[aws] Regenerate expired AWS Config system test certificate#18950
[aws] Regenerate expired AWS Config system test certificate#18950andrewkroh wants to merge 1 commit into
Conversation
TL;DR
Remediation
Investigation detailsRoot CauseThe AWS package’s system-test docker fixture cert is expired in the repository state used by CI:
Given this build ran on Evidence
Verification
Follow-upIf this build used the regenerated cert already, fetch the full Note 🔒 Integrity filter blocked 6 itemsThe following items were blocked because they don't meet the GitHub integrity level.
To allow these resources, lower tools:
github:
min-integrity: approved # merged | approved | unapproved | noneWhat is this? | From workflow: PR Buildkite Detective Give us feedback! React with 🚀 if perfect, 👍 if helpful, 👎 if not. |
The self-signed certificate used by the AWS Config data stream's system test docker service expired on 2026-05-06, causing the system test to fail when the stream container's TLS listener presented an expired cert. Regenerated the cert against the existing private key with the same subject (CN=config.xxxx.amazonaws.com) and a 50-year validity period (now valid through 2076-04-28). Also refreshed the inline CA bundle in test-default-config.yml so the agent trusts the new server cert during the system test. Test-only change; not user-facing, so no changelog entry.
02ad732 to
cbd9aa6
Compare
🚀 Benchmarks reportTo see the full report comment with |
💚 Build Succeeded
History
|
|
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
Proposed commit message
Checklist
changelog.ymlfile. ~ Not applicable —_dev/test fixtures are not shipped to users, so this change is not user-facing. Matches precedent set by ebf0f70.Author's Checklist
private.key(verified viaopenssl rsa -modulus | md5).How to test this PR locally
Or inspect the new cert directly:
Expected:
Related