This is an automated email from the ASF dual-hosted git repository.

apupier pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/main by this push:
     new 43c8450cce72 Fix some mina sftp tests with missing algorithm
43c8450cce72 is described below

commit 43c8450cce72b63b9b4c38fb8d4110fe988a9a6f
Author: AurĂ©lien Pupier <[email protected]>
AuthorDate: Wed Feb 11 14:17:01 2026 +0100

    Fix some mina sftp tests with missing algorithm
    
    2 tests were failing on other OSes than Apple because the JDK was
    checking on exact match of provided algorithm and the certificates
    configuration. Some gpg keys used in tests were requiring additional
    algorithm.
    
    Thanks to @Croway for providing the solution.
    
    Signed-off-by: AurĂ©lien Pupier <[email protected]>
---
 .../test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git 
a/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
 
b/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
index 354aa402509a..d5a0b9ace2b7 100644
--- 
a/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
+++ 
b/test-infra/camel-test-infra-ftp/src/main/java/org/apache/camel/test/infra/ftp/services/embedded/SftpEmbeddedInfraService.java
@@ -120,8 +120,15 @@ public class SftpEmbeddedInfraService extends 
AbstractService implements FtpInfr
         signatureFactories.clear();
         // use only one, quite strong signature algorithms for 3 kinds of keys 
- RSA, EC, EDDSA
         signatureFactories.add(BuiltinSignatures.rsaSHA512);
+        signatureFactories.add(BuiltinSignatures.nistp256);
         signatureFactories.add(BuiltinSignatures.nistp521);
         signatureFactories.add(BuiltinSignatures.ed25519);
+        // include both certificate and non-certificate variants so that 
OpenSSH certificate
+        // authentication works (the server needs cert-specific verifiers for 
cert key types)
+        signatureFactories.add(BuiltinSignatures.rsaSHA512_cert);
+        signatureFactories.add(BuiltinSignatures.nistp256_cert);
+        signatureFactories.add(BuiltinSignatures.nistp521_cert);
+        signatureFactories.add(BuiltinSignatures.ed25519_cert);
         sshd.setSignatureFactories(signatureFactories);
         sshd.start();
 

Reply via email to