summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authoradam <adam@pkgsrc.org>2021-05-13 17:46:51 +0000
committeradam <adam@pkgsrc.org>2021-05-13 17:46:51 +0000
commit9a6fa34edee3573d2317f3f7be97e2bdf729e55b (patch)
tree8375a21c1b04c14e52929b75bcbf31aa1ebca494 /security
parent4c06616dac2fe178db98b38b0699efd8b423806b (diff)
downloadpkgsrc-9a6fa34edee3573d2317f3f7be97e2bdf729e55b.tar.gz
py-asyncssh: updated to 2.6.0
Release 2.6.0 (1 May 2021) Added support for the HostKeyAlias client config option and a corresponding host_key_alias option, allowing known_hosts lookups and host certificate validation to be done against a different hoetname than what is used to make the connection. Thanks go to Pritam Baral for contributing this feature! Added the capability to specify client channel options as connection options, allowing them to be set in a connect() call or as values in SSHClientConnectionOptions. These values will act as defaults for any sessions opened on the connection but can still be overridden via arguments in the create_session() call. Added support for dynamically updating SSH options set up in a listen() or listen_reverse() call. A new SSHAcceptor class is now returned by these calls which has an update() method which takes the same keyword arguments as SSHClientConnectionOptions or SSHServerConnectionOptions, allowing you to update any of the options on an existing listener except those involved in setting up the listening sockets themselves. Updates will apply to future connections accepted by that listener. Added support for a number of algorithms supported by the ssh.com Tectia SSH client/server: Key exchange: diffie-hellman-group14-sha256@ssh.com (enabled by default) diffie-hellman-group14-sha224@ssh.com (available but not default) diffie-hellman-group15-sha256@ssh.com diffie-hellman-group15-sha384@ssh.com diffie-hellman-group16-sha384@ssh.com diffie-hellman-group16-sha512@ssh.com diffie-hellman-group18-sha512@ssh.com HMAC: hmac-sha256-2@ssh.com (all enabled by default) hmac-sha224@ssh.com hmac-sha256@ssh.com hmac-sha384@ssh.com hmac-sha512@ssh.com RSA public key algorithms: ssh-rsa-sha224@ssh.com (all enabled by default) ssh-rsa-sha256@ssh.com ssh-rsa-sha384@ssh.com ssh-rsa-sha512@ssh.com Encryption: seed-cbc@ssh.com (available but not default) Added a new ‘ignore-failure’ value to the x11_forwarding argument in create_session(). When specified, AsyncSSH will attempt to set up X11 forwarding but ignore failures, behaving as if forwarding was never requested instead of raising a ConnectionOpenError. Extended support for replacing certificates in an SSHKeyPair, allowing alternate certificates to be used with SSH agent and PKCS11 keys. This provides a way to use X.509 certificates with an SSH agent key or OpenSSH certificates with a PKCS11 key. Extended the config file parser to support ‘=’ as a delimiter between keywords and arguments. While this syntax appears to be rarely used, it is supported by OpenSSH. Updated Fido2 support to use version 0.9.1 of the fido2 package, which included some changes that were not backward compatible with 0.8.1. Fixed problem with setting config options with percent substitutions to ‘none’. Percent subsitution should not be performed in this case. Thanks go to Yuqing Miao for finding and reporting this issue! Fixed return type of filenames in SFTPClient scandir() and readlink() when the argument passed in is a Path value. Previously, the return value in this case was bytes, but that was only meant to apply when the input argument was passed as bytes. Fixed a race condition related to closing a channel before it is fully open, preventing a client from potentially hanging forever if a session was closed while the client was still attempting to request a PTY or make other requests as part of opening the session. Fixed a potential race condition related to making parallel calls to SFTPClient makedirs() which try to create the same directory or a common parent directory. Fixed RFC 4716 parser to allow colons in header values. Improved error message when AsyncSSH is unable to get the local username on a client. Thanks go to Matthew Plachter for reporting this issue.
Diffstat (limited to 'security')
-rw-r--r--security/py-asyncssh/Makefile4
-rw-r--r--security/py-asyncssh/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/security/py-asyncssh/Makefile b/security/py-asyncssh/Makefile
index cff35dd18a1..1ea3aabdba8 100644
--- a/security/py-asyncssh/Makefile
+++ b/security/py-asyncssh/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.23 2021/01/03 10:30:04 adam Exp $
+# $NetBSD: Makefile,v 1.24 2021/05/13 17:46:51 adam Exp $
-DISTNAME= asyncssh-2.5.0
+DISTNAME= asyncssh-2.6.0
PKGNAME= ${PYPKGPREFIX}-${DISTNAME}
CATEGORIES= security python
MASTER_SITES= ${MASTER_SITE_PYPI:=a/asyncssh/}
diff --git a/security/py-asyncssh/distinfo b/security/py-asyncssh/distinfo
index 6644a0b7830..665e261d95b 100644
--- a/security/py-asyncssh/distinfo
+++ b/security/py-asyncssh/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.23 2021/01/03 10:30:04 adam Exp $
+$NetBSD: distinfo,v 1.24 2021/05/13 17:46:51 adam Exp $
-SHA1 (asyncssh-2.5.0.tar.gz) = 142650a2aace0912c28b3a366200a3554800df0b
-RMD160 (asyncssh-2.5.0.tar.gz) = f61a7d9313e6473ab1c9d403efd8e5864086f454
-SHA512 (asyncssh-2.5.0.tar.gz) = 646f00287eb8aedc1fc23e35c93a831420b4fba5f2f52091e3a06f6cba06684439d0c58df6a1597f9065436e973d355fb8fefdd9684d163979f86bef331183a5
-Size (asyncssh-2.5.0.tar.gz) = 414437 bytes
+SHA1 (asyncssh-2.6.0.tar.gz) = bfbe256537f9999960d504c1a3b30882e7dcf910
+RMD160 (asyncssh-2.6.0.tar.gz) = 5565bb354bc11537172cb330e2339a2e49adbf66
+SHA512 (asyncssh-2.6.0.tar.gz) = b1421ba03bbc3f919ebdc3f4936e024ecb579e9a6823ff507be5fb3b6e03ff0b7aaebf364282902b53f82eeaa095894d747e200eb9fc28cad19d94ec809448a3
+Size (asyncssh-2.6.0.tar.gz) = 419074 bytes