From mboxrd@z Thu Jan 1 00:00:00 1970 Path: news.gmane.io!.POSTED.blaine.gmane.org!not-for-mail From: "Artyom V. Poptsov" Newsgroups: gmane.lisp.guile.user Subject: [ANN] Guile-SSH 0.16.4 released Date: Sun, 17 Dec 2023 16:43:49 +0300 Message-ID: <87le9tx7u2.fsf@gmail.com> Mime-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" Injection-Info: ciao.gmane.io; posting-host="blaine.gmane.org:116.202.254.214"; logging-data="3441"; mail-complaints-to="usenet@ciao.gmane.io" User-Agent: Gnus/5.13 (Gnus v5.13) To: Guile Users' Mailing List Original-X-From: guile-user-bounces+guile-user=m.gmane-mx.org@gnu.org Sun Dec 17 14:44:49 2023 Return-path: Envelope-to: guile-user@m.gmane-mx.org Original-Received: from lists.gnu.org ([209.51.188.17]) by ciao.gmane.io with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1rErRp-0000hx-2Z for guile-user@m.gmane-mx.org; Sun, 17 Dec 2023 14:44:49 +0100 Original-Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1rErR3-0002vz-A0; Sun, 17 Dec 2023 08:44:01 -0500 Original-Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1rErR1-0002vq-Ou for guile-user@gnu.org; Sun, 17 Dec 2023 08:43:59 -0500 Original-Received: from mail-lj1-x22f.google.com ([2a00:1450:4864:20::22f]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1rErQz-0006Xk-Qs for guile-user@gnu.org; Sun, 17 Dec 2023 08:43:59 -0500 Original-Received: by mail-lj1-x22f.google.com with SMTP id 38308e7fff4ca-2cc6ea4452cso2055561fa.1 for ; Sun, 17 Dec 2023 05:43:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1702820635; x=1703425435; darn=gnu.org; h=mime-version:user-agent:message-id:date:subject:to:from:from:to:cc :subject:date:message-id:reply-to; bh=8cYQ0w9V6EKTu/bz1DGaE0hiIxZq0dDZZmIWMu0qmW4=; b=kXXgR0kiE9ZnoonRDKsiAps3ayfHhbl/hJqicm/RO12nD6sP2IEMJ3/grx/lBLcj5j s3xlxZvrmYFzAfJTFfJLhNpIyvcxDWmWh4QWzvqjhnYkAJprXZqPTpTswV96PN6KMI1O JsJqovCN7xHdB6hnj8Hfl5Bss3VVdF+z4mP+B6I1Hhp1RQOJzvIn/dwQL/qSeq7VvEwT wCGM6JjBwAOgD/b5qLoiV49VUgxwXipnb9xM0j4TIjTwmJ9zWnmqI42qy+i2WK5xYuUA INWXT5+q0kprcAsr4v/LCVzLR/ZBlOT+e8lQhg7/DgyyHgJiGYP0oJ0LLpfaU0Xe44kV WJhw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702820635; x=1703425435; h=mime-version:user-agent:message-id:date:subject:to:from :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=8cYQ0w9V6EKTu/bz1DGaE0hiIxZq0dDZZmIWMu0qmW4=; b=m9Kar05ZqfLyIX/ikK8UV+YxXzU676slwGx+TDZQYQhk3g2UPq+A81hGc0JFT1jBeK NTWfJ4skX/rhDifZa8wHJy5bTFseHolcj1qkNJkG7AsNvCP+KKzLivADEvT9IheuCHH8 Xo5gPnfB+pseBY+Ew/WHPuYNbhjyzbWzNpJoxC3GZXHxHsUn72g/um/JPlZtwp/PBBwv Y2Yom6JqSrp9HHMnLg2UWVjEsJSrpjta5NEr18rPqAsb/mHopXQGAl+w/o/AHOrBsMNK i1OjLzBKp3/9VtVEaxLKLWhEoHHjJTpJRWd2Og34XMzjMQwbvfhMK3Xgg/viMSHWEor+ caQg== X-Gm-Message-State: AOJu0YzqW1C96YYmXKmuaE+j2gcWp71xptjdIx4ENunqVR14Den7UjNa LINmsc0rBC33z/Q6JJrF7RY/kE+SOQw= X-Google-Smtp-Source: AGHT+IE5/fDauoLbD7baloDIDsI5RSUqnhwmWTRAaLa5uO7t8Rd6A5b4zJXbsPEzcwUm01k/ZTuolQ== X-Received: by 2002:a05:651c:160a:b0:2cc:1f8f:820a with SMTP id f10-20020a05651c160a00b002cc1f8f820amr8212458ljq.77.1702820634930; Sun, 17 Dec 2023 05:43:54 -0800 (PST) Original-Received: from elephant ([5.166.207.17]) by smtp.gmail.com with ESMTPSA id d8-20020a05651c01c800b002ca34ad9e8bsm3112224ljn.138.2023.12.17.05.43.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 17 Dec 2023 05:43:54 -0800 (PST) Received-SPF: pass client-ip=2a00:1450:4864:20::22f; envelope-from=poptsov.artyom@gmail.com; helo=mail-lj1-x22f.google.com X-Spam_score_int: -6 X-Spam_score: -0.7 X-Spam_bar: / X-Spam_report: (-0.7 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URI_DOTEDU=1.4 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: guile-user@gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: General Guile related discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guile-user-bounces+guile-user=m.gmane-mx.org@gnu.org Original-Sender: guile-user-bounces+guile-user=m.gmane-mx.org@gnu.org Xref: news.gmane.io gmane.lisp.guile.user:19380 Archived-At: --=-=-= Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Hello Guilers! I'm pleased to announce Guile-SSH 0.16.4: https://github.com/artyom-poptsov/guile-ssh/releases/tag/v0.16.4 As usual, this release tag is signed with my GPG key[1]. This release fixes "channel leak" error reported by GNU Guix users. Guile-SSH 0.16.4 API should be backward-compatible with Guile-SSH 0.16.3, 0.16.2, 0.16.1 and 0.16.0. You can read the Guile-SSH documentation online here: Or here (through the Yggdrasil[2] network): 2. The site itself is self-hosted so sometimes it is a bit flacky. * What is Guile-SSH? Guile-SSH is a library that provides access to the SSH protocol[3] for programs written in GNU Guile interpreter. It is built upon the libssh[4] library. Currently Guile-SSH provides the following features: - The API that is sufficient for building of standalone SSH clients and servers, or for embedding client/server functionality in your lispy Sch= eme applications. - Several authentication methods are supported, including password authentication, public key and SSH agent authentication methods. - Key management procedures: you can make key pairs, read keys from files, get key hashes, get public keys from private keys etc. DSS, RSA, RSA1 = and ECDSA (by means of OpenSSL) are supported. - Port forwarding procedures and high-level API for creating of SSH tunne= ls. - Distributed forms ('dist-map', 'distribute', ...) that allow to spread = the evaluation of Scheme code between remote hosts. Or you can just connect to a remote REPL from Scheme using 'with-ssh' procedure and evaluate so= me expressions. No special server needed on the remote side, just an SSH daemon and GNU Guile installed! - SFTP client API allows you to read and write remote files, or do direct= ory traversal over the SSH protocol right from the Scheme code. - Remote popen API that allows you to make either input, output or bidirectional pipes to remote processes. - Detailed documentation in Texinfo format with examples included, even m= ore examples in 'examples' directory. - Procedures for interaction with SSH agents. * The list of user-visible changes Here's the list of user-visible changes: =2D-8<---------------cut here---------------start------------->8--- * Changes in version 0.16.4 (2023-12-17) ** =3Dprivate-key-from-file=3D now allows to read encrypted keys The procedure =3Dprivate-key-from-file=3D from =3D(ssh key)=3D now has opti= onal =3D#:auth-callback=3D and =3D#:user-data=3D keys that allow to specify a ca= llback procedure to read the password for an encrypted key, and optionally pass to the callback procedure some user data. The Texinfo documentation for =3Dprivate-key-from-file=3D is updated with a= n usage example. New tests were added for the new functionality. ** Add GNU Guix workflows for GitHub CI Now Guile-SSH has GNU Guix workflows for GitHub CI. Platforms: =2D x86_64-linux-gnu =2D aarch64-linux-gnu Thanks to Sharlatan Hellseher ** Fix typos in the documentation Some typos in =3Ddoc/api-popen.texi=3D are fixed, thanks to Maxim Cournoyer =2D-8<---------------cut here---------------end--------------->8--- Many thanks to all the people who helped me with bug reports, pull requests and other hints. I added all contributors to "AUTHORS" and "THANKS" files -- please let me know if I forgot to thank someone or if there any typos. =2D Artyom References: 1. https://pgp.mit.edu/pks/lookup?search=3D0x0898A02F&op=3Dindex 2. https://yggdrasil-network.github.io/ 3. https://en.wikipedia.org/wiki/Secure_Shell 4. https://www.libssh.org/ =2D-=20 Artyom "avp" Poptsov Home page: https://memory-heap.org/~avp/ CADR Hackerspace co-founder: https://cadrspace.ru/ GPG: D0C2 EAC1 3310 822D 98DE B57C E9C5 A2D9 0898 A02F --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQJNBAEBCgA3FiEEAf2F9Bp7f4IFgwalk16+BzbchX4FAmV++xUZHHBvcHRzb3Yu YXJ0eW9tQGdtYWlsLmNvbQAKCRCTXr4HNtyFfkZXD/0SCMKAb5zWN/hisczKmxN2 qLNCep3QJ7NVwIGbIWd9iru52diHAuPBxOb7XuBtluPiNuqZfCQniAM1HReImxRK npXF4jKDz4KX8W8PZC0Lf7QOIGNmH7q2Re/tFkRWjmlJqKz0+9123MBQu98Og3bL ijjmacDhgqdVMn0w+qmwS7kmtmom2g4kNpQir0ZDYvKxIz2gApPEXytycv2J9nbU Qt1EG/YzBDKF47tP6WtPFrro2H7g9GOeSC8r53p0ePKJ6zHKhM8zr1OqSPm/euQP wdp+CqkCe5S9/GPjhijZb59fXpGcdFF+7dLF7CE/aN6jvVfBrSXfsiCo5ULv1UFU KdJuPGmK++7tKCdWA/bZM9hnBgrYqgzBk+PxwPgNFX5qnYoKvxsGgxG7fTotKZNQ C/ElFtPB0xN/IFHkuNI7cA1/R0Li+HzHFMhoMkdnghELbSn9K4fXRfD+GKPgNqoG TsbkpQyEd/DUDE6m+OfJzAwDADKJLGmwZx6TEgOQKzYfa62GlC+5ChhnVv4MoOjf mRJBqeyd92/SIW+iGOamxdxrV+TsL7MF/teS/6+NLHy7jU0ioyQ/Q06Bkrgh0njz ntDeeH3yPFNXa5PEi3IN3IZL1BpEXA0lEmhCbSbnvJpzezv0GI9pN/9W8ZmJaml5 PvwhWXJjUxJKnTC73hSlvg== =hS3e -----END PGP SIGNATURE----- --=-=-=--