Age | Commit message (Collapse) | Author |
|
* weisslj/ssh-spec-doc-fixes:
ssh: Fix dialyzer type specs and documentation
OTP-11705
|
|
ssh and public_key were referring to proplists:proplists/0
which does not exist. Fix by using the correct type proplists:proplist/0.
|
|
Similar to d9ebfb8. The wrong specs were leading to dialyzer warnings
like this in our application since R16B03:
The pattern 'ok' can never match the type {'error',_}.
The pattern {'error', {'already_started', 'ssh'}} can never match the type 'ok'.
The pattern {'error', _} can never match the type {'open_error',_,string(),string()}.
|
|
OTP-10976
|
|
OTP-11296
|
|
|
|
Also start adding dialyzer specs and removing dead code
|
|
OTP-11345, sto575, tsk374
|
|
OTP-11345, sto575, tsk374
|
|
As the ASN-1 application relies on a nif in R16 for decodeing (that
was not the case in R15), public_key currently has a runtime
dependency on ASN-1. Hopefully we will be able to remove this
dependency again in the future.
|
|
|
|
|
|
|
|
|
|
* fredrik/ssh/rekeying:
ssh_basic_SUITE rekey test modifications
Modifications to idle_time testcase
Added test for rekeying
Added doc for rekey_limit option
Renegotiating every hour and every gb sent, can be decreased with option {rekey_limit, integer()}
|
|
|
|
|
|
|
|
{rekey_limit, integer()}
|
|
* maint:
is_boolean/1 is called instead of checking
Removed ip options to gen_tcp from ssh.erl
|
|
|
|
|
|
* fredrik/ssh/timer-on-connect/OTP-10514:
New setup in testing idle_time
Use same connect as the rest of testcases
Fixed doc
Added testcase for idle timer
Not start the idle timer on connect
Doc about idle_time option to ssh:connect
Check cache on channel exec
handle no idle-timer on check cache
Option idle_time introduced, it will trigger the timer and if it is not given the timer_ref entry is infinity
Timeout after 1h of idle on connection, which exits the connection
Conflicts:
lib/ssh/src/ssh.erl
|
|
|
|
|
|
algorithms you want to use
|
|
given the timer_ref entry is infinity
|
|
|
|
The 'auth_methods' option is used by the server side of the SSH code to
tell a connecting SSH client about the authentication methods that are
supported by the server. The code still extracts and handles the
'auth_methods' option from Opts in appropriate places, but the Opts
checking code in ssh.erl didn't allow that option to be specified.
|
|
The option ip_v6_disabled and the undocumented option exec was incorrectly
handled by the option checking code.
There where two options for allowing user interaction one documented
and one undocumented, they where merge to to be the documented one.
For backwards compatibility the undocumented one is transformed to the
documented one in the option checking code.
|
|
Restored supervisor tree so that error propagation will work as
intended, although connection processes are set to temporary, instead
of permanent with restart times set to 0, and termination of the
connection subtree is initiated by a temporary process spawned by
ssh_connection_managers terminate. This is done to avoid unwanted
supervisor reports. Pherhaps we need some new supervisor
functionality.
|
|
|
|
|
|
|
|
ssh_keys behavior
|
|
|
|
|
|
|
|
In some cases SSH returned {error, normal} when a channel was terminated
unexpectedly. This has now been changed to {error, channel_closed}.
OTP-8986
It is now possible to use SSH to sign and verify binary data.
|
|
|
|
|
|
|
|
|
|
|