IKSG / nsf-file-server

SFTP server backed by an NSF
Apache License 2.0
3 stars 0 forks source link

Bump sshd-sftp from 2.3.0 to 2.10.0 in /nsf-file-server #35

Open dependabot[bot] opened 1 year ago

dependabot[bot] commented 1 year ago

Bumps sshd-sftp from 2.3.0 to 2.10.0.

Changelog

Sourced from sshd-sftp's changelog.

Version 2.2.0 to 2.3.0

Version 2.3.0 to 2.4.0

Version 2.4.0 to 2.5.0

Version 2.5.0 to 2.5.1

Version 2.5.1 to 2.6.0

Version 2.6.0 to 2.7.0

Version 2.7.0 to 2.8.0

Version 2.8.0 to 2.9.0

Version 2.9.0 to 2.9.1

Version 2.9.1 to 2.9.2

Version 2.9.2 to 2.10.0

Planned for next version

Bug Fixes

  • GH-370 Also compare file keys in ModifiableFileWatcher.

  • GH-371 Fix channel pool in SftpFileSystem.

  • GH-383 Use correct default OpenOptions in SftpFileSystemProvider.newFileChannel().

  • GH-384 Use correct lock modes for SFTP FileChannel.lock().

  • GH-388 ScpClient: support issuing commands to a server that uses a non-UTF-8 locale.

  • SSHD-1259 Consider all applicable host keys from the known_hosts files.

  • SSHD-1310 SftpFileSystem: do not close user session.

  • SSHD-1327 ChannelAsyncOutputStream: remove write future when done.

  • SSHD-1332 (Regression in 2.10.0) Resolve ~ in IdentityFile file names in HostConfigEntry.

New Features

Major Code Re-factoring

As part of the fix for GH-371 the channel pool in SftpFileSystem was rewritten completely. Previous code also used ThreadLocals to store SftpClients, which could cause memory leaks.

These ThreadLocals have been removed, and the channel pool has been rewritten to function similar to a Java ThreadPool: the pool has a maximum size; it has

... (truncated)

Commits
  • b8429ca [maven-release-plugin] prepare release sshd-2.10.0
  • 2406cbe Prepare 2.10.0 release
  • a61e930 [SSHD-1234] Rooted file system can leak informations
  • f9970ab Remove unwanted reverse lookup
  • d4b951a GH-364: Use flags for RSA signature requests in AbstractAgentClient
  • 9f5c03a Bump spring-core from 5.3.26 to 5.3.27
  • f06217f [releng] OSGi: Ensure the BC security provider can be found
  • 5c80258 Add a test for GH-351
  • c11bfcc GH-281: Follow first-match semantics specified for ssh config file
  • f887414 OpenSSH key parsing: minor clean-ups in new AEAD code paths
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/IKSG/nsf-file-server/network/alerts).