This is an automated email from the ASF dual-hosted git repository.
apupier pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git
The following commit(s) were added to refs/heads/main by this push:
new 43c8450cce72 Fix some mina sftp tests with missing algorithm
43c8450cce72 is described below
commit 43c8450cce72b63b9b4c38fb8d4110fe988a9a6f
Author: Aurélien Pupier <[email protected]>
AuthorDate: Wed Feb 11 14:17:01 2026 +0100
Fix some mina sftp tests with missing algorithm
2 tests were failing on other OSes than Apple because the JDK was
checking on exact match of provided algorithm and the certificates
configuration. Some gpg keys used in tests were requiring additional
algorithm.
Thanks to @Croway for providing the solution.
Signed-off-by: Aurélien Pupier <[email protected]>
---
.../test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java | 7 +++++++
1 file changed, 7 insertions(+)
diff --git
a/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
b/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
index 354aa402509a..d5a0b9ace2b7 100644
---
a/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
+++
b/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
@@ -120,8 +120,15 @@ public class SftpEmbeddedInfraService extends
AbstractService implements FtpInfr
signatureFactories.clear();
// use only one, quite strong signature algorithms for 3 kinds of keys
- RSA, EC, EDDSA
signatureFactories.add(BuiltinSignatures.rsaSHA512);
+ signatureFactories.add(BuiltinSignatures.nistp256);
signatureFactories.add(BuiltinSignatures.nistp521);
signatureFactories.add(BuiltinSignatures.ed25519);
+ // include both certificate and non-certificate variants so that
OpenSSH certificate
+ // authentication works (the server needs cert-specific verifiers for
cert key types)
+ signatureFactories.add(BuiltinSignatures.rsaSHA512_cert);
+ signatureFactories.add(BuiltinSignatures.nistp256_cert);
+ signatureFactories.add(BuiltinSignatures.nistp521_cert);
+ signatureFactories.add(BuiltinSignatures.ed25519_cert);
sshd.setSignatureFactories(signatureFactories);
sshd.start();