This is an automated email from the ASF dual-hosted git repository.
gnodet pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/mina-sshd.git
The following commit(s) were added to refs/heads/master by this push:
new 50b21bfa6 Prepare changelog for release
50b21bfa6 is described below
commit 50b21bfa645e8ebeaf6e0e37481cf96fb2bb86bd
Author: Guillaume Nodet <[email protected]>
AuthorDate: Fri Jan 12 05:58:35 2024 +0100
Prepare changelog for release
---
CHANGES.md | 26 ++------------------------
CHANGES.md => docs/changes/2.12.0.md | 28 +---------------------------
2 files changed, 3 insertions(+), 51 deletions(-)
diff --git a/CHANGES.md b/CHANGES.md
index ba9b80de6..b308e7a37 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -24,38 +24,16 @@
# [Version 2.10.0 to 2.11.0](./docs/changes/2.11.0.md)
+# [Version 2.11.0 to 2.12.0](./docs/changes/2.12.0.md)
+
# Planned for next version
## Bug Fixes
-* [GH-428/GH-392](https://github.com/apache/mina-sshd/issues/428) SCP client
fails silently when error signalled due to missing file or lacking permissions
-* [GH-434](https://github.com/apache/mina-sshd/issues/434) Ignore unknown key
types from agent or in OpenSSH host keys extension
-
-
## New Features
-* [GH-429](https://github.com/apache/mina-sshd/issues/429) Support GIT
protocol-v2
-* [GH-445](https://github.com/apache/mina-sshd/issues/445) OpenSSH "strict key
exchange" protocol extension
([CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) mitigation)
-
## Behavioral changes and enhancements
-### New `ScpTransferEventListener` callback method
-
-Following [GH-428/GH-392](https://github.com/apache/mina-sshd/issues/428) a
new `handleReceiveCommandAckInfo` method has been added to enable users to
inspect
-acknowledgements of a `receive` related command. The user is free to inspect
the command that was attempted as well as the response code and decide how
-to handle it - including even throwing an exception if OK status (if this
makes sense for whatever reason). The default implementation checks for ERROR
code and throws
-an exception if so.
-
-### OpenSSH protocol extension: strict key exchange
-
-[GH-445](https://github.com/apache/mina-sshd/issues/445) implements an
extension to the SSH protocol introduced
-in OpenSSH 9.6. This ["strict key exchange"
extension](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL)
-hardens the SSH key exchange against the ["Terrapin
attack"](https://www.terrapin-attack.com/)
-([CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795)). The
extension is active if both parties
-announce their support for it at the start of the initial key exchange. If
only one party announces support,
-it is not activated to ensure compatibility with SSH implementations that do
not implement it. Apache MINA sshd
-clients and servers always announce their support for strict key exchange.
-
## Potential compatibility issues
## Major Code Re-factoring
diff --git a/CHANGES.md b/docs/changes/2.12.0.md
similarity index 73%
copy from CHANGES.md
copy to docs/changes/2.12.0.md
index ba9b80de6..6d2c8325c 100644
--- a/CHANGES.md
+++ b/docs/changes/2.12.0.md
@@ -1,30 +1,4 @@
-# [Version 2.1.0 to 2.2.0](./docs/changes/2.2.0.md)
-
-# [Version 2.2.0 to 2.3.0](./docs/changes/2.3.0.md)
-
-# [Version 2.3.0 to 2.4.0](./docs/changes/2.4.0.md)
-
-# [Version 2.4.0 to 2.5.0](./docs/changes/2.5.0.md)
-
-# [Version 2.5.0 to 2.5.1](./docs/changes/2.5.1.md)
-
-# [Version 2.5.1 to 2.6.0](./docs/changes/2.6.0.md)
-
-# [Version 2.6.0 to 2.7.0](./docs/changes/2.7.0.md)
-
-# [Version 2.7.0 to 2.8.0](./docs/changes/2.8.0.md)
-
-# [Version 2.8.0 to 2.9.0](./docs/changes/2.9.0.md)
-
-# [Version 2.9.0 to 2.9.1](./docs/changes/2.9.1.md)
-
-# [Version 2.9.1 to 2.9.2](./docs/changes/2.9.2.md)
-
-# [Version 2.9.2 to 2.10.0](./docs/changes/2.10.0.md)
-
-# [Version 2.10.0 to 2.11.0](./docs/changes/2.11.0.md)
-
-# Planned for next version
+# Introduced in 2.12.0
## Bug Fixes