Jason R. Coombs
c0ef3fd493
Create the memory map with the security attributes for the current user (rather than the default) to avoid permissions failures when the client and the agent run in different UAC contexts. Fixes #98 .
2012-11-23 14:08:16 -05:00
Jason R. Coombs
0698254b18
Use MemoryMap from jaraco.windows in lieu of mmap.mmap.
2012-11-23 14:03:20 -05:00
Jason R. Coombs
64d6734086
Simplify pageant implementation by using an anonymous mmap instead of an explicit file. Requires Python 2.5.
2012-11-23 13:07:28 -05:00
Olle Lundberg
a07a339006
Create a copy of the identityfile list.
...
The copy is needed else the original
identityfile list is in the internal
config list is updated when we modify
the return dictionary.
2012-11-20 12:43:40 +01:00
Olle Lundberg
5670e111c9
Add tests for identityfile parsing.
2012-11-20 12:42:29 +01:00
Olle Lundberg
78654e82ec
DRY up the code for populating the return list
2012-11-20 00:45:32 +01:00
Jeff Forcier
71f8c5c9f5
Git ignore built docs dir
2012-11-06 16:28:45 -08:00
Jeff Forcier
d7aa342c20
Git ignore built docs dir
2012-11-06 16:28:42 -08:00
Jeff Forcier
b42c73356c
Git ignore built docs dir
2012-11-06 16:28:35 -08:00
Lincoln de Sousa
79dffacf4e
Adding tox info (and a requirements file)
2012-11-06 18:02:10 -05:00
Jeff Forcier
06d987c362
Merge branch '1.8' into 1.9
2012-11-06 13:13:04 -08:00
Jeff Forcier
a32addcfb7
Tweak travis config
2012-11-06 13:13:00 -08:00
Jeff Forcier
65de2529a9
Update changelog date for 1.9.0
2012-11-06 13:10:03 -08:00
Jeff Forcier
42f1b451a6
Merge branch '1.8'
...
Conflicts:
NEWS
paramiko/__init__.py
setup.py
2012-11-06 13:09:23 -08:00
Jeff Forcier
7f4c26f860
Cut 1.8.1
2012-11-06 13:08:41 -08:00
Jeff Forcier
a3b44c7ed9
Bump to 1.9.0 for release
2012-11-06 13:06:08 -08:00
Jeff Forcier
ebd007b217
Python 2.5 compat
2012-11-05 23:10:13 -08:00
Jeff Forcier
e7ab3c068f
Fix broken import
2012-11-05 23:10:05 -08:00
Jeff Forcier
308c5f57d9
Add ProxyCommand classes to top level API
2012-11-05 23:09:52 -08:00
Jeff Forcier
7a3cb790a6
Changelog re #97
2012-11-05 17:55:37 -08:00
Jeff Forcier
fd392d6b20
One more patch from @clarete's work
2012-11-05 17:47:33 -08:00
Jeff Forcier
191a5fc08c
Implement (& test for) ProxyCommand interpolation.
...
Forgot this earlier.
2012-11-05 17:44:25 -08:00
Jeff Forcier
0981c25cd8
Formatting
2012-11-05 17:35:06 -08:00
Jeff Forcier
0a276ac34b
Bubble up ProxyCommandFailure in packetizer
2012-11-05 17:31:17 -08:00
Jeff Forcier
394ab2699e
Post-import edits
2012-11-05 17:29:32 -08:00
Jeff Forcier
5d15467ad4
Import BadProxyCommand
2012-11-05 17:29:23 -08:00
Jeff Forcier
27271fa455
Post-import edits
2012-11-05 17:26:47 -08:00
Jeff Forcier
7cd2f2715b
Initial port of ProxyCommand class from @clarete
2012-11-05 17:25:03 -08:00
Jeff Forcier
270bb94a46
Fix ProxyCommand equals splitting.
...
Uses regex approach from @lndbrg
2012-11-05 17:18:48 -08:00
Jeff Forcier
928c062748
Add failing test(s) re ProxyCommand config parsing
2012-11-05 17:04:52 -08:00
Jeff Forcier
fb5d245b31
More attributions
2012-11-05 17:04:25 -08:00
Jeff Forcier
8e8dcea295
Add in big attribution big in prep for having ProxyCommand done
2012-11-05 15:34:46 -08:00
Jeff Forcier
31244a2ccb
Changelog re #77
2012-11-05 13:31:00 -08:00
Jeff Forcier
f9b7ce902f
Tweak docstring re #77
2012-11-05 13:30:56 -08:00
Steven Noonan
31ea4f0734
SSHClient: add 'sock' parameter to connect() for tunneling
...
Re #77
This parameter, if set, can be used to make Paramiko wrap an existing socket
connected to a remote SSH server. For instance, you could set up another
SSHClient directly connected to a "gateway" host, and then create a direct-tcpip
tunnel to a "target" host directly accessible from the gateway's perspective
(e.g. think of trying to establish an SSH connection to hosts behind a NAT).
The gateway host would then establish a TCP connection to the target host
directly, and a channel is exposed on the client side. This channel could be
wrapped by an SSHClient class using the connect() function, avoiding the need
to establish a new TCP connnection.
This effectively allows you to create tunneled SSH connections.
Based on work by Oskari Saarenmaa <os@ohmu.fi>, in Paramiko pull request #39 .
Signed-off-by: Steven Noonan <steven@uplinklabs.net>
2012-11-05 13:30:48 -08:00
Jeff Forcier
fd5e29b5a8
Somehow missed a pretty important change in the changelog
2012-11-05 11:22:07 -08:00
Jason R. Coombs
45aa88b530
Remove dependency on pywin32. Just use ctypes for simplicity.
2012-11-01 10:09:41 -04:00
Jason R. Coombs
e0d71b5efb
Remove test for presence of ctypes (assumed present in global imports).
2012-11-01 10:03:46 -04:00
Tomer Filiba
668870aa83
Forgot to import errno
2012-10-26 15:46:28 +03:00
Tomer Filiba
23f3099b6f
Make send() and recv() fail when channel is closed
...
``sendall()`` was checking if the channel has been closed,
and failed accordingly, but ``send()`` and ``recv()`` did not.
This meant that ``chan.send("foo")`` when the channel was already
closed, just blocked forever.
2012-10-26 15:44:34 +03:00
James Hiscock
c78a5856e8
Update paramiko/file.py
...
Added a closed property as an alternative accessor to BufferedFile's _closed property.
2012-10-17 14:25:22 +12:00
Olle Lundberg
221131fa21
Whitespace fixes.
2012-10-16 17:02:04 +02:00
Olle Lundberg
04cc4d5510
Be more pythonic.
2012-10-16 16:54:44 +02:00
Olle Lundberg
7ce9875ed7
Implement support for parsing proxycommand.
2012-10-16 16:38:38 +02:00
Olle Lundberg
d66d75f277
Add tests for proxycommand parsing.
2012-10-16 16:38:09 +02:00
Olle Lundberg
b22c11ab1b
Pep8 fixes
2012-10-16 15:00:08 +02:00
Olle Lundberg
2dd74f953d
Spelling
2012-10-16 14:52:27 +02:00
Olle Lundberg
ad587fa0ef
Add host negation support to paramiko config.
...
This is a rewrite of the SSHConfig class to
conform with the rules specified by the
manpage for ssh_config.
This change also adds support for negation
according to the rules introduced by
OpenSSH 5.9. Reference:
http://www.openssh.com/txt/release-5.9
2012-10-16 13:57:05 +02:00
Olle Lundberg
f33481cc44
Add test for host negation.
2012-10-16 13:53:06 +02:00
Olle Lundberg
3174b6c894
Updated tests for new ssh config format.
2012-10-16 13:52:21 +02:00