This is an automated email from the ASF dual-hosted git repository. twolf pushed a commit to branch dev_3.0 in repository https://gitbox.apache.org/repos/asf/mina-sshd.git
commit d087c406c6726f32eff53555b919b4b9245550c4 Author: Thomas Wolf <[email protected]> AuthorDate: Sat Aug 23 23:08:22 2025 +0200 Update documentation --- CHANGES.md | 8 +++++--- sshd-site/src/site/markdown/index.md | 2 +- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index fcb7709c4..4941300fb 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -20,9 +20,11 @@ Version 3 includes all the features and bug fixes of version 2, including the [l * Deprecated API has been removed. * System property "org.apache.sshd.registerBouncyCastle" is gone; use "org.apache.sshd.security.provider.BC.enabled" instead. * System property "org.apache.sshd.eddsaSupport" is gone; use "org.apache.sshd.security.provider.EdDSA.enabled" instead. (This property applies only to the `net.i2p` ed25519 provider.) -* Method `KeyUtils.cloneKeyPair()` has been removed. It was never used inside Apache MINA sshd. If you need to duplicate an existing `KeyPar`, use `Key.getEncoded()` on the keys and then re-create a duplicate key using an `X509EncodedKeySpec` for the public key or a `PKCS8EncodedKeySpec` for the private key. +* Method `KeyUtils.cloneKeyPair()` has been removed. It was never used inside Apache MINA sshd. If you need to duplicate an existing `KeyPair`, use `Key.getEncoded()` on the keys and then re-create a duplicate key using an `X509EncodedKeySpec` for the public key or a `PKCS8EncodedKeySpec` for the private key. * `HostConfigEntry` has been changed to be more compliant with OpenSSH, and handles quoted values now. It also has a new method `getValues(key)` to get all the values of a key that can have multiple values, either because it may have multiple space-separated values (such as `UserKnownHostsFile`) or because it appears several times and does not follow the "first match wins" rule (such as `IdentityFile` or `CertificateFile`). Note that some keys have values that are comma-separated lists o [...] -* Integration tests using docker containers have been moved out of bundle `sshd-core` into a new bundle `sshd-test`, and are run now also with the MINA and the netty transports. All docker tests have changed to be skipped if no docker engine is running. If a docker engine _is_ running, they will newly also be run on Windows. (Previously, they were disabled unconditionally on Windows because the Windows runners in CI don't have docker support.) +* Integration tests using docker containers have been moved out of bundle `sshd-core` into a new bundle `sshd-test`, and are run now also with the MINA and the netty transports. +* All docker tests have been changed to be skipped if no docker engine is running. If a docker engine _is_ running, they will newly also be run on Windows. (Previously, they were disabled unconditionally on Windows because the Windows runners in CI don't have docker support.) + * This was back-ported to version 2.170.0-SNAPSHOT on the master branch. ## New Features @@ -30,4 +32,4 @@ Version 3 includes all the features and bug fixes of version 2, including the [l * New event callback `SessionListener.sessionStarting()`. See the [filter documentation](./docs/technical/filters.md). `SessionListener.sessionEstablished()` was removed; it was called from the constructor of `AbstractSession` at a time when the object was not yet fully initialized. * [GH-728](https://github.com/apache/mina-sshd/issues/728) New method `ClientSession.getHostConfigEntry()` to get the `HostConfigEntry` for the session. * [GH-729](https://github.com/apache/mina-sshd/issues/729) Support for client-side SOCKS5 or HTTP CONNECT proxies. See the [documentation](./docs/client-setup.md#proxies). -* The [OpenSSH "[email protected]" host key rotation extension](https://github.com/openssh/openssh-portable/blob/b5b405fee/PROTOCOL#L367) is now implemented client-side. New host keys so received are registered on the session but we don't update the known_hosts file. If you want that, implement your own `NewHostKeysHandler` and set it on the `SshClient`. +* The [OpenSSH "[email protected]" host key rotation extension](https://github.com/openssh/openssh-portable/blob/b5b405fee/PROTOCOL#L367) is now implemented client-side. New host keys so received are registered on the session but we don't update the `known_hosts` file. If you want that, implement your own `NewHostKeysHandler` and set it on the `SshClient`. diff --git a/sshd-site/src/site/markdown/index.md b/sshd-site/src/site/markdown/index.md index 1c57a6e17..a8064a25c 100644 --- a/sshd-site/src/site/markdown/index.md +++ b/sshd-site/src/site/markdown/index.md @@ -25,7 +25,7 @@ Apache MINA sshd is a pure Java library for client- and server-side SSH. * For now, [technical documentation](https://github.com/apache/mina-sshd/blob/master/README.md) still lives directly in the git repository and can be viewed as rendered web pages in GitHub. * Technical information on the development of release 3.0.0 is available in branch `dev_3.0`: - * [Changes since 2.15.0](https://github.com/apache/mina-sshd/blob/dev_3.0/CHANGES.md) + * [Changes since 2.16.0](https://github.com/apache/mina-sshd/blob/dev_3.0/CHANGES.md) * [Technical documentation](https://github.com/apache/mina-sshd/tree/dev_3.0/docs/technical) Release 3.0.0 will be a new major release and will contain many breaking API changes.
