Skip to content

Conversation

@cameronmeissner
Copy link
Contributor

What type of PR is this?

What this PR does / why we need it:

this will prevent false alarm alerts being fired due to JWT validation failures on the server side

Which issue(s) this PR fixes:

Fixes #

Requirements:

  • uses conventional commit messages
  • includes documentation
  • adds unit tests
  • tested upgrade from previous version
  • commits are GPG signed and Github marks them as verified

Special notes for your reviewer:

Release note:

none

…esource in scenario Flatcar_SecureTLSBootstrapping_BootstrapToken_Fallback
@cameronmeissner cameronmeissner changed the title fix(e2e): use invalid UserAssignedIdentityID insteead of invalid AADResource in scenario Flatcar_SecureTLSBootstrapping_BootstrapToken_Fallback fix(e2e): use invalid UserAssignedIdentityID instead of invalid AADResource in scenario Flatcar_SecureTLSBootstrapping_BootstrapToken_Fallback Dec 4, 2025
@awesomenix awesomenix merged commit a2f5288 into main Dec 4, 2025
20 of 21 checks passed
@awesomenix awesomenix deleted the cameissner/stls/fix-flatcar-e2e-fallback branch December 4, 2025 21:56
cameronmeissner added a commit that referenced this pull request Dec 4, 2025
…source in scenario Flatcar_SecureTLSBootstrapping_BootstrapToken_Fallback (#7493)
AADResource: "https://management.azure.com/", // use an unexpected AAD resource to force a secure TLS bootstrapping failure
Enabled: true,
Deadline: (10 * time.Second).String(),
UserAssignedIdentityID: "invalid", // use an unexpected user-assigned identity ID to force a secure TLS bootstrapping failure
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Invalid-for-e2e. Could give hints for those you look t this error in the future

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants