Skip to content

Commit 8863983

Browse files
Merge branch '7.9' into backport/7.9/pr-77389
2 parents 8379c5c + 94985ed commit 8863983

File tree

4 files changed

+14
-16
lines changed

4 files changed

+14
-16
lines changed

src/dev/ci_setup/setup.sh

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,12 +16,6 @@ echo " -- TEST_ES_SNAPSHOT_VERSION='$TEST_ES_SNAPSHOT_VERSION'"
1616
echo " -- installing node.js dependencies"
1717
yarn kbn bootstrap --prefer-offline
1818

19-
###
20-
### ensure Chromedriver install hook is triggered
21-
### when modules are up-to-date
22-
###
23-
node node_modules/chromedriver/install.js
24-
2519
###
2620
### Download es snapshots
2721
###

src/dev/ci_setup/setup_env.sh

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -133,13 +133,13 @@ export CYPRESS_DOWNLOAD_MIRROR="https://us-central1-elastic-kibana-184716.cloudf
133133
export CHECKS_REPORTER_ACTIVE=false
134134

135135
# This is mainly for release-manager builds, which run in an environment that doesn't have Chrome installed
136-
# if [[ "$(which google-chrome-stable)" || "$(which google-chrome)" ]]; then
137-
# echo "Chrome detected, setting DETECT_CHROMEDRIVER_VERSION=true"
138-
# export DETECT_CHROMEDRIVER_VERSION=true
139-
# export CHROMEDRIVER_FORCE_DOWNLOAD=true
140-
# else
141-
# echo "Chrome not detected, installing default chromedriver binary for the package version"
142-
# fi
136+
if [[ "$(which google-chrome-stable)" || "$(which google-chrome)" ]]; then
137+
echo "Chrome detected, setting DETECT_CHROMEDRIVER_VERSION=true"
138+
export DETECT_CHROMEDRIVER_VERSION=true
139+
export CHROMEDRIVER_FORCE_DOWNLOAD=true
140+
else
141+
echo "Chrome not detected, installing default chromedriver binary for the package version"
142+
fi
143143

144144
### only run on pr jobs for elastic/kibana, checks-reporter doesn't work for other repos
145145
if [[ "$ghprbPullId" && "$ghprbGhRepository" == 'elastic/kibana' ]] ; then

src/legacy/server/logging/log_interceptor.js

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,11 @@
2020
import Stream from 'stream';
2121
import { get, isEqual } from 'lodash';
2222

23-
const GET_CLIENT_HELLO = /GET_CLIENT_HELLO:http/;
23+
/**
24+
* Matches error messages when clients connect via HTTP instead of HTTPS; see unit test for full message. Warning: this can change when Node
25+
* and its bundled OpenSSL binary are upgraded.
26+
*/
27+
const OPENSSL_GET_RECORD_REGEX = /ssl3_get_record:http/;
2428

2529
function doTagsMatch(event, tags) {
2630
return isEqual(get(event, 'tags'), tags);
@@ -124,7 +128,7 @@ export class LogInterceptor extends Stream.Transform {
124128
}
125129

126130
downgradeIfHTTPWhenHTTPS(event) {
127-
return downgradeIfErrorMessage(GET_CLIENT_HELLO, event);
131+
return downgradeIfErrorMessage(OPENSSL_GET_RECORD_REGEX, event);
128132
}
129133

130134
_transform(event, enc, next) {

src/legacy/server/logging/log_interceptor.test.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ describe('server logging LogInterceptor', () => {
147147
describe('#downgradeIfHTTPWhenHTTPS', () => {
148148
it('transforms http requests when serving https errors', () => {
149149
const message =
150-
'40735139278848:error:1407609C:SSL routines:SSL23_GET_CLIENT_HELLO:http request:../deps/openssl/openssl/ssl/s23_srvr.c:394';
150+
'4584650176:error:1408F09C:SSL routines:ssl3_get_record:http request:../deps/openssl/openssl/ssl/record/ssl3_record.c:322:\n';
151151
const interceptor = new LogInterceptor();
152152
const event = stubClientErrorEvent({ message });
153153
assertDowngraded(interceptor.downgradeIfHTTPWhenHTTPS(event));

0 commit comments

Comments
 (0)