VpPHY12FyFBh+s9oVe5Ll4q94AmVz
|
||||
W8IgUjyFrCYV4WH9g0gS5DXxuU3tVShXMU8MTKMu2eaRJevJ21ZWNG/h6ZSi7Cm7
|
||||
kWnUdUPLhhajW1apWFaRwLnwxs3iCShP32/4ON7eNC4JCeksqhXUU4iKVLvSTL7M
|
||||
vrh5sc/AQ8faQL+3F7x574zzgOOjUEoIG4v12n/v2xZCAyQV73upReaYQZ3n/Div
|
||||
RLznyIRQE29mS+U5yT31Xy/3MF1LSoyKSjdwEpdvXysw5fuHfHoUvDbTqatQyT+G
|
||||
82UxYdf7Eqg3xZY62G+7QZsfHjtT5g==
|
||||
-----END CERTIFICATE-----
|
||||
|
|
|
@ -9,8 +9,7 @@
|
|||
export default function ({ getService }) {
|
||||
const supertest = getService('supertest');
|
||||
|
||||
// FLAKY: https://github.com/elastic/kibana/issues/148515
|
||||
describe.skip('kibana server with ssl', () => {
|
||||
describe('kibana server with ssl', () => {
|
||||
it('handles requests using ssl with a P12 keystore that uses an intermediate CA', async () => {
|
||||
await supertest.get('/').expect(302);
|
||||
});
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue