Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: hierynomus/sshj
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v0.33.0
Choose a base ref
...
head repository: hierynomus/sshj
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: v0.35.0
Choose a head ref
  • 13 commits
  • 45 files changed
  • 8 contributors

Commits on May 27, 2022

  1. Added SFTP file transfer resume support on both PUT and GET. (#775)

    * Added SFTP file transfer resume support on both PUT and GET. Internally SFTPFileTransfer has a few sanity checks to fall back to full replacement even if the resume flag is set. 
    
    SCP file transfers have not been changed to support this at this time.
    
    * Added JUnit tests for issue-700
    
    * Throw SCPException when attempting to resume SCP transfers.
    
    * Licensing
    
    * Small bug resuming a completed file was restarting since the bytes were equal.
    
    * Enhanced test cases to validate the expected bytes transferred for each scenario are the actual bytes transferred.
    
    * Removed author info which was pre-filled from company IDE template
    
    * Added "fall through" comment for switch
    
    * Changed the API for requesting a resume from a boolean flag with some internal decisions to be a user-specified long byte offset. This is cleaner but puts the onus on the caller to know exactly what they're asking for in their circumstance, which is ultimately better for a library like sshj.
    
    * Reverted some now-unnecessary changes to SFTPFileTransfer.Uploader.prepareFile()
    
    * Fix gradle exclude path for test files
    
    Co-authored-by: Jeroen van Erp <jeroen@hierynomus.com>
    brenttyler and hierynomus authored May 27, 2022
    Configuration menu
    Copy the full SHA
    3de0302 View commit details
    Browse the repository at this point in the history

Commits on Jul 12, 2022

  1. Updated KeepAlive and RemotePF examples (#791)

    - Set KeepAlive interval before connecting
    exceptionfactory authored Jul 12, 2022
    Configuration menu
    Copy the full SHA
    c0f6000 View commit details
    Browse the repository at this point in the history

Commits on Jul 13, 2022

  1. Configuration menu
    Copy the full SHA
    f33bfec View commit details
    Browse the repository at this point in the history

Commits on Jul 14, 2022

  1. Replace PKCS5 Key File Class with PKCS8 (#793)

    * Replaced PKCS5 parsing with PKCS8
    
    - Moved tests for PEM-encoded PKCS1 files to PKCS8
    - Removed PKCS5 Key File implementation
    
    * Added PKCS8 test to retry password after initial failure
    
    Co-authored-by: Jeroen van Erp <jeroen@hierynomus.com>
    exceptionfactory and hierynomus authored Jul 14, 2022
    Configuration menu
    Copy the full SHA
    5674072 View commit details
    Browse the repository at this point in the history

Commits on Aug 8, 2022

  1. restore the interrupt flag whenever we catch InterruptedException (#801)

    Co-authored-by: Alex Heneveld <alex@cloudsoft.io>
    ahgittin and Alex Heneveld authored Aug 8, 2022
    Configuration menu
    Copy the full SHA
    559384a View commit details
    Browse the repository at this point in the history
  2. AuthGssApiWithMic: Use default client creds instead of remote username (

    #743)
    
    Previously, AuthGssApiWithMic used params.getUsername() to create the
    local client credential object. However, at least when using the native
    GSS libraries (sun.security.jgss.native=true), the username would need 
    to be something like "user@EXAMPLE.COM", not "user", or the library is 
    unable to find credentials. Also, your remote username might not be your
    local username.
    
    Instead, and more simply, call the GSSManager#createCredential variant
    that just uses default credentials, which should handle both of these 
    cases.
    
    Tested on Windows using SSPI. I haven't tested this patch on Linux but I
    have confirmed that this form of call to createCredential works as I 
    expect when using the native GSS/Kerberos library there too.
    
    Co-authored-by: Jeroen van Erp <jeroen@hierynomus.com>
    geofft and hierynomus authored Aug 8, 2022
    Configuration menu
    Copy the full SHA
    1b258f0 View commit details
    Browse the repository at this point in the history

Commits on Aug 10, 2022

  1. Configuration menu
    Copy the full SHA
    ec467a3 View commit details
    Browse the repository at this point in the history

Commits on Sep 16, 2022

  1. Configuration menu
    Copy the full SHA
    430cbfc View commit details
    Browse the repository at this point in the history
  2. Add Transport.isKeyExchangeRequired() to avoid unnecessary KEXINIT (#811

    )
    
    * Added Transport.isKeyExchangeRequired() to avoid unnecessary KEXINIT
    
    - Updated SSHClient.onConnect() to check isKeyExchangeRequired() before calling doKex()
    - Added started timestamp in ThreadNameProvider for improved tracking
    
    * Moved KeepAliveThread State check after authentication to avoid test timing issues
    exceptionfactory authored Sep 16, 2022
    Configuration menu
    Copy the full SHA
    2551f8e View commit details
    Browse the repository at this point in the history

Commits on Sep 17, 2022

  1. Fix #805: Prevent CHANNEL_CLOSE to be sent between Channel.isOpen and… (

    #813)
    
    * Fix #805: Prevent CHANNEL_CLOSE to be sent between Channel.isOpen and a Transport.write call
    
    Otherwise, a disconnect with a "packet referred to nonexistent channel" message can occur.
    
    This particularly happens when the transport.Reader thread passes an eof from the server to the ChannelInputStream, the reading library-user thread returns, and closes the channel at the same time as the transport.Reader thread receives the subsequent CHANNEL_CLOSE from the server.
    
    * Add integration test for #805
    kegelh authored Sep 17, 2022
    Configuration menu
    Copy the full SHA
    d5d6096 View commit details
    Browse the repository at this point in the history

Commits on Sep 19, 2022

  1. Support SSHClient.authPassword on FreeBSD (#815)

    * Support SSHClient.authPassword on FreeBSD
    
    FreeBSD "keyboard-interactive" prompt is "Password for user@host:"
    
    * Add test for PasswordResponseProvider
    kegelh authored Sep 19, 2022
    Configuration menu
    Copy the full SHA
    6e7fb96 View commit details
    Browse the repository at this point in the history

Commits on Jan 6, 2023

  1. Configuration menu
    Copy the full SHA
    dcfa183 View commit details
    Browse the repository at this point in the history

Commits on Jan 30, 2023

  1. Configuration menu
    Copy the full SHA
    830a39d View commit details
    Browse the repository at this point in the history
Loading