This is an automated email from the ASF dual-hosted git repository.
vivekrai pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/gobblin.git
The following commit(s) were added to refs/heads/master by this push:
new 93be76b357 [GOBBLIN-2238]Remove unsupported ChaCha20 cipher suites
from default SSL configuration (#4153)
93be76b357 is described below
commit 93be76b3574c9d7401a95aae43e0ff8ab52ebde6
Author: pratapaditya04 <[email protected]>
AuthorDate: Thu Nov 6 16:41:05 2025 +0530
[GOBBLIN-2238]Remove unsupported ChaCha20 cipher suites from default SSL
configuration (#4153)
* removed chacha cipher suites
* added java 8 support matrix
---
.../temporal/workflows/client/TemporalWorkflowClientFactory.java | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git
a/gobblin-temporal/src/main/java/org/apache/gobblin/temporal/workflows/client/TemporalWorkflowClientFactory.java
b/gobblin-temporal/src/main/java/org/apache/gobblin/temporal/workflows/client/TemporalWorkflowClientFactory.java
index ec63c79014..821340c162 100644
---
a/gobblin-temporal/src/main/java/org/apache/gobblin/temporal/workflows/client/TemporalWorkflowClientFactory.java
+++
b/gobblin-temporal/src/main/java/org/apache/gobblin/temporal/workflows/client/TemporalWorkflowClientFactory.java
@@ -66,6 +66,7 @@ public class TemporalWorkflowClientFactory {
Arrays.asList("TLSv1.2"));
List<String> SSL_CONFIG_DEFAULT_CIPHER_SUITES =
Collections.unmodifiableList(Arrays.asList(
// The following list is from
https://github.com/netty/netty/blob/4.1/codec-http2/src/main/java/io/netty/handler/codec/http2/Http2SecurityUtil.java#L50
+ // Supported ciphers for for java 8
https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html#SupportedCipherSuites
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
/* REQUIRED BY HTTP/2 SPEC */
@@ -73,9 +74,7 @@ public class TemporalWorkflowClientFactory {
/* REQUIRED BY HTTP/2 SPEC */
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
- "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
- "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256",
- "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
+ "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"
));
String keyStoreType = config.getString(SSL_KEYSTORE_TYPE);