eb35666e8c
- Update to 1.18.0: * Added support for GSSAPI ECDH and Edwards DH key exchange algorithms. * Fixed gssapi-with-mic authentication to work with GSS key exchanges, in cases where gssapi-keyex is not supported. * Made connect_ssh and connect_reverse_ssh methods into async context managers, simplifying the syntax needed to use them to create tunneled SSH connections. * Fixed a couple of issues with known hosts matching on tunneled SSH connections. * Improved flexibility of key/certificate parser automatic format detection to properly recognize PEM even when other arbitrary text is present at the beginning of the file. With this change, the parser can also now handle mixing of multiple key formats in a single file. * Added support for OpenSSL “TRUSTED” PEM certificates. For now, no enforcement is done of the additional trust restrictions, but such certificates can be loaded and used by AsyncSSH without converting them back to regular PEM format. * Fixed some additional SFTP and SCP issues related to parsing of Windows paths with drive letters and paths with multiple colons. * Made AsyncSSH tolerant of a client which sends multiple service requests for the “ssh-userauth” service. This is needed by the Paramiko client when it tries more than one form of authentication on a connection.
Tomáš Chvátal
2019-09-13 11:54:14 +00:00
b7ae72c5bb
- update to 1.17.1 * Improved construction of file paths in SFTP to better handle native Windows source paths containing backslashes or drive letters. * Improved SFTP parallel I/O for large reads and file copies to better handle the case where a read returns less data than what was requested when not at the end of the file, allowing AsyncSSH to get back the right result even if the requested block size is larger than the SFTP server can handle. * Fixed an issue where the requested SFTP block_size wasn’t used in the get, copy, mget, and mcopy functions if it was larger than the default size of 16 KB. * Fixed a problem where the list of client keys provided in an SSHClientConnectionOptions object wasn’t always preserved properly across the opening of multiple SSH connections. * Made AsyncSSH tolerant of unexpected authentication success/failure messages sent after authentication completes. AsyncSSH previously treated this as a protocol error and dropped the connection, while most other SSH implementations ignored these messages and allowed the connection to continue. * Made AsyncSSH tolerant of SFTP status responses which are missing error message and language tag fields, improving interoperability with servers that omit these fields. When missing, AsyncSSH treats these fields as if they were set to empty strings.
Ondřej Súkup2019-08-08 13:21:28 +00:00
2a22722c4f
- update to 1.17.1 * Improved construction of file paths in SFTP to better handle native Windows source paths containing backslashes or drive letters. * Improved SFTP parallel I/O for large reads and file copies to better handle the case where a read returns less data than what was requested when not at the end of the file, allowing AsyncSSH to get back the right result even if the requested block size is larger than the SFTP server can handle. * Fixed an issue where the requested SFTP block_size wasn’t used in the get, copy, mget, and mcopy functions if it was larger than the default size of 16 KB. * Fixed a problem where the list of client keys provided in an SSHClientConnectionOptions object wasn’t always preserved properly across the opening of multiple SSH connections. * Made AsyncSSH tolerant of unexpected authentication success/failure messages sent after authentication completes. AsyncSSH previously treated this as a protocol error and dropped the connection, while most other SSH implementations ignored these messages and allowed the connection to continue. * Made AsyncSSH tolerant of SFTP status responses which are missing error message and language tag fields, improving interoperability with servers that omit these fields. When missing, AsyncSSH treats these fields as if they were set to empty strings.
Ondřej Súkup2019-08-08 13:21:28 +00:00
04164981a4
- update to 1.17.0 - drop old_openssl.patch * Added support for “reverse direction” SSH connections, useful to support applications like NETCONF Call Home, described in RFC 8071. * Added support for the PyCA implementation of Chacha20-Poly1305, eliminating the dependency on libnacl/libsodium to provide this functionality, as long as OpenSSL 1.1.1b or later is installed. * Restored libnacl support for Curve25519/Ed25519 on systems which have an older version of OpenSSL that doesn’t have that support. This fallback also applies to Chacha20-Poly1305. * Disabled the use of RSA SHA-2 signatures when using the Pageant or Windows 10 OpenSSH agent on Windows, since neither of those support the signature flags options to request them. * Fixed a regression where a callable was no longer usable in the sftp_factory argument of create_server.
Ondřej Súkup2019-06-04 13:10:36 +00:00
a7b9a6cd62
- update to 1.17.0 - drop old_openssl.patch * Added support for “reverse direction” SSH connections, useful to support applications like NETCONF Call Home, described in RFC 8071. * Added support for the PyCA implementation of Chacha20-Poly1305, eliminating the dependency on libnacl/libsodium to provide this functionality, as long as OpenSSL 1.1.1b or later is installed. * Restored libnacl support for Curve25519/Ed25519 on systems which have an older version of OpenSSL that doesn’t have that support. This fallback also applies to Chacha20-Poly1305. * Disabled the use of RSA SHA-2 signatures when using the Pageant or Windows 10 OpenSSH agent on Windows, since neither of those support the signature flags options to request them. * Fixed a regression where a callable was no longer usable in the sftp_factory argument of create_server.
Ondřej Súkup2019-06-04 13:10:36 +00:00
78e6838a1b
Accepting request 697004 from devel:languages:python
Yuchen Lin2019-04-23 12:38:50 +00:00
799abda002
Accepting request 697004 from devel:languages:python
Yuchen Lin2019-04-23 12:38:50 +00:00
48adbb0025
- add old_openssl.patch - return support for ed25519/448 via libnacl on systems with older openSSL
Ondřej Súkup2019-04-23 08:30:20 +00:00
687ed08371
- add old_openssl.patch - return support for ed25519/448 via libnacl on systems with older openSSL
Ondřej Súkup2019-04-23 08:30:20 +00:00
3e2fc2922b
- update to 1.16.1 - drop 194.patch * Added channel, connection, and env properties to SFTPServer instances, so connection and channel information can be used to influence the SFTP server's behavior. Previously, connection information was made avaiable through the constructor, but channel and environment information was not. Now, all of these are available as properties on the SFTPServer instance without the need to explicitly store anything in a custom constructor. * Optimized SFTP glob matching when the glob pattern contains directory names without glob characters in them. Thanks go to Mikhail Terekhov for contributing this improvement! * Added support for PurePath in a few places that were missed when this support was originally added. Once again, thanks go to Mikhail Terehkov for these fixes. * Fixed bug in SFTP parallel I/O file reader where it sometimes returned EOF prematurely. Thanks go to David G for reporting this problem and providing a reproducible test case. * Fixed test failures seen on Fedora Rawhide. Thanks go to Georg Sauthof for reporting this issue and providing a test environment to help debug it. * Updated Ed25519/448 and Curve25519/448 tests to only run when these algorithms are available.
Ondřej Súkup2019-04-01 13:25:16 +00:00
bba09a1e2d
- update to 1.16.1 - drop 194.patch * Added channel, connection, and env properties to SFTPServer instances, so connection and channel information can be used to influence the SFTP server's behavior. Previously, connection information was made avaiable through the constructor, but channel and environment information was not. Now, all of these are available as properties on the SFTPServer instance without the need to explicitly store anything in a custom constructor. * Optimized SFTP glob matching when the glob pattern contains directory names without glob characters in them. Thanks go to Mikhail Terekhov for contributing this improvement! * Added support for PurePath in a few places that were missed when this support was originally added. Once again, thanks go to Mikhail Terehkov for these fixes. * Fixed bug in SFTP parallel I/O file reader where it sometimes returned EOF prematurely. Thanks go to David G for reporting this problem and providing a reproducible test case. * Fixed test failures seen on Fedora Rawhide. Thanks go to Georg Sauthof for reporting this issue and providing a test environment to help debug it. * Updated Ed25519/448 and Curve25519/448 tests to only run when these algorithms are available.
Ondřej Súkup2019-04-01 13:25:16 +00:00
7007e2c24c
Accepting request 682200 from home:mimi_vx:branches:devel:languages:python
Ondřej Súkup2019-03-06 14:56:41 +00:00
fd1df9eacf
Accepting request 682200 from home:mimi_vx:branches:devel:languages:python
Ondřej Súkup2019-03-06 14:56:41 +00:00
841bc9ea2f
- Update to 1.16.0: * Added support for Ed448 host/client keys and certificates and rewrote Ed25519 support to use the PyCA implementation, reducing the dependency on libnacl and libsodium to only be needed to support the chacha20-poly1305 cipher. * Added support for PKCS#8 format Ed25519 and Ed448 private and public keys (in addition to the OpenSSH format previously supported). * Added support for multiple delimiters in SSHReader’s readuntil() function, causing it to return data as soon as any of the specified delimiters are matched. * Added the ability to register custom key handlers in the line editor which can modify the input line, extending the built-in editing functionality. * Added SSHSubprocessProtocol and SSHSubprocessTransport classes to provide compatibility with asyncio.SubprocessProtocol and asyncio.SubprocessTransport. Code which is designed to call BaseEventLoop.subprocess_shell() or BaseEventLoop.subprocess_exec() can be easily adapted to work against a remote process by calling SSHClientConnection.create_subprocess(). * Added support for sending keepalive messages when the SSH connection is idle, with an option to automatically disconnect the connection if the remote system doesn’t respond to these keepalives. * Changed AsyncSSH to ignore errors when loading unsupported key types from the default file locations. * Changed the reuse_port option to only be available on Python releases which support it (3.4.4 and later). * Fixed an issue where MSG_IGNORE packets could sometimes be sent between MSG_NEWKEYS and MSG_EXT_INFO, which caused some SSH implementations to fail to properly parse the MSG_EXT_INFO. * Fixed a couple of errors in the handling of disconnects occurring prior to authentication completing. * Renamed “session_encoding” and “session_errors” arguments in asyncssh.create_server() to “encoding” and “errors”, to match the names used for these arguments in other AsyncSSH APIs. The old names are still supported for now, but they are marked as deprecated and will be removed in a future release.
Tomáš Chvátal
2019-03-06 12:55:59 +00:00
4bd3c7cc52
- Update to 1.16.0: * Added support for Ed448 host/client keys and certificates and rewrote Ed25519 support to use the PyCA implementation, reducing the dependency on libnacl and libsodium to only be needed to support the chacha20-poly1305 cipher. * Added support for PKCS#8 format Ed25519 and Ed448 private and public keys (in addition to the OpenSSH format previously supported). * Added support for multiple delimiters in SSHReader’s readuntil() function, causing it to return data as soon as any of the specified delimiters are matched. * Added the ability to register custom key handlers in the line editor which can modify the input line, extending the built-in editing functionality. * Added SSHSubprocessProtocol and SSHSubprocessTransport classes to provide compatibility with asyncio.SubprocessProtocol and asyncio.SubprocessTransport. Code which is designed to call BaseEventLoop.subprocess_shell() or BaseEventLoop.subprocess_exec() can be easily adapted to work against a remote process by calling SSHClientConnection.create_subprocess(). * Added support for sending keepalive messages when the SSH connection is idle, with an option to automatically disconnect the connection if the remote system doesn’t respond to these keepalives. * Changed AsyncSSH to ignore errors when loading unsupported key types from the default file locations. * Changed the reuse_port option to only be available on Python releases which support it (3.4.4 and later). * Fixed an issue where MSG_IGNORE packets could sometimes be sent between MSG_NEWKEYS and MSG_EXT_INFO, which caused some SSH implementations to fail to properly parse the MSG_EXT_INFO. * Fixed a couple of errors in the handling of disconnects occurring prior to authentication completing. * Renamed “session_encoding” and “session_errors” arguments in asyncssh.create_server() to “encoding” and “errors”, to match the names used for these arguments in other AsyncSSH APIs. The old names are still supported for now, but they are marked as deprecated and will be removed in a future release.
Tomáš Chvátal
2019-03-06 12:55:59 +00:00
67deea72b9
Accepting request 676645 from devel:languages:python
Stephan Kulow
2019-02-17 11:21:38 +00:00
1d1eac9e94
Accepting request 676645 from devel:languages:python
Stephan Kulow
2019-02-17 11:21:38 +00:00
70e1168ac3
Accepting request 676560 from home:jengelh:branches:devel:languages:python
Tomáš Chvátal
2019-02-16 06:45:43 +00:00
e9cc74e7d1
Accepting request 676560 from home:jengelh:branches:devel:languages:python
Tomáš Chvátal
2019-02-16 06:45:43 +00:00
02cc85c336
Accepting request 670364 from devel:languages:python
Stephan Kulow
2019-02-02 20:49:30 +00:00
a23968c431
Accepting request 670364 from devel:languages:python
Stephan Kulow
2019-02-02 20:49:30 +00:00
60379d7bb6
Accepting request 670363 from home:mimi_vx:branches:devel:languages:python
Ondřej Súkup2019-01-31 14:28:14 +00:00
ed0c1108d0
Accepting request 670363 from home:mimi_vx:branches:devel:languages:python
Ondřej Súkup2019-01-31 14:28:14 +00:00