dependabot[bot] opened a new pull request, #12836: URL: https://github.com/apache/camel/pull/12836
Bumps `sshd-version` from 2.11.0 to 2.12.0. Updates `org.apache.sshd:sshd-sftp` from 2.11.0 to 2.12.0 <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/releases">org.apache.sshd:sshd-sftp's releases</a>.</em></p> <blockquote> <h2>Apache MINA SSHD 2.12.0</h2> <h1>Introduced in 2.12.0</h1> <h2>Bug Fixes</h2> <ul> <li>[GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) SCP client fails silently when error signalled due to missing file or lacking permissions</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a> Ignore unknown key types from agent or in OpenSSH host keys extension</li> </ul> <h2>New Features</h2> <ul> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/429">GH-429</a> Support GIT protocol-v2</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> OpenSSH "strict key exchange" protocol extension (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a> mitigation)</li> </ul> <h2>Behavioral changes and enhancements</h2> <h3>New <code>ScpTransferEventListener</code> callback method</h3> <p>Following [GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) a new <code>handleReceiveCommandAckInfo</code> method has been added to enable users to inspect acknowledgements of a <code>receive</code> related command. The user is free to inspect the command that was attempted as well as the response code and decide how to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws an exception if so.</p> <h3>OpenSSH protocol extension: strict key exchange</h3> <p><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> implements an extension to the SSH protocol introduced in OpenSSH 9.6. This <a href="https://github.com/openssh/openssh-portable/blob/master/PROTOCOL">"strict key exchange" extension</a> hardens the SSH key exchange against the <a href="https://www.terrapin-attack.com/">"Terrapin attack"</a> (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>). The extension is active if both parties announce their support for it at the start of the initial key exchange. If only one party announces support, it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd clients and servers always announce their support for strict key exchange.</p> <h2>New Contributors</h2> <ul> <li><a href="https://github.com/evgeny-pasynkov"><code>@evgeny-pasynkov</code></a> made their first contribution in <a href="https://redirect.github.com/apache/mina-sshd/pull/424">apache/mina-sshd#424</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0</a></p> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/blob/master/CHANGES.md">org.apache.sshd:sshd-sftp's changelog</a>.</em></p> <blockquote> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.11.0.md">Version 2.10.0 to 2.11.0</a></h1> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.12.0.md">Version 2.11.0 to 2.12.0</a></h1> <h1>Planned for next version</h1> <h2>Bug Fixes</h2> <h2>New Features</h2> <h2>Behavioral changes and enhancements</h2> <h2>Potential compatibility issues</h2> <h2>Major Code Re-factoring</h2> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/apache/mina-sshd/commit/ea45ddc079a1dab67d590e800132088f14756135"><code>ea45ddc</code></a> [maven-release-plugin] prepare release sshd-2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/50b21bfa645e8ebeaf6e0e37481cf96fb2bb86bd"><code>50b21bf</code></a> Prepare changelog for release</li> <li><a href="https://github.com/apache/mina-sshd/commit/b6ecfb62537795146ee089c521cdd8703f3ee466"><code>b6ecfb6</code></a> Upgrade Groovy to 4.x to support building on JDK 21</li> <li><a href="https://github.com/apache/mina-sshd/commit/46cfd7ade2d41c6c2a13d0281fa2e957d7fe39de"><code>46cfd7a</code></a> Bump logback version 1.2.11 -> 1.2.13</li> <li><a href="https://github.com/apache/mina-sshd/commit/72acfbf8b0d5089e69c7609a66b1cbb5a7ae3364"><code>72acfbf</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a>: skip unknown public keys from external sources</li> <li><a href="https://github.com/apache/mina-sshd/commit/72224fa6f76ef33fd80eebc46a8661866e6f7f62"><code>72224fa</code></a> Improved documentation + HOWTO for strict KEX management</li> <li><a href="https://github.com/apache/mina-sshd/commit/e5c48cdc0615b1d087b562755114535550c03f94"><code>e5c48cd</code></a> Bump version to 2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/7b2c781640a7a78a9455b86593a1f63c9e8cab92"><code>7b2c781</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: strict KEX interoperability tests</li> <li><a href="https://github.com/apache/mina-sshd/commit/315739e4e9d1dc7a4ff32ea64936982ed0b73e76"><code>315739e</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: Unit tests for strict KEX</li> <li><a href="https://github.com/apache/mina-sshd/commit/6b0fd46f64bcb75eeeee31d65f10242660aad7c1"><code>6b0fd46</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: OpenSSH "strict KEX" protocol extension</li> <li>Additional commits viewable in <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">compare view</a></li> </ul> </details> <br /> Updates `org.apache.sshd:sshd-scp` from 2.11.0 to 2.12.0 <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/releases">org.apache.sshd:sshd-scp's releases</a>.</em></p> <blockquote> <h2>Apache MINA SSHD 2.12.0</h2> <h1>Introduced in 2.12.0</h1> <h2>Bug Fixes</h2> <ul> <li>[GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) SCP client fails silently when error signalled due to missing file or lacking permissions</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a> Ignore unknown key types from agent or in OpenSSH host keys extension</li> </ul> <h2>New Features</h2> <ul> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/429">GH-429</a> Support GIT protocol-v2</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> OpenSSH "strict key exchange" protocol extension (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a> mitigation)</li> </ul> <h2>Behavioral changes and enhancements</h2> <h3>New <code>ScpTransferEventListener</code> callback method</h3> <p>Following [GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) a new <code>handleReceiveCommandAckInfo</code> method has been added to enable users to inspect acknowledgements of a <code>receive</code> related command. The user is free to inspect the command that was attempted as well as the response code and decide how to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws an exception if so.</p> <h3>OpenSSH protocol extension: strict key exchange</h3> <p><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> implements an extension to the SSH protocol introduced in OpenSSH 9.6. This <a href="https://github.com/openssh/openssh-portable/blob/master/PROTOCOL">"strict key exchange" extension</a> hardens the SSH key exchange against the <a href="https://www.terrapin-attack.com/">"Terrapin attack"</a> (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>). The extension is active if both parties announce their support for it at the start of the initial key exchange. If only one party announces support, it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd clients and servers always announce their support for strict key exchange.</p> <h2>New Contributors</h2> <ul> <li><a href="https://github.com/evgeny-pasynkov"><code>@evgeny-pasynkov</code></a> made their first contribution in <a href="https://redirect.github.com/apache/mina-sshd/pull/424">apache/mina-sshd#424</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0</a></p> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/blob/master/CHANGES.md">org.apache.sshd:sshd-scp's changelog</a>.</em></p> <blockquote> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.11.0.md">Version 2.10.0 to 2.11.0</a></h1> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.12.0.md">Version 2.11.0 to 2.12.0</a></h1> <h1>Planned for next version</h1> <h2>Bug Fixes</h2> <h2>New Features</h2> <h2>Behavioral changes and enhancements</h2> <h2>Potential compatibility issues</h2> <h2>Major Code Re-factoring</h2> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/apache/mina-sshd/commit/ea45ddc079a1dab67d590e800132088f14756135"><code>ea45ddc</code></a> [maven-release-plugin] prepare release sshd-2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/50b21bfa645e8ebeaf6e0e37481cf96fb2bb86bd"><code>50b21bf</code></a> Prepare changelog for release</li> <li><a href="https://github.com/apache/mina-sshd/commit/b6ecfb62537795146ee089c521cdd8703f3ee466"><code>b6ecfb6</code></a> Upgrade Groovy to 4.x to support building on JDK 21</li> <li><a href="https://github.com/apache/mina-sshd/commit/46cfd7ade2d41c6c2a13d0281fa2e957d7fe39de"><code>46cfd7a</code></a> Bump logback version 1.2.11 -> 1.2.13</li> <li><a href="https://github.com/apache/mina-sshd/commit/72acfbf8b0d5089e69c7609a66b1cbb5a7ae3364"><code>72acfbf</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a>: skip unknown public keys from external sources</li> <li><a href="https://github.com/apache/mina-sshd/commit/72224fa6f76ef33fd80eebc46a8661866e6f7f62"><code>72224fa</code></a> Improved documentation + HOWTO for strict KEX management</li> <li><a href="https://github.com/apache/mina-sshd/commit/e5c48cdc0615b1d087b562755114535550c03f94"><code>e5c48cd</code></a> Bump version to 2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/7b2c781640a7a78a9455b86593a1f63c9e8cab92"><code>7b2c781</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: strict KEX interoperability tests</li> <li><a href="https://github.com/apache/mina-sshd/commit/315739e4e9d1dc7a4ff32ea64936982ed0b73e76"><code>315739e</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: Unit tests for strict KEX</li> <li><a href="https://github.com/apache/mina-sshd/commit/6b0fd46f64bcb75eeeee31d65f10242660aad7c1"><code>6b0fd46</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: OpenSSH "strict KEX" protocol extension</li> <li>Additional commits viewable in <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">compare view</a></li> </ul> </details> <br /> Updates `org.apache.sshd:sshd-common` from 2.11.0 to 2.12.0 <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/releases">org.apache.sshd:sshd-common's releases</a>.</em></p> <blockquote> <h2>Apache MINA SSHD 2.12.0</h2> <h1>Introduced in 2.12.0</h1> <h2>Bug Fixes</h2> <ul> <li>[GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) SCP client fails silently when error signalled due to missing file or lacking permissions</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a> Ignore unknown key types from agent or in OpenSSH host keys extension</li> </ul> <h2>New Features</h2> <ul> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/429">GH-429</a> Support GIT protocol-v2</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> OpenSSH "strict key exchange" protocol extension (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a> mitigation)</li> </ul> <h2>Behavioral changes and enhancements</h2> <h3>New <code>ScpTransferEventListener</code> callback method</h3> <p>Following [GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) a new <code>handleReceiveCommandAckInfo</code> method has been added to enable users to inspect acknowledgements of a <code>receive</code> related command. The user is free to inspect the command that was attempted as well as the response code and decide how to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws an exception if so.</p> <h3>OpenSSH protocol extension: strict key exchange</h3> <p><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> implements an extension to the SSH protocol introduced in OpenSSH 9.6. This <a href="https://github.com/openssh/openssh-portable/blob/master/PROTOCOL">"strict key exchange" extension</a> hardens the SSH key exchange against the <a href="https://www.terrapin-attack.com/">"Terrapin attack"</a> (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>). The extension is active if both parties announce their support for it at the start of the initial key exchange. If only one party announces support, it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd clients and servers always announce their support for strict key exchange.</p> <h2>New Contributors</h2> <ul> <li><a href="https://github.com/evgeny-pasynkov"><code>@evgeny-pasynkov</code></a> made their first contribution in <a href="https://redirect.github.com/apache/mina-sshd/pull/424">apache/mina-sshd#424</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0</a></p> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/blob/master/CHANGES.md">org.apache.sshd:sshd-common's changelog</a>.</em></p> <blockquote> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.11.0.md">Version 2.10.0 to 2.11.0</a></h1> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.12.0.md">Version 2.11.0 to 2.12.0</a></h1> <h1>Planned for next version</h1> <h2>Bug Fixes</h2> <h2>New Features</h2> <h2>Behavioral changes and enhancements</h2> <h2>Potential compatibility issues</h2> <h2>Major Code Re-factoring</h2> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/apache/mina-sshd/commit/ea45ddc079a1dab67d590e800132088f14756135"><code>ea45ddc</code></a> [maven-release-plugin] prepare release sshd-2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/50b21bfa645e8ebeaf6e0e37481cf96fb2bb86bd"><code>50b21bf</code></a> Prepare changelog for release</li> <li><a href="https://github.com/apache/mina-sshd/commit/b6ecfb62537795146ee089c521cdd8703f3ee466"><code>b6ecfb6</code></a> Upgrade Groovy to 4.x to support building on JDK 21</li> <li><a href="https://github.com/apache/mina-sshd/commit/46cfd7ade2d41c6c2a13d0281fa2e957d7fe39de"><code>46cfd7a</code></a> Bump logback version 1.2.11 -> 1.2.13</li> <li><a href="https://github.com/apache/mina-sshd/commit/72acfbf8b0d5089e69c7609a66b1cbb5a7ae3364"><code>72acfbf</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a>: skip unknown public keys from external sources</li> <li><a href="https://github.com/apache/mina-sshd/commit/72224fa6f76ef33fd80eebc46a8661866e6f7f62"><code>72224fa</code></a> Improved documentation + HOWTO for strict KEX management</li> <li><a href="https://github.com/apache/mina-sshd/commit/e5c48cdc0615b1d087b562755114535550c03f94"><code>e5c48cd</code></a> Bump version to 2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/7b2c781640a7a78a9455b86593a1f63c9e8cab92"><code>7b2c781</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: strict KEX interoperability tests</li> <li><a href="https://github.com/apache/mina-sshd/commit/315739e4e9d1dc7a4ff32ea64936982ed0b73e76"><code>315739e</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: Unit tests for strict KEX</li> <li><a href="https://github.com/apache/mina-sshd/commit/6b0fd46f64bcb75eeeee31d65f10242660aad7c1"><code>6b0fd46</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: OpenSSH "strict KEX" protocol extension</li> <li>Additional commits viewable in <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">compare view</a></li> </ul> </details> <br /> Updates `org.apache.sshd:sshd-core` from 2.11.0 to 2.12.0 <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/releases">org.apache.sshd:sshd-core's releases</a>.</em></p> <blockquote> <h2>Apache MINA SSHD 2.12.0</h2> <h1>Introduced in 2.12.0</h1> <h2>Bug Fixes</h2> <ul> <li>[GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) SCP client fails silently when error signalled due to missing file or lacking permissions</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a> Ignore unknown key types from agent or in OpenSSH host keys extension</li> </ul> <h2>New Features</h2> <ul> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/429">GH-429</a> Support GIT protocol-v2</li> <li><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> OpenSSH "strict key exchange" protocol extension (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a> mitigation)</li> </ul> <h2>Behavioral changes and enhancements</h2> <h3>New <code>ScpTransferEventListener</code> callback method</h3> <p>Following [GH-428/<a href="https://redirect.github.com/apache/mina-sshd/issues/392">GH-392</a>](<a href="https://redirect.github.com/apache/mina-sshd/issues/428">apache/mina-sshd#428</a>) a new <code>handleReceiveCommandAckInfo</code> method has been added to enable users to inspect acknowledgements of a <code>receive</code> related command. The user is free to inspect the command that was attempted as well as the response code and decide how to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws an exception if so.</p> <h3>OpenSSH protocol extension: strict key exchange</h3> <p><a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a> implements an extension to the SSH protocol introduced in OpenSSH 9.6. This <a href="https://github.com/openssh/openssh-portable/blob/master/PROTOCOL">"strict key exchange" extension</a> hardens the SSH key exchange against the <a href="https://www.terrapin-attack.com/">"Terrapin attack"</a> (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795</a>). The extension is active if both parties announce their support for it at the start of the initial key exchange. If only one party announces support, it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd clients and servers always announce their support for strict key exchange.</p> <h2>New Contributors</h2> <ul> <li><a href="https://github.com/evgeny-pasynkov"><code>@evgeny-pasynkov</code></a> made their first contribution in <a href="https://redirect.github.com/apache/mina-sshd/pull/424">apache/mina-sshd#424</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0</a></p> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/apache/mina-sshd/blob/master/CHANGES.md">org.apache.sshd:sshd-core's changelog</a>.</em></p> <blockquote> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.11.0.md">Version 2.10.0 to 2.11.0</a></h1> <h1><a href="https://github.com/apache/mina-sshd/blob/master/docs/changes/2.12.0.md">Version 2.11.0 to 2.12.0</a></h1> <h1>Planned for next version</h1> <h2>Bug Fixes</h2> <h2>New Features</h2> <h2>Behavioral changes and enhancements</h2> <h2>Potential compatibility issues</h2> <h2>Major Code Re-factoring</h2> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/apache/mina-sshd/commit/ea45ddc079a1dab67d590e800132088f14756135"><code>ea45ddc</code></a> [maven-release-plugin] prepare release sshd-2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/50b21bfa645e8ebeaf6e0e37481cf96fb2bb86bd"><code>50b21bf</code></a> Prepare changelog for release</li> <li><a href="https://github.com/apache/mina-sshd/commit/b6ecfb62537795146ee089c521cdd8703f3ee466"><code>b6ecfb6</code></a> Upgrade Groovy to 4.x to support building on JDK 21</li> <li><a href="https://github.com/apache/mina-sshd/commit/46cfd7ade2d41c6c2a13d0281fa2e957d7fe39de"><code>46cfd7a</code></a> Bump logback version 1.2.11 -> 1.2.13</li> <li><a href="https://github.com/apache/mina-sshd/commit/72acfbf8b0d5089e69c7609a66b1cbb5a7ae3364"><code>72acfbf</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/434">GH-434</a>: skip unknown public keys from external sources</li> <li><a href="https://github.com/apache/mina-sshd/commit/72224fa6f76ef33fd80eebc46a8661866e6f7f62"><code>72224fa</code></a> Improved documentation + HOWTO for strict KEX management</li> <li><a href="https://github.com/apache/mina-sshd/commit/e5c48cdc0615b1d087b562755114535550c03f94"><code>e5c48cd</code></a> Bump version to 2.12.0</li> <li><a href="https://github.com/apache/mina-sshd/commit/7b2c781640a7a78a9455b86593a1f63c9e8cab92"><code>7b2c781</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: strict KEX interoperability tests</li> <li><a href="https://github.com/apache/mina-sshd/commit/315739e4e9d1dc7a4ff32ea64936982ed0b73e76"><code>315739e</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: Unit tests for strict KEX</li> <li><a href="https://github.com/apache/mina-sshd/commit/6b0fd46f64bcb75eeeee31d65f10242660aad7c1"><code>6b0fd46</code></a> <a href="https://redirect.github.com/apache/mina-sshd/issues/445">GH-445</a>: OpenSSH "strict KEX" protocol extension</li> <li>Additional commits viewable in <a href="https://github.com/apache/mina-sshd/compare/sshd-2.11.0...sshd-2.12.0">compare view</a></li> </ul> </details> <br /> Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details> -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@camel.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org