-
-
Notifications
You must be signed in to change notification settings - Fork 288
[JENKINS-75409] SSLContext typo fix and consider it in pingSuccessful method #786
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[JENKINS-75409] SSLContext typo fix and consider it in pingSuccessful method #786
Conversation
|
logged in here |
Does it not accept |
jglick
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Both changes look right.
it is logged in here https://issues.jenkins.io/browse/JENKINS-75005 Also reproducing in test after IAR introduces reproduce diffdiff --git a/src/test/java/org/jvnet/hudson/test/RealJenkinsRuleHttpsTest.java b/src/test/java/org/jvnet/hudson/test/RealJenkinsRuleHttpsTest.java
index 1fe49593..967167e0 100644
--- a/src/test/java/org/jvnet/hudson/test/RealJenkinsRuleHttpsTest.java
+++ b/src/test/java/org/jvnet/hudson/test/RealJenkinsRuleHttpsTest.java
@@ -64,6 +64,17 @@ public class RealJenkinsRuleHttpsTest {
iar.createAgent(rr, options.build());
}
+ @Test
+ public void inboundAgentWithCertByPath() throws Throwable {
+ var pathValue = "@" + getClass().getResource("/https/test-cert.pem").getPath();
+ var options = InboundAgentRule.Options
+ .newBuilder()
+ .name("remote")
+ .webSocket()
+ .cert(pathValue);
+ iar.createAgent(rr, options.build());
+ }
+
private static void log(JenkinsRule r) throws IOException {
LOGGER.info("Running on " + r.getURL().toExternalForm());
}
(END)failure logI will check on that after the IAR PR above is merged. |
|
core IT is passing (link to build) |
|
(CI has failed in git checkout |
|
(ig, I will just do |
|
(The same issue happened again, probably something to do with the network config of the windows controller) - I will re-trigger CI tomorrow. |
timja
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
FTR no, the Windows agents need to git config --add --global http.sslBackend openssl |
See JENKINS-75409
Self signed TLS certificate passing was not working with WebSocket agents.
-cert(also affected TCP agent)passing the
-certis actually a bit tricky need to pass as,-noCertificateCheck(this worked in TCP agent)Only passing the trustStore with the locally created CA was working
-Djavax.net.ssl.trustStore=mytruststore.jks.Testing done
Automated testing in jenkinsci/jenkins#10396
Failure simulated for these tests
tcpWithCertByValue: fails due to sslContext typo
log snippet
webSocketNoCertificateCheck: fails due to pingSuccessful method falling to default java ssl, not the sslContext with certificate check disabled.
log snippet
webSocketWithCertByValue: fails due to sslContext typo and pingSuccessful method not using the sslContext object.
log snippet
core IT is passing after this incremental remoting version is used in there. (link to build test report)
Submitter checklist