This is an automated email from the ASF dual-hosted git repository.

twolf pushed a commit to branch dev_3.0
in repository https://gitbox.apache.org/repos/asf/mina-sshd.git

commit d087c406c6726f32eff53555b919b4b9245550c4
Author: Thomas Wolf <[email protected]>
AuthorDate: Sat Aug 23 23:08:22 2025 +0200

    Update documentation
---
 CHANGES.md                           | 8 +++++---
 sshd-site/src/site/markdown/index.md | 2 +-
 2 files changed, 6 insertions(+), 4 deletions(-)

diff --git a/CHANGES.md b/CHANGES.md
index fcb7709c4..4941300fb 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -20,9 +20,11 @@ Version 3 includes all the features and bug fixes of version 
2, including the [l
 * Deprecated API has been removed.
     * System property "org.apache.sshd.registerBouncyCastle" is gone; use 
"org.apache.sshd.security.provider.BC.enabled" instead.
     * System property "org.apache.sshd.eddsaSupport" is gone; use 
"org.apache.sshd.security.provider.EdDSA.enabled" instead. (This property 
applies only to the `net.i2p` ed25519 provider.)
-* Method `KeyUtils.cloneKeyPair()` has been removed. It was never used inside 
Apache MINA sshd. If you need to duplicate an existing `KeyPar`, use 
`Key.getEncoded()` on the keys and then re-create a duplicate key using an 
`X509EncodedKeySpec` for the public key or a `PKCS8EncodedKeySpec` for the 
private key.
+* Method `KeyUtils.cloneKeyPair()` has been removed. It was never used inside 
Apache MINA sshd. If you need to duplicate an existing `KeyPair`, use 
`Key.getEncoded()` on the keys and then re-create a duplicate key using an 
`X509EncodedKeySpec` for the public key or a `PKCS8EncodedKeySpec` for the 
private key.
 * `HostConfigEntry` has been changed to be more compliant with OpenSSH, and 
handles quoted values now. It also has a new method `getValues(key)` to get all 
the values of a key that can have multiple values, either because it may have 
multiple space-separated values (such as `UserKnownHostsFile`) or because it 
appears several times and does not follow the "first match wins" rule (such as 
`IdentityFile` or `CertificateFile`). Note that some keys have values that are 
comma-separated lists o [...]
-* Integration tests using docker containers have been moved out of bundle 
`sshd-core` into a new bundle `sshd-test`, and are run now also with the MINA 
and the netty transports. All docker tests have changed to be skipped if no 
docker engine is running. If a docker engine _is_ running, they will newly also 
be run on Windows. (Previously, they were disabled unconditionally on Windows 
because the Windows runners in CI don't have docker support.)
+* Integration tests using docker containers have been moved out of bundle 
`sshd-core` into a new bundle `sshd-test`, and are run now also with the MINA 
and the netty transports.
+* All docker tests have been changed to be skipped if no docker engine is 
running. If a docker engine _is_ running, they will newly also be run on 
Windows. (Previously, they were disabled unconditionally on Windows because the 
Windows runners in CI don't have docker support.)
+    * This was back-ported to version 2.170.0-SNAPSHOT on the master branch.
 
 ## New Features
 
@@ -30,4 +32,4 @@ Version 3 includes all the features and bug fixes of version 
2, including the [l
 * New event callback `SessionListener.sessionStarting()`. See the [filter 
documentation](./docs/technical/filters.md). 
`SessionListener.sessionEstablished()` was removed; it was called from the 
constructor of `AbstractSession` at a time when the object was not yet fully 
initialized.
 * [GH-728](https://github.com/apache/mina-sshd/issues/728) New method 
`ClientSession.getHostConfigEntry()` to get the `HostConfigEntry` for the 
session.
 * [GH-729](https://github.com/apache/mina-sshd/issues/729) Support for 
client-side SOCKS5 or HTTP CONNECT proxies. See the 
[documentation](./docs/client-setup.md#proxies).
-* The [OpenSSH "[email protected]" host key rotation 
extension](https://github.com/openssh/openssh-portable/blob/b5b405fee/PROTOCOL#L367)
 is now implemented client-side. New host keys so received are registered on 
the session but we don't update the known_hosts file. If you want that, 
implement your own `NewHostKeysHandler` and set it on the `SshClient`.
+* The [OpenSSH "[email protected]" host key rotation 
extension](https://github.com/openssh/openssh-portable/blob/b5b405fee/PROTOCOL#L367)
 is now implemented client-side. New host keys so received are registered on 
the session but we don't update the `known_hosts` file. If you want that, 
implement your own `NewHostKeysHandler` and set it on the `SshClient`.
diff --git a/sshd-site/src/site/markdown/index.md 
b/sshd-site/src/site/markdown/index.md
index 1c57a6e17..a8064a25c 100644
--- a/sshd-site/src/site/markdown/index.md
+++ b/sshd-site/src/site/markdown/index.md
@@ -25,7 +25,7 @@ Apache MINA sshd is a pure Java library for client- and 
server-side SSH.
 * For now, [technical 
documentation](https://github.com/apache/mina-sshd/blob/master/README.md)
 still lives directly in the git repository and can be viewed as rendered web 
pages in GitHub.
 * Technical information on the development of release 3.0.0 is available in 
branch `dev_3.0`:
-    * [Changes since 
2.15.0](https://github.com/apache/mina-sshd/blob/dev_3.0/CHANGES.md)
+    * [Changes since 
2.16.0](https://github.com/apache/mina-sshd/blob/dev_3.0/CHANGES.md)
     * [Technical 
documentation](https://github.com/apache/mina-sshd/tree/dev_3.0/docs/technical)
 
 Release 3.0.0 will be a new major release and will contain many breaking API 
changes.

Reply via email to