Releases: ContainerSSH/sshserver
0.9.18: Moving to new logger
This releaser cleans up logging and moves to the new logger 0.9.11.
0.9.16: Keyboard-interactive authentication
This release adds support for keyboard-interactive authentication.
0.9.15: Testing framework
This release adds a wide range of testing utilities that can be used to construct an SSH server or client for testing purposes.
0.9.14: Fixed incorrect request types
In the previous version the SSH server would listen for several incorrect request types, for example PTY, signals, and subsystems. These are now fixed.
0.9.13: Fixed race condition on channel requests
The previous version of this library would handle channel requests in parallel goroutines. This would sometimes lead to shell/exec/subsystem requests being processed before PTY requests. This release changes that and requests are now always processed in order.
0.9.12: Moving the OnHandshakeSuccessful handler to authentication
This change moves the call to OnHandshakeSuccessful before sending the "auth success" message to the client.
This is required because we noticed that clients would immediately start sending requests (e.g. PTY requests) to the server while the container backend is still initializing. If the container initialization takes too long the PTY request would be considered failed by the client resulting in the error message "PTY allocation request failed on channel 0". By delaying sending the authentication response to the client we can make sure the container backend has ample time to start up the container.
0.9.11: Exec request bug
This release fixes a bug where Exec requests would be rejected due to faulty refactoring in the previous release.
Currently, there is no test for this scenario, but later on, a full test suite for supported SSH requests is desired.
0.9.10: Bugfixing request decoding
In the previous versions of this library the fields in the structures related to SSH requests (e.g. env) were not exported. This caused the ssh unmarshal to fail, but this was not tested previously. We have now changed the fields to be exported and sending requests has now been added to the test scope. More test cases are desirable in future.
0.9.9: Configuration structure now accepts strings instead of ssh.Signer
This change replaces the host keys configuration parameter ([]ssh.Signer
) with a slice of strings. This is done to preserve the file-based host keys when a configuration structure needs to be saved later.
0.9.8: Changing the pubKey authenticator to use the authorized key format
In this release we are changing the OnAuthPubKey
method of the NetworkConnectionHandler
interface to receive a string
instead of a []byte
for the pubkey. The SSH server implementation now passes the SSH key in the OpenSSH authorized key format to make it easier for implementers to match the key.