Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Elastic-Agent] Correctly unmarshal Protocol #17843

Merged
merged 1 commit into from
Apr 21, 2020

Conversation

ph
Copy link
Contributor

@ph ph commented Apr 20, 2020

The Protocol (https/http) was not correctly unmarshaly and assigned to
the value of the struct. Because of this the checking was trying to use
a plain text connection or a TLS enabled endpoint.

Fixes: #17841

What does this PR do?

Why is it important?

Checklist

  • My code follows the style guidelines of this project
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have made corresponding change to the default configuration files
  • I have added tests that prove my fix is effective or that my feature works
  • I have added an entry in CHANGELOG.next.asciidoc or CHANGELOG-developer.next.asciidoc.

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Use cases

Screenshots

Logs

The Protocol (https/http) was not correctly unmarshaly and assigned to
the value of the struct. Because of this the checking was trying to use
a plain text connection or a TLS enabled endpoint.

Fixes: elastic#17841
@elasticmachine
Copy link
Collaborator

Pinging @elastic/ingest-management (Team:Ingest Management)

@ph
Copy link
Contributor Author

ph commented Apr 20, 2020

@michalpristas Lets make sure all our test in CI for integration only uses TLS.

@ph ph requested a review from ruflin April 20, 2020 19:45
@ph
Copy link
Contributor Author

ph commented Apr 20, 2020

I can confirm this fixes the issues in cloud.

@@ -23,6 +23,7 @@
- Remove the kbn-version on each request to the Kibana API. {pull}17764[17764]
- Fixed process spawning on Windows {pull}17751[17751]
- Fixed injected log path to monitoring beat {pull}17833[17833]
- Make sure that the Elastic Agent connect over TLS in cloud. {pull}xx[xxx]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ph Can you fix this in a follow up?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🤦 one day we wont need this.

@ruflin ruflin merged commit 0765f94 into elastic:master Apr 21, 2020
@ruflin
Copy link
Contributor

ruflin commented Apr 21, 2020

Merged this already to get it into the build cycle.

@ph ph added the needs_backport PR is waiting to be backported to other branches. label Apr 21, 2020
@ph ph changed the title Correctly unmarshal Protocol [Elatic-Agent] Correctly unmarshal Protocol Apr 21, 2020
@ph ph changed the title [Elatic-Agent] Correctly unmarshal Protocol [Elastic-Agent] Correctly unmarshal Protocol Apr 21, 2020
ph added a commit to ph/beats that referenced this pull request Apr 21, 2020
The Protocol (https/http) was not correctly unmarshaly and assigned to
the value of the struct. Because of this the checking was trying to use
a plain text connection or a TLS enabled endpoint.

Fixes: elastic#17841
(cherry picked from commit 0765f94)
@ph ph added v7.8.0 and removed needs_backport PR is waiting to be backported to other branches. labels Apr 21, 2020
ph added a commit that referenced this pull request Apr 21, 2020
The Protocol (https/http) was not correctly unmarshaly and assigned to
the value of the struct. Because of this the checking was trying to use
a plain text connection or a TLS enabled endpoint.

Fixes: #17841
(cherry picked from commit 0765f94)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Elastic-Agent] Could not reach Kibana Fleet API over cloud
3 participants