-
Notifications
You must be signed in to change notification settings - Fork 606
Comparing changes
Open a pull request
base repository: hierynomus/sshj
base: v0.33.0
head repository: hierynomus/sshj
compare: v0.35.0
- 13 commits
- 45 files changed
- 8 contributors
Commits on May 27, 2022
-
Added SFTP file transfer resume support on both PUT and GET. (#775)
* Added SFTP file transfer resume support on both PUT and GET. Internally SFTPFileTransfer has a few sanity checks to fall back to full replacement even if the resume flag is set. SCP file transfers have not been changed to support this at this time. * Added JUnit tests for issue-700 * Throw SCPException when attempting to resume SCP transfers. * Licensing * Small bug resuming a completed file was restarting since the bytes were equal. * Enhanced test cases to validate the expected bytes transferred for each scenario are the actual bytes transferred. * Removed author info which was pre-filled from company IDE template * Added "fall through" comment for switch * Changed the API for requesting a resume from a boolean flag with some internal decisions to be a user-specified long byte offset. This is cleaner but puts the onus on the caller to know exactly what they're asking for in their circumstance, which is ultimately better for a library like sshj. * Reverted some now-unnecessary changes to SFTPFileTransfer.Uploader.prepareFile() * Fix gradle exclude path for test files Co-authored-by: Jeroen van Erp <jeroen@hierynomus.com>
Configuration menu - View commit details
-
Copy full SHA for 3de0302 - Browse repository at this point
Copy the full SHA 3de0302View commit details
Commits on Jul 12, 2022
-
Updated KeepAlive and RemotePF examples (#791)
- Set KeepAlive interval before connecting
Configuration menu - View commit details
-
Copy full SHA for c0f6000 - Browse repository at this point
Copy the full SHA c0f6000View commit details
Commits on Jul 13, 2022
-
Configuration menu - View commit details
-
Copy full SHA for f33bfec - Browse repository at this point
Copy the full SHA f33bfecView commit details
Commits on Jul 14, 2022
-
Replace PKCS5 Key File Class with PKCS8 (#793)
* Replaced PKCS5 parsing with PKCS8 - Moved tests for PEM-encoded PKCS1 files to PKCS8 - Removed PKCS5 Key File implementation * Added PKCS8 test to retry password after initial failure Co-authored-by: Jeroen van Erp <jeroen@hierynomus.com>
Configuration menu - View commit details
-
Copy full SHA for 5674072 - Browse repository at this point
Copy the full SHA 5674072View commit details
Commits on Aug 8, 2022
-
restore the interrupt flag whenever we catch InterruptedException (#801)
Co-authored-by: Alex Heneveld <alex@cloudsoft.io>
Configuration menu - View commit details
-
Copy full SHA for 559384a - Browse repository at this point
Copy the full SHA 559384aView commit details -
AuthGssApiWithMic: Use default client creds instead of remote username (
#743) Previously, AuthGssApiWithMic used params.getUsername() to create the local client credential object. However, at least when using the native GSS libraries (sun.security.jgss.native=true), the username would need to be something like "user@EXAMPLE.COM", not "user", or the library is unable to find credentials. Also, your remote username might not be your local username. Instead, and more simply, call the GSSManager#createCredential variant that just uses default credentials, which should handle both of these cases. Tested on Windows using SSPI. I haven't tested this patch on Linux but I have confirmed that this form of call to createCredential works as I expect when using the native GSS/Kerberos library there too. Co-authored-by: Jeroen van Erp <jeroen@hierynomus.com>
Configuration menu - View commit details
-
Copy full SHA for 1b258f0 - Browse repository at this point
Copy the full SHA 1b258f0View commit details
Commits on Aug 10, 2022
-
Configuration menu - View commit details
-
Copy full SHA for ec467a3 - Browse repository at this point
Copy the full SHA ec467a3View commit details
Commits on Sep 16, 2022
-
Configuration menu - View commit details
-
Copy full SHA for 430cbfc - Browse repository at this point
Copy the full SHA 430cbfcView commit details -
Add Transport.isKeyExchangeRequired() to avoid unnecessary KEXINIT (#811
) * Added Transport.isKeyExchangeRequired() to avoid unnecessary KEXINIT - Updated SSHClient.onConnect() to check isKeyExchangeRequired() before calling doKex() - Added started timestamp in ThreadNameProvider for improved tracking * Moved KeepAliveThread State check after authentication to avoid test timing issues
Configuration menu - View commit details
-
Copy full SHA for 2551f8e - Browse repository at this point
Copy the full SHA 2551f8eView commit details
Commits on Sep 17, 2022
-
Fix #805: Prevent CHANNEL_CLOSE to be sent between Channel.isOpen and… (
#813) * Fix #805: Prevent CHANNEL_CLOSE to be sent between Channel.isOpen and a Transport.write call Otherwise, a disconnect with a "packet referred to nonexistent channel" message can occur. This particularly happens when the transport.Reader thread passes an eof from the server to the ChannelInputStream, the reading library-user thread returns, and closes the channel at the same time as the transport.Reader thread receives the subsequent CHANNEL_CLOSE from the server. * Add integration test for #805
Configuration menu - View commit details
-
Copy full SHA for d5d6096 - Browse repository at this point
Copy the full SHA d5d6096View commit details
Commits on Sep 19, 2022
-
Support SSHClient.authPassword on FreeBSD (#815)
* Support SSHClient.authPassword on FreeBSD FreeBSD "keyboard-interactive" prompt is "Password for user@host:" * Add test for PasswordResponseProvider
Configuration menu - View commit details
-
Copy full SHA for 6e7fb96 - Browse repository at this point
Copy the full SHA 6e7fb96View commit details
Commits on Jan 6, 2023
-
Configuration menu - View commit details
-
Copy full SHA for dcfa183 - Browse repository at this point
Copy the full SHA dcfa183View commit details
Commits on Jan 30, 2023
-
Configuration menu - View commit details
-
Copy full SHA for 830a39d - Browse repository at this point
Copy the full SHA 830a39dView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v0.33.0...v0.35.0