maven-scm
maven-scm copied to clipboard
Bump minaSshdVersion from 2.11.0 to 2.13.2
Bumps minaSshdVersion
from 2.11.0 to 2.13.2.
Updates org.apache.sshd:sshd-git
from 2.11.0 to 2.13.2
Release notes
Sourced from org.apache.sshd:sshd-git's releases.
SSHD 2.13.2
What's Changed
- GH-525: Fix sntrup761x25519-sha512 by
@tomaswolf
in apache/mina-sshd#528Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.1...sshd-2.13.2
SSHD 2.13.1
What's changed
This release does not contain any code changes. It is solely to rectify the issue that the 2.13.0 release encountered during the release process, where the source jars were not created.
Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.0...sshd-2.13.1
The 2.13.0 release notes are available at https://github.com/apache/mina-sshd/releases/tag/sshd-2.13.0
SSHD 2.13.0
What's changed
- GH-318: Handle cascaded proxy jumps by
@tomaswolf
in #512- GH-427: Read initial ACK on channel open prior to direct stream upload & close streams prior to exit code handling by
@TerraNibble
in #464- GH-455: ensure BaseCipher.update() fulfills the contract by
@tomaswolf
in #463- GH-470: Synchronize not thread safe java.security.KeyPairGenerator.generateKe… by
@zakharovsergey1000
in #467- GH-476: Fix Android detection false negative by
@wh0
- GH-475: Switch uses of JSch library to the com.github.mwiede:jsch fork by
@Alex-Vol-Amz
- GH-472: change client start condition in sshd-spring-sftp by
@alwaystom
- GH-489: sftp readdir: determine file type from longname by
@tomaswolf
in #491- GH-486: Add missing U2F {ed25519,ecdsa}-sk public key equality methods by
@lf
-- SSHD-1237 Handle keep-alive channel requests by
@tomaswolf
in #492- GH-494: Nio2Session improvements by
@evgeny-pasynkov
- GH-468: Handle excess data in SFTP read requests by
@tomaswolf
in #495- GH-498: Implement the "[email protected]" KEX method by
@tomaswolf
- GH-500: SftpFileSystemProvider: close SftpClient on exception by
@tomaswolf
in #501- GH-504: Pass reason to sessionNegotiationEnd by
@duco-lw
in #505- GH-461: Fix heartbeats with
wantReply=true
by@tomaswolf
in #507- GH-493: Fix arcfour128 and arcfour256 ciphers (regression in 2.2.0)
- GH-509: SFTP v[456] client: validate attribute flags
- GH-510: Fix class name in BuiltinIoServiceFactoryFactories (regression in 2.6.0)
New Features
[email protected]
Key ExchangeThe key exchange method [email protected] is now available if the Bouncy Castle library is available.
This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.
Behavioral changes and enhancements
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-git's changelog.
Version 2.10.0 to 2.11.0
Version 2.11.0 to 2.12.0
Version 2.12.0 to 2.12.1
Version 2.12.1 to 2.13.0
Version 2.13.0 to 2.13.1
Version 2.13.1 to 2.13.2
Planned for next version
Bug Fixes
- GH-524 Performance improvements
- GH-533 Fix multi-step authentication
- GH-582 Fix filtering in
NamedFactory
New Features
- New utility methods
SftpClient.put(Path localFile, String remoteFileName)
andSftpClient.put(InputStream in, String remoteFileName)
facilitate SFTP file uploading.Potential compatibility issues
New security provider registrar
There is a new
SecurityProviderRegistrar
that is registered by default if there is aSunJCE
security provider and that uses the AES and HmacSHA* implementations fromSunJCE
even if Bouncy Castle is also registered.SunJCE
has native implementations, whereas Bouncy Castle may not.The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property
org.apache.sshd.security.provider.SunJCEWrapper.enabled=false
.GH-582 Fix filtering in
NamedFactory
The methods
NamedFactory.setupBuiltinFactories(boolean ignoreUnsupported, ...)
andNamedFactory.setupTransformedFactories(boolean ignoreUnsupported, ...)
had a bug that gave the "ignoreUnsupported" parameter actually the meaning of "include unsupported".This was fixed in this release, but existing code calling these or one of the following methods:
BaseBuilder.setUpDefaultMacs(boolean ignoreUnsupported)
BaseBuilder.setUpDefaultCiphers(boolean ignoreUnsupported)
ClientBuilder.setUpDefaultCompressionFactories(boolean ignoreUnsupported)
ClientBuilder.setUpDefaultKeyExchanges(boolean ignoreUnsupported)
... (truncated)
Commits
0e74e89
[maven-release-plugin] prepare release sshd-2.13.2c2d64f4
Prepare changelog for releasec17c507
Typo fixf72ca77
Mention 2.13.1 in CHANGES.md5b00c1f
GH-525: Fix sntrup761x25519-sha512ebc6602
Fix tests using EOL CentOS 7.9 image04ae57b
[maven-release-plugin] prepare for next development iterationa02a49e
[maven-release-plugin] prepare release sshd-2.13.150d1d9f
Do not build the default source jar for sshd-osgi31a2ddc
[maven-release-plugin] prepare for next development iteration- Additional commits viewable in compare view
Updates org.apache.sshd:sshd-common
from 2.11.0 to 2.13.2
Release notes
Sourced from org.apache.sshd:sshd-common's releases.
SSHD 2.13.2
What's Changed
- GH-525: Fix sntrup761x25519-sha512 by
@tomaswolf
in apache/mina-sshd#528Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.1...sshd-2.13.2
SSHD 2.13.1
What's changed
This release does not contain any code changes. It is solely to rectify the issue that the 2.13.0 release encountered during the release process, where the source jars were not created.
Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.0...sshd-2.13.1
The 2.13.0 release notes are available at https://github.com/apache/mina-sshd/releases/tag/sshd-2.13.0
SSHD 2.13.0
What's changed
- GH-318: Handle cascaded proxy jumps by
@tomaswolf
in #512- GH-427: Read initial ACK on channel open prior to direct stream upload & close streams prior to exit code handling by
@TerraNibble
in #464- GH-455: ensure BaseCipher.update() fulfills the contract by
@tomaswolf
in #463- GH-470: Synchronize not thread safe java.security.KeyPairGenerator.generateKe… by
@zakharovsergey1000
in #467- GH-476: Fix Android detection false negative by
@wh0
- GH-475: Switch uses of JSch library to the com.github.mwiede:jsch fork by
@Alex-Vol-Amz
- GH-472: change client start condition in sshd-spring-sftp by
@alwaystom
- GH-489: sftp readdir: determine file type from longname by
@tomaswolf
in #491- GH-486: Add missing U2F {ed25519,ecdsa}-sk public key equality methods by
@lf
-- SSHD-1237 Handle keep-alive channel requests by
@tomaswolf
in #492- GH-494: Nio2Session improvements by
@evgeny-pasynkov
- GH-468: Handle excess data in SFTP read requests by
@tomaswolf
in #495- GH-498: Implement the "[email protected]" KEX method by
@tomaswolf
- GH-500: SftpFileSystemProvider: close SftpClient on exception by
@tomaswolf
in #501- GH-504: Pass reason to sessionNegotiationEnd by
@duco-lw
in #505- GH-461: Fix heartbeats with
wantReply=true
by@tomaswolf
in #507- GH-493: Fix arcfour128 and arcfour256 ciphers (regression in 2.2.0)
- GH-509: SFTP v[456] client: validate attribute flags
- GH-510: Fix class name in BuiltinIoServiceFactoryFactories (regression in 2.6.0)
New Features
[email protected]
Key ExchangeThe key exchange method [email protected] is now available if the Bouncy Castle library is available.
This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.
Behavioral changes and enhancements
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-common's changelog.
Version 2.10.0 to 2.11.0
Version 2.11.0 to 2.12.0
Version 2.12.0 to 2.12.1
Version 2.12.1 to 2.13.0
Version 2.13.0 to 2.13.1
Version 2.13.1 to 2.13.2
Planned for next version
Bug Fixes
- GH-524 Performance improvements
- GH-533 Fix multi-step authentication
- GH-582 Fix filtering in
NamedFactory
New Features
- New utility methods
SftpClient.put(Path localFile, String remoteFileName)
andSftpClient.put(InputStream in, String remoteFileName)
facilitate SFTP file uploading.Potential compatibility issues
New security provider registrar
There is a new
SecurityProviderRegistrar
that is registered by default if there is aSunJCE
security provider and that uses the AES and HmacSHA* implementations fromSunJCE
even if Bouncy Castle is also registered.SunJCE
has native implementations, whereas Bouncy Castle may not.The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property
org.apache.sshd.security.provider.SunJCEWrapper.enabled=false
.GH-582 Fix filtering in
NamedFactory
The methods
NamedFactory.setupBuiltinFactories(boolean ignoreUnsupported, ...)
andNamedFactory.setupTransformedFactories(boolean ignoreUnsupported, ...)
had a bug that gave the "ignoreUnsupported" parameter actually the meaning of "include unsupported".This was fixed in this release, but existing code calling these or one of the following methods:
BaseBuilder.setUpDefaultMacs(boolean ignoreUnsupported)
BaseBuilder.setUpDefaultCiphers(boolean ignoreUnsupported)
ClientBuilder.setUpDefaultCompressionFactories(boolean ignoreUnsupported)
ClientBuilder.setUpDefaultKeyExchanges(boolean ignoreUnsupported)
... (truncated)
Commits
0e74e89
[maven-release-plugin] prepare release sshd-2.13.2c2d64f4
Prepare changelog for releasec17c507
Typo fixf72ca77
Mention 2.13.1 in CHANGES.md5b00c1f
GH-525: Fix sntrup761x25519-sha512ebc6602
Fix tests using EOL CentOS 7.9 image04ae57b
[maven-release-plugin] prepare for next development iterationa02a49e
[maven-release-plugin] prepare release sshd-2.13.150d1d9f
Do not build the default source jar for sshd-osgi31a2ddc
[maven-release-plugin] prepare for next development iteration- Additional commits viewable in compare view
Updates org.apache.sshd:sshd-core
from 2.11.0 to 2.13.2
Release notes
Sourced from org.apache.sshd:sshd-core's releases.
SSHD 2.13.2
What's Changed
- GH-525: Fix sntrup761x25519-sha512 by
@tomaswolf
in apache/mina-sshd#528Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.1...sshd-2.13.2
SSHD 2.13.1
What's changed
This release does not contain any code changes. It is solely to rectify the issue that the 2.13.0 release encountered during the release process, where the source jars were not created.
Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.0...sshd-2.13.1
The 2.13.0 release notes are available at https://github.com/apache/mina-sshd/releases/tag/sshd-2.13.0
SSHD 2.13.0
What's changed
- GH-318: Handle cascaded proxy jumps by
@tomaswolf
in #512- GH-427: Read initial ACK on channel open prior to direct stream upload & close streams prior to exit code handling by
@TerraNibble
in #464- GH-455: ensure BaseCipher.update() fulfills the contract by
@tomaswolf
in #463- GH-470: Synchronize not thread safe java.security.KeyPairGenerator.generateKe… by
@zakharovsergey1000
in #467- GH-476: Fix Android detection false negative by
@wh0
- GH-475: Switch uses of JSch library to the com.github.mwiede:jsch fork by
@Alex-Vol-Amz
- GH-472: change client start condition in sshd-spring-sftp by
@alwaystom
- GH-489: sftp readdir: determine file type from longname by
@tomaswolf
in #491- GH-486: Add missing U2F {ed25519,ecdsa}-sk public key equality methods by
@lf
-- SSHD-1237 Handle keep-alive channel requests by
@tomaswolf
in #492- GH-494: Nio2Session improvements by
@evgeny-pasynkov
- GH-468: Handle excess data in SFTP read requests by
@tomaswolf
in #495- GH-498: Implement the "[email protected]" KEX method by
@tomaswolf
- GH-500: SftpFileSystemProvider: close SftpClient on exception by
@tomaswolf
in #501- GH-504: Pass reason to sessionNegotiationEnd by
@duco-lw
in #505- GH-461: Fix heartbeats with
wantReply=true
by@tomaswolf
in #507- GH-493: Fix arcfour128 and arcfour256 ciphers (regression in 2.2.0)
- GH-509: SFTP v[456] client: validate attribute flags
- GH-510: Fix class name in BuiltinIoServiceFactoryFactories (regression in 2.6.0)
New Features
[email protected]
Key ExchangeThe key exchange method [email protected] is now available if the Bouncy Castle library is available.
This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.
Behavioral changes and enhancements
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-core's changelog.
Version 2.10.0 to 2.11.0
Version 2.11.0 to 2.12.0
Version 2.12.0 to 2.12.1
Version 2.12.1 to 2.13.0
Version 2.13.0 to 2.13.1
Version 2.13.1 to 2.13.2
Planned for next version
Bug Fixes
- GH-524 Performance improvements
- GH-533 Fix multi-step authentication
- GH-582 Fix filtering in
NamedFactory
New Features
- New utility methods
SftpClient.put(Path localFile, String remoteFileName)
andSftpClient.put(InputStream in, String remoteFileName)
facilitate SFTP file uploading.Potential compatibility issues
New security provider registrar
There is a new
SecurityProviderRegistrar
that is registered by default if there is aSunJCE
security provider and that uses the AES and HmacSHA* implementations fromSunJCE
even if Bouncy Castle is also registered.SunJCE
has native implementations, whereas Bouncy Castle may not.The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property
org.apache.sshd.security.provider.SunJCEWrapper.enabled=false
.GH-582 Fix filtering in
NamedFactory
The methods
NamedFactory.setupBuiltinFactories(boolean ignoreUnsupported, ...)
andNamedFactory.setupTransformedFactories(boolean ignoreUnsupported, ...)
had a bug that gave the "ignoreUnsupported" parameter actually the meaning of "include unsupported".This was fixed in this release, but existing code calling these or one of the following methods:
BaseBuilder.setUpDefaultMacs(boolean ignoreUnsupported)
BaseBuilder.setUpDefaultCiphers(boolean ignoreUnsupported)
ClientBuilder.setUpDefaultCompressionFactories(boolean ignoreUnsupported)
ClientBuilder.setUpDefaultKeyExchanges(boolean ignoreUnsupported)
... (truncated)
Commits
0e74e89
[maven-release-plugin] prepare release sshd-2.13.2c2d64f4
Prepare changelog for releasec17c507
Typo fixf72ca77
Mention 2.13.1 in CHANGES.md5b00c1f
GH-525: Fix sntrup761x25519-sha512ebc6602
Fix tests using EOL CentOS 7.9 image04ae57b
[maven-release-plugin] prepare for next development iterationa02a49e
[maven-release-plugin] prepare release sshd-2.13.150d1d9f
Do not build the default source jar for sshd-osgi31a2ddc
[maven-release-plugin] prepare for next development iteration- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)