Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix expired certificates #24688

Merged
merged 2 commits into from
May 12, 2022
Merged

Fix expired certificates #24688

merged 2 commits into from
May 12, 2022

Conversation

geoand
Copy link
Contributor

@geoand geoand commented Apr 1, 2022

This was done by running: integration-tests/rest-client/generate-trust-store-for-bad-ssl.sh

@quarkus-bot

This comment has been minimized.

@geoand geoand force-pushed the expired-certificates branch from 7a2f8c8 to 7eaaaad Compare April 1, 2022 08:10
@quarkus-bot

This comment has been minimized.

@gsmet
Copy link
Member

gsmet commented Apr 1, 2022

@cescoffier @sberyozkin didn't you guys have something to generate a certificate at build time somewhere?

@cescoffier
Copy link
Member

During Quarkus build time? That would be very weird.

During a maven phase, I don't have anything but that could be useful.

@gsmet
Copy link
Member

gsmet commented Apr 1, 2022

Yeah I was thinking of Maven. I thought we had something.

@gsmet
Copy link
Member

gsmet commented Apr 1, 2022

@geoand do you mind just disabling the tests and we will let @michalszynkiewicz deal with it?

@geoand
Copy link
Contributor Author

geoand commented Apr 1, 2022

#24692

@geoand geoand closed this Apr 1, 2022
@quarkus-bot quarkus-bot bot added the triage/invalid This doesn't seem right label Apr 1, 2022
@michalszynkiewicz
Copy link
Member

hmm... at least some of these tests use badssl.com which seems to be down

@michalszynkiewicz
Copy link
Member

I'm not the author of the tests but will try to replace badssl.com with something that is set up during the tests

@michalszynkiewicz
Copy link
Member

Actually it is not resolvable, not down.

@michalszynkiewicz
Copy link
Member

chromium/badssl.com#500 - someone is apparently working on it

@michalszynkiewicz
Copy link
Member

@geoand maybe we could reopen this PR retry it when the DNS for badssl is resolved?

@geoand
Copy link
Contributor Author

geoand commented Apr 1, 2022

Sure yeah

@quarkus-bot quarkus-bot bot removed the triage/invalid This doesn't seem right label Apr 1, 2022
@quarkus-bot

This comment has been minimized.

@gsmet
Copy link
Member

gsmet commented Apr 1, 2022

Our tests shouldn't depend on an external service that we don't manage.

@geoand geoand force-pushed the expired-certificates branch from 7eaaaad to 3bc0856 Compare April 12, 2022 06:48
@gsmet
Copy link
Member

gsmet commented May 9, 2022

@geoand shouldn't we also revert #24692 ?

@geoand
Copy link
Contributor Author

geoand commented May 9, 2022

Oh, those are still disabled?

Then yes, I'll do that Done

@geoand geoand force-pushed the expired-certificates branch from 3bc0856 to 552b585 Compare May 9, 2022 09:49
@geoand
Copy link
Contributor Author

geoand commented May 12, 2022

CI is passing, should we get this in?

@gsmet gsmet merged commit 2205bb9 into quarkusio:main May 12, 2022
@quarkus-bot quarkus-bot bot added this to the 2.10 - main milestone May 12, 2022
@gsmet
Copy link
Member

gsmet commented May 12, 2022

Merged. If the new certificates can expire again, we should probably document how to generate them.

@geoand
Copy link
Contributor Author

geoand commented May 12, 2022

Yes, indeed

@geoand geoand deleted the expired-certificates branch May 12, 2022 07:02
@gsmet
Copy link
Member

gsmet commented May 12, 2022

Adding the instructions in the description of the PR is enough IMHO. We will find them easily.

@geoand
Copy link
Contributor Author

geoand commented May 12, 2022

Done :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants