This is an automated email from the ASF dual-hosted git repository.

jamesnetherton pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-quarkus.git


The following commit(s) were added to refs/heads/main by this push:
     new 1be69a4c0c Remove Azure test certificate
1be69a4c0c is described below

commit 1be69a4c0c3a2629a0999638299d29e7324ff436
Author: James Netherton <[email protected]>
AuthorDate: Mon Jul 7 17:06:00 2025 +0100

    Remove Azure test certificate
---
 integration-test-groups/azure/.gitignore           |  1 +
 integration-test-groups/azure/README.adoc          |  5 +-
 integration-test-groups/azure/azure-resources.sh   |  6 ++-
 integration-test-groups/azure/certs/azure-cert.pem | 54 ----------------------
 4 files changed, 9 insertions(+), 57 deletions(-)

diff --git a/integration-test-groups/azure/.gitignore 
b/integration-test-groups/azure/.gitignore
new file mode 100644
index 0000000000..b2290143a4
--- /dev/null
+++ b/integration-test-groups/azure/.gitignore
@@ -0,0 +1 @@
+certs
diff --git a/integration-test-groups/azure/README.adoc 
b/integration-test-groups/azure/README.adoc
index ba208554be..bbf42c3053 100644
--- a/integration-test-groups/azure/README.adoc
+++ b/integration-test-groups/azure/README.adoc
@@ -68,12 +68,13 @@ You may want to `export 
CAMEL_QUARKUS_START_MOCK_BACKEND=false` to avoid startin
 
 You may want to disable identity tests except key-vault (which is mandatory)  
`export CAMEL_QUARKUS_DISABLE_IDENTITY_EXCEPT_KEY_VAULT=true` to avoid starting 
test using identity with other extension then key-vault. This option might be 
helpful in case of testing with client without permissions for eventhubs.
 
-==== Regenerating client certificates
+==== Generating client certificates
 
-For convenience, a certificate is stored in this project to be used for client 
certificate authentication. It can be regenerated as follows.
+To generate a certificate pair for testing client certificate authentication. 
It can be generated as follows.
 
 [source,shell]
 ----
+mkdir ${PWD}/certs
 openssl req -nodes -new -x509 -sha256 -days 1825 -out /tmp/azure-cert.pem 
-keyout /tmp/azure-cert-key.pem
 cat /tmp/azure-cert.pem /tmp/azure-cert-key.pem > ${PWD}/certs/azure-cert.pem
 ----
diff --git a/integration-test-groups/azure/azure-resources.sh 
b/integration-test-groups/azure/azure-resources.sh
index 716c179be9..f89f2e6b1f 100755
--- a/integration-test-groups/azure/azure-resources.sh
+++ b/integration-test-groups/azure/azure-resources.sh
@@ -63,7 +63,11 @@ function createResources() {
     export AZURE_TENANT_ID=$(grep tenant  ${AZURE_APP_CREDENTIALS} | cut -f4 
-d\" )
     rm -f ${AZURE_APP_CREDENTIALS}
 
-    az ad app credential reset --id ${AZURE_CLIENT_ID} --cert 
"@${AZURE_APP_CERT_PATH}" --append
+    if [[ -f ${AZURE_APP_CERT_PATH} ]]; then
+      az ad app credential reset --id ${AZURE_CLIENT_ID} --cert 
"@${AZURE_APP_CERT_PATH}" --append
+    else
+      echo "Not setting app credentials as ${AZURE_APP_CERT_PATH} does not 
exist"
+    fi
 
     SUBSCRIPTION_ID="$(az account list --query '[0].id' -o tsv)"
     USER_ID="$(az ad signed-in-user show --query objectId -o tsv)"
diff --git a/integration-test-groups/azure/certs/azure-cert.pem 
b/integration-test-groups/azure/certs/azure-cert.pem
deleted file mode 100644
index 1d5ba8261a..0000000000
--- a/integration-test-groups/azure/certs/azure-cert.pem
+++ /dev/null
@@ -1,54 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIEUTCCAzmgAwIBAgIUdmqSX4JJGabAaZ7KRAKRLqRphWswDQYJKoZIhvcNAQEL
-BQAwgbcxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApTb21lLVN0YXRlMRIwEAYDVQQH
-DAlUZXN0IENpdHkxJDAiBgNVBAoMG0NhbWVsIFF1YXJrdXMgQXp1cmUgVGVzdGlu
-ZzEkMCIGA1UECwwbQ2FtZWwgUXVhcmt1cyBBenVyZSBUZXN0aW5nMRIwEAYDVQQD
-DAlsb2NhbGhvc3QxHzAdBgkqhkiG9w0BCQEWEGNhbWVsQGFwYWNoZS5vcmcwHhcN
-MjIwODAxMDgzMTMwWhcNMjcwNzMxMDgzMTMwWjCBtzELMAkGA1UEBhMCVVMxEzAR
-BgNVBAgMClNvbWUtU3RhdGUxEjAQBgNVBAcMCVRlc3QgQ2l0eTEkMCIGA1UECgwb
-Q2FtZWwgUXVhcmt1cyBBenVyZSBUZXN0aW5nMSQwIgYDVQQLDBtDYW1lbCBRdWFy
-a3VzIEF6dXJlIFRlc3RpbmcxEjAQBgNVBAMMCWxvY2FsaG9zdDEfMB0GCSqGSIb3
-DQEJARYQY2FtZWxAYXBhY2hlLm9yZzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC
-AQoCggEBALV4k8KkQ9g1jG3cimE11r6/kNkGQ5uG7EtGMMYB0k2T+JftlHFM59id
-R/lBIUelRmKacLmYymJdGLXgz5B1shBQHtIaN2PPSi3qp6vc+1S0Xz9bIF2My1aF
-hevfrg21+WUernAIrDdBSiI5/7BZOsEiq4suWBSGRiay1Mq/mHN6IdW07KjJNvIy
-V2Kx4qBU2wz3IzsB+xiCbgJSEUCJE787M6HJctBWqIOX2o4ZTBfxn2AUiSALmXwy
-3rsg2YA3tPTFIQRr66QYHJcwvQeXyZZyIi0l40MUYigwfEBLV93fdzzix/QOOz2R
-IPmGsXaSRjS6teVd02Qd3ohXm9CTnSMCAwEAAaNTMFEwHQYDVR0OBBYEFIxzv9Sk
-Ge8mm0NHmLGuAzZ82xhXMB8GA1UdIwQYMBaAFIxzv9SkGe8mm0NHmLGuAzZ82xhX
-MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAGiMRb4wgsCh0v2Z
-YNW1RpZ/Bl+ER7ZkLwc5xMNFWklAjCrTI6tTXUvP462bItYrWqlxd2e6fUvNgcnb
-JJUsNaYmTYxAFhUVdXkXjIXsg4+av6JIB8/2AdMQiSxekqqi8AEfElFgONWoj8w4
-TbXwMYZWan6Bj/sN4lGIHvo6zhuLH4g4HbyKffXdRe83k+082WLby/3raAa/Sy2t
-S86BYWqdu+E59PuUEU/3rY1T4wSCZXjS4DAFfYcUmXI6gDgpCi3lb8GHKX9YvZCT
-3e4IQMZaXDIA1lyYLULvrGi+NP3tpWV+b3G/Hk6xmophoMsRd5NVOh7pR8ZDYYiL
-IScC1sY=
------END CERTIFICATE-----
------BEGIN PRIVATE KEY-----
-MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC1eJPCpEPYNYxt
-3IphNda+v5DZBkObhuxLRjDGAdJNk/iX7ZRxTOfYnUf5QSFHpUZimnC5mMpiXRi1
-4M+QdbIQUB7SGjdjz0ot6qer3PtUtF8/WyBdjMtWhYXr364NtfllHq5wCKw3QUoi
-Of+wWTrBIquLLlgUhkYmstTKv5hzeiHVtOyoyTbyMldiseKgVNsM9yM7AfsYgm4C
-UhFAiRO/OzOhyXLQVqiDl9qOGUwX8Z9gFIkgC5l8Mt67INmAN7T0xSEEa+ukGByX
-ML0Hl8mWciItJeNDFGIoMHxAS1fd33c84sf0Djs9kSD5hrF2kkY0urXlXdNkHd6I
-V5vQk50jAgMBAAECggEAFXIffDQvdGC3rNAQZnaXX0mCU7OCz+F9EVRFNVFHyjU/
-fqzsCwu8poPH2rQQu8fTbpmz0qs017UK04uy2+6c0YK2cbv5ack4if6ePBhMd3Et
-hG4/f+7ApQP4lKyFhEdKJuIeWU0dFRaZLTxPdEbHQ8XWIgejDyHjLnWZ4jAMUzEb
-mOXeyXipfk6KkbVSWrXWS37jv3/6D6vXmVxWms7I2HggRVpIetuvxhoHo33MjohT
-MuR26FUWBQizouXmSQV4OGocHVtnr/mdktAh6QC00Pen3Gpi7xQHgXmVOVET0Qt6
-fZSdaYm9EmrU2EgTcjKwI80O/2SUapfXXtmmmu+z+QKBgQDtlhX+fuTReCGh+70b
-OTYiPOuVHhtgwazvg5Pmj7WiM/AeeyRuHYwKx4nFOgiVasaUqwEawDwdZzJCaphm
-4EfRvKqlbehN/kSk7Gq50+LjmISRPTzl8XzF0kuSWf6EHQKaEy1j+cckCuQks0U5
-U2F7zdiBNoaqkfvIpVVOo4K49wKBgQDDiR3VXLa3rp6Lrig9xEI4pybZbdutOXPY
-S4MI+KN2EGaobAF5icQ3RoXgyfxqxkJ8Vp6xSAuQgVQEBFOnth/GM7JHxw17GB2F
-u9a/LFkuQgC1uTLA6hpJBhmT9q9KFMaq0gOP//2xBjBU66AcVq8C11vAHwFXlgAK
-oCyHZaS+NQKBgQDQu62zG/UYe3zA/ZSVGFyRFAi9x+exyDaRb34/cD7ZtNvfS70j
-6V2iEtDdsDDeZSL2do7P29h01Ld5VoFy0NUIVcNu9/LCowPYCcVyYc/Suaqul6ir
-NNC0VCAFAn/zvjENAJA+Z7In3lG2VLIavUDGLoFqdGc38G3PSEJ8hndQ3QKBgQCH
-JpT6TnT0jLuFLEEgQDDNW6tcibRXDOjnTXoqj0DccAWkz9JNIU4ALryGXNYdLx/x
-NSXGv1dO8DUT+bGgsB9SLZVCS3Ej7c0qDGUoCg0yDejTskhEUwsMAi1Xuh/6glW2
-6CYSOAwveWmaqKooLDoXKqd+KXASC9nHfmKIy1aNKQKBgEIh4B9PoYT00HNfAwqL
-d8QDMjFmV+JktkgjGTc7CJUUn6WuE1WHZ6HrzRHCvNwMcRRZvUf79uzTj8GxNVdq
-bJwaxuW2g+/e0snnsgy3g0opN7veW0i+RvtLabE/hEazruY264Bin59VBgfoSraB
-/7a0gQ6Ez1OoP7+sAM+b5sc/
------END PRIVATE KEY-----

Reply via email to