This is an automated email from the ASF dual-hosted git repository.
gaborgsomogyi pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/flink.git
The following commit(s) were added to refs/heads/master by this push:
new 00e4c8f1169 [FLINK-38986][runtime][test] Update SSL tests with modern
cipher suites
00e4c8f1169 is described below
commit 00e4c8f11694f7f6afaab306c372f051845cec26
Author: balassai <[email protected]>
AuthorDate: Sat Jan 31 18:37:13 2026 +0100
[FLINK-38986][runtime][test] Update SSL tests with modern cipher suites
---
flink-end-to-end-tests/test-scripts/common_ssl.sh | 1 +
.../java/org/apache/flink/runtime/blob/BlobClientSslTest.java | 3 +++
.../flink/runtime/io/network/netty/NettyClientServerSslTest.java | 7 +++++++
.../src/test/java/org/apache/flink/runtime/net/SSLUtilsTest.java | 9 +++++++--
.../org/apache/flink/runtime/rest/RestServerSSLAuthITCase.java | 2 +-
.../test/java/org/apache/flink/runtime/rpc/RpcSSLAuthITCase.java | 4 ++--
6 files changed, 21 insertions(+), 5 deletions(-)
diff --git a/flink-end-to-end-tests/test-scripts/common_ssl.sh
b/flink-end-to-end-tests/test-scripts/common_ssl.sh
index 8d4bc50b0a3..87219c68352 100644
--- a/flink-end-to-end-tests/test-scripts/common_ssl.sh
+++ b/flink-end-to-end-tests/test-scripts/common_ssl.sh
@@ -95,6 +95,7 @@ function _set_conf_ssl_helper {
fi
# adapt config
+ set_config_key security.ssl.algorithms
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"
set_config_key security.ssl.provider ${provider}
set_config_key security.ssl.${type}.enabled true
set_config_key security.ssl.${type}.keystore ${ssl_dir}/node.keystore
diff --git
a/flink-runtime/src/test/java/org/apache/flink/runtime/blob/BlobClientSslTest.java
b/flink-runtime/src/test/java/org/apache/flink/runtime/blob/BlobClientSslTest.java
index 8cdce6e95b7..fe5151ed64d 100644
---
a/flink-runtime/src/test/java/org/apache/flink/runtime/blob/BlobClientSslTest.java
+++
b/flink-runtime/src/test/java/org/apache/flink/runtime/blob/BlobClientSslTest.java
@@ -52,6 +52,9 @@ class BlobClientSslTest extends BlobClientTest {
Configuration config =
SSLUtilsTest.createInternalSslConfigWithKeyAndTrustStores(
SecurityOptions.SSL_PROVIDER.defaultValue());
+ config.set(
+ SecurityOptions.SSL_ALGORITHMS,
+
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384");
blobSslServer = TestingBlobUtils.createServer(tempDir.resolve("ssl"),
config);
blobSslServer.start();
diff --git
a/flink-runtime/src/test/java/org/apache/flink/runtime/io/network/netty/NettyClientServerSslTest.java
b/flink-runtime/src/test/java/org/apache/flink/runtime/io/network/netty/NettyClientServerSslTest.java
index 661edf986f7..9302151ebff 100644
---
a/flink-runtime/src/test/java/org/apache/flink/runtime/io/network/netty/NettyClientServerSslTest.java
+++
b/flink-runtime/src/test/java/org/apache/flink/runtime/io/network/netty/NettyClientServerSslTest.java
@@ -45,6 +45,7 @@ import java.net.InetAddress;
import java.time.Duration;
import java.util.List;
+import static org.apache.flink.configuration.SecurityOptions.SSL_ALGORITHMS;
import static
org.apache.flink.configuration.SecurityOptions.SSL_INTERNAL_CLOSE_NOTIFY_FLUSH_TIMEOUT;
import static
org.apache.flink.configuration.SecurityOptions.SSL_INTERNAL_HANDSHAKE_TIMEOUT;
import static
org.apache.flink.configuration.SecurityOptions.SSL_INTERNAL_SESSION_CACHE_SIZE;
@@ -74,6 +75,9 @@ class NettyClientServerSslTest {
void testValidSslConnectionAdvanced() throws Exception {
Configuration sslConfig = createSslConfig();
sslConfig.set(SSL_INTERNAL_SESSION_CACHE_SIZE, 1);
+ sslConfig.set(
+ SSL_ALGORITHMS,
+
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384");
// using different timeouts for each of the configuration parameters
ensures that the right
// config value is used in the right place
@@ -267,6 +271,9 @@ class NettyClientServerSslTest {
Configuration config = createSslConfig();
+ config.set(
+ SSL_ALGORITHMS,
+
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384");
// pin the certificate based on internal cert
config.set(
SecurityOptions.SSL_INTERNAL_CERT_FINGERPRINT,
diff --git
a/flink-runtime/src/test/java/org/apache/flink/runtime/net/SSLUtilsTest.java
b/flink-runtime/src/test/java/org/apache/flink/runtime/net/SSLUtilsTest.java
index 183665fcb6a..de7a5445639 100644
--- a/flink-runtime/src/test/java/org/apache/flink/runtime/net/SSLUtilsTest.java
+++ b/flink-runtime/src/test/java/org/apache/flink/runtime/net/SSLUtilsTest.java
@@ -367,7 +367,7 @@ public class SSLUtilsTest {
serverConfig.set(SecurityOptions.SSL_PROTOCOL, "TLSv1.1");
serverConfig.set(
SecurityOptions.SSL_ALGORITHMS,
-
"TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA256");
+
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384");
try (ServerSocket socket =
SSLUtils.createSSLServerSocketFactory(serverConfig).createServerSocket(0)) {
@@ -381,7 +381,9 @@ public class SSLUtilsTest {
assertThat(protocols[0]).isEqualTo("TLSv1.1");
assertThat(algorithms).hasSize(2);
assertThat(algorithms)
- .contains("TLS_RSA_WITH_AES_128_CBC_SHA",
"TLS_RSA_WITH_AES_128_CBC_SHA256");
+ .contains(
+ "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
+ "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384");
}
}
@@ -483,6 +485,9 @@ public class SSLUtilsTest {
public static Configuration
createInternalSslConfigWithKeyAndTrustStores(String sslProvider) {
final Configuration config = new Configuration();
config.set(SecurityOptions.SSL_INTERNAL_ENABLED, true);
+ config.set(
+ SecurityOptions.SSL_ALGORITHMS,
+
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384");
addSslProviderConfig(config, sslProvider);
addInternalKeyStoreConfig(config);
addInternalTrustStoreConfig(config);
diff --git
a/flink-runtime/src/test/java/org/apache/flink/runtime/rest/RestServerSSLAuthITCase.java
b/flink-runtime/src/test/java/org/apache/flink/runtime/rest/RestServerSSLAuthITCase.java
index 571a57b280a..37f96bf8ae9 100644
---
a/flink-runtime/src/test/java/org/apache/flink/runtime/rest/RestServerSSLAuthITCase.java
+++
b/flink-runtime/src/test/java/org/apache/flink/runtime/rest/RestServerSSLAuthITCase.java
@@ -143,7 +143,7 @@ public class RestServerSSLAuthITCase {
baseConfig.set(RestOptions.ADDRESS, "localhost");
baseConfig.set(SecurityOptions.SSL_REST_ENABLED, true);
baseConfig.set(SecurityOptions.SSL_REST_AUTHENTICATION_ENABLED, true);
- baseConfig.set(SecurityOptions.SSL_ALGORITHMS,
"TLS_RSA_WITH_AES_128_CBC_SHA");
+ baseConfig.set(SecurityOptions.SSL_ALGORITHMS,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256");
Configuration serverConfig = new Configuration(baseConfig);
serverConfig.set(SecurityOptions.SSL_REST_TRUSTSTORE,
TRUST_STORE_FILE);
diff --git
a/flink-runtime/src/test/java/org/apache/flink/runtime/rpc/RpcSSLAuthITCase.java
b/flink-runtime/src/test/java/org/apache/flink/runtime/rpc/RpcSSLAuthITCase.java
index 78f1b5bd397..80d9476eb59 100644
---
a/flink-runtime/src/test/java/org/apache/flink/runtime/rpc/RpcSSLAuthITCase.java
+++
b/flink-runtime/src/test/java/org/apache/flink/runtime/rpc/RpcSSLAuthITCase.java
@@ -63,7 +63,7 @@ class RpcSSLAuthITCase {
sslConfig1.set(SecurityOptions.SSL_INTERNAL_KEYSTORE_PASSWORD,
"password");
sslConfig1.set(SecurityOptions.SSL_INTERNAL_KEY_PASSWORD, "password");
sslConfig1.set(SecurityOptions.SSL_INTERNAL_TRUSTSTORE_PASSWORD,
"password");
- sslConfig1.set(SecurityOptions.SSL_ALGORITHMS,
"TLS_RSA_WITH_AES_128_CBC_SHA");
+ sslConfig1.set(SecurityOptions.SSL_ALGORITHMS,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256");
// !!! This config has KEY_STORE_FILE / UNTRUSTED_KEY_STORE_FILE !!!
// If this is presented by a client, it will trust the server, but the
server will
@@ -75,7 +75,7 @@ class RpcSSLAuthITCase {
sslConfig2.set(SecurityOptions.SSL_INTERNAL_KEYSTORE_PASSWORD,
"password");
sslConfig2.set(SecurityOptions.SSL_INTERNAL_KEY_PASSWORD, "password");
sslConfig2.set(SecurityOptions.SSL_INTERNAL_TRUSTSTORE_PASSWORD,
"password");
- sslConfig2.set(SecurityOptions.SSL_ALGORITHMS,
"TLS_RSA_WITH_AES_128_CBC_SHA");
+ sslConfig2.set(SecurityOptions.SSL_ALGORITHMS,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256");
RpcService rpcService1 = null;
RpcService rpcService2 = null;