معرفی شرکت ها


python-paramiko-doc-2.11.0-3.fc37.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Docs and demo for SSH2 protocol library for python
ویژگی مقدار
سیستم عامل Linux
توزیع Fedora 37
مخزن Fedora Everything noarch
نام بسته python-paramiko-doc
نام فایل بسته python-paramiko-doc-2.11.0-3.fc37.noarch.rpm
نسخه بسته 2.11.0
انتشار بسته 3.fc37
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Sat 23 Jul 2022 01
هاست سازنده buildvm-x86-06.iad2.fedoraproject.org
نوع بسته .rpm
آدرس صفحه اصلی https://github.com/paramiko/paramiko
مجوز LGPLv2+
حجم دانلود 266K
حجم نصب 1.271M
Paramiko (a combination of the Esperanto words for "paranoid" and "friend") is a module for python 2.3 or greater that implements the SSH2 protocol for secure (encrypted and authenticated) connections to remote machines. Unlike SSL (aka TLS), the SSH2 protocol does not require hierarchical certificates signed by a powerful central authority. You may know SSH2 as the protocol that replaced telnet and rsh for secure access to remote shells, but the protocol also includes the ability to open arbitrary channels to remote services across an encrypted tunnel (this is how sftp works, for example). This is the documentation and demos.


جایگزین ها

بسته نسخه معماری مخزن
python-paramiko-doc-2.12.0-1.fc37.noarch.rpm 2.12.0 noarch Fedora Everything


نیازمندی

مقدار نام
= 2.11.0-3.fc37 python-paramiko


ارائه دهنده

مقدار نام
= 2.11.0-3.fc37 python-paramiko-doc


نحوه نصب


نصب پکیج rpm python-paramiko-doc:

    dnf install python-paramiko-doc-2.11.0-3.fc37.noarch.rpm


فایل ها

مسیرها
/usr/share/doc/python-paramiko-doc
/usr/share/doc/python-paramiko-doc/demos
/usr/share/doc/python-paramiko-doc/demos/demo.py
/usr/share/doc/python-paramiko-doc/demos/demo_keygen.py
/usr/share/doc/python-paramiko-doc/demos/demo_server.py
/usr/share/doc/python-paramiko-doc/demos/demo_sftp.py
/usr/share/doc/python-paramiko-doc/demos/demo_simple.py
/usr/share/doc/python-paramiko-doc/demos/forward.py
/usr/share/doc/python-paramiko-doc/demos/interactive.py
/usr/share/doc/python-paramiko-doc/demos/rforward.py
/usr/share/doc/python-paramiko-doc/demos/test_rsa.key
/usr/share/doc/python-paramiko-doc/demos/user_rsa_key
/usr/share/doc/python-paramiko-doc/demos/user_rsa_key.pub
/usr/share/doc/python-paramiko-doc/html
/usr/share/doc/python-paramiko-doc/html/.doctrees
/usr/share/doc/python-paramiko-doc/html/.doctrees/api
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/agent.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/buffered_pipe.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/channel.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/client.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/config.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/file.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/hostkeys.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/kex_gss.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/keys.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/message.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/packet.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/pipe.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/proxy.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/server.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/sftp.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/ssh_exception.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/ssh_gss.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/api/transport.doctree
/usr/share/doc/python-paramiko-doc/html/.doctrees/environment.pickle
/usr/share/doc/python-paramiko-doc/html/.doctrees/index.doctree
/usr/share/doc/python-paramiko-doc/html/_sources
/usr/share/doc/python-paramiko-doc/html/_sources/api
/usr/share/doc/python-paramiko-doc/html/_sources/api/agent.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/buffered_pipe.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/channel.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/client.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/config.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/file.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/hostkeys.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/kex_gss.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/keys.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/message.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/packet.rst.txt
/usr/share/doc/python-paramiko-doc/html/_sources/api/pipe.rst.txt
... and 49 more


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2022-07-22

Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild

2022-06-14

Rebuilt for Python 3.11

2022-05-17

Update to 2.11.0
Align signature verification algorithm with OpenSSH re: zero-padding
implemented SSH servers handle
OpenSSH 7.7 and older has a bug preventing it from understanding how to
not keys), so when we added SHA2 support it broke all clients using
a version check is performed and the
Recent versions of Cryptography have deprecated Blowfish algorithm support;
Windows-native SSH agent support as merged in 2.10 could encounter
Add SSH config token expansion (eg '%h', '%p') when parsing 'ProxyJump'
Apply unittest 'skipIf' to tests currently using SHA1 in their critical

2022-04-26

Update to 2.10.4
Update 'camelCase' method calls against the 'threading' module to be
'~paramiko.pkey.PKey' instances' '__eq__' did not have the usual safety
Servers offering certificate variants of hostkey algorithms (e.g.
rsa-cert-v01@openssh.com') could not have their host keys verified by
cert key types for that

2022-03-21

Skip tests that would fail without SHA-1 signing support in backend, such as
9 (GH#2011)

2022-03-19

Update to 2.10.3
Certificate-based pubkey auth was inadvertently broken when adding SHA2
Switch from module-global to thread-local storage when recording thread IDs
running processes (GH#2002, GH#2003)

2022-03-15

Update to 2.10.2
Fix Python 2 compatibility breakage introduced in 2.10.1 (GH#2001)
Re-enable sftp tests, no longer failing under mock

2022-03-13

Update to 2.10.1
CVE-2022-24302: Creation of new private key files using
using code would write out
incompatible
Add support for the '%C' token when parsing SSH config files (GH#1976)
Add support for OpenSSH's Windows agent as a fallback when Putty/WinPageant
Significantly speed up low-level read/write actions on
Add 'six' explicitly to install-requires; it snuck into active use at some
recently dropped it (GH#1985); this will be short-lived

2022-01-21

Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild

2022-01-14

Avoid use of deprecated python-mock by using unittest.mock instead

2022-01-08

Update to 2.9.2
Connecting to servers that support 'server-sig-algs' but which have no
sha2-512' (since the use of
sig-algs' allows us to know what the server supports)
Enhanced log output when connecting to servers that do not support
sig-algs' extensions, making the new-as-of-2.9 defaulting to SHA2

2021-12-25

Update to 2.9.1
Server-side support for 'rsa-sha2-256' and 'ssh-rsa' wasn't fully operable
sha2-512' instead) (GH#1935)

2021-12-24

Update to 2.9.0
Add support for SHA-2 variants of RSA key verification algorithms (as
Client verification of server host key during key exchange will now prefer
sha2-512, rsa-sha2-256, and legacy ssh-rsa algorithms, in that order,
rsa
Note that the preference order of other algorithm families such as
Server mode will now offer all 3 RSA algorithms for host key verification
Client mode key exchange now sends the ext-info-c flag signaling support
sig-algs flag) has been added
Client mode, when performing public key authentication with an RSA key or
In all cases, the list of algorithms to consider is based on the new
512, SHA2-256 and SHA1, in that order
When the server does not send server-sig-algs, Paramiko will attempt
When the server does send server-sig-algs, the first algorithm
SSH agent support grew the ability to specify algorithm flags when
Server mode is now capable of pubkey auth involving SHA-2 signatures from
sig-algs only) to clients advertising ext-info-c in their key
'PKey.sign_ssh_data <paramiko.pkey.PKey>': Grew an extra, optional
rsa" for '~paramiko.rsakey.RSAKey')
A new '~paramiko.ssh_exception.SSHException' subclass was added,
'~paramiko.transport.Transport' grew a '_preferred_pubkeys' attribute and
focused,

2021-11-29

Update to 2.8.1
Fix listdir failure when server uses a locale (GH#985, GH#992); now on
Deleting items from '~paramiko.hostkeys.HostKeys' would incorrectly raise
Update RSA and ECDSA key decoding subroutines to correctly catch exception
Update '~paramiko.pkey.PKey' and subclasses to compare ('__eq__') via
bit systems
bit Python 2, or a 32-bit Python 3 that is
Paramiko server processes would incorrectly authenticate the attacker
Paramiko client processes would incorrectly validate a connected server
in-the-middle attack. This impacts more users than the server-side

2021-10-11

Update to 2.8.0
Administrivia overhaul, including but not limited to:
Migrate CI to CircleCI
Primary dev branch is now 'main' (renamed)
Many README edits for clarity, modernization etc.; including a bunch more
PyPI page much more fleshed out (long_description is now filled in with
flake8, pytest configs split out of setup.cfg into their own files
Invoke/invocations (used by maintainers/contributors) upgraded to modern
Newer server-side key exchange algorithms not intended to use SHA1
hellman-group14-sha256, diffie-hellman-group16-sha512) were
Add a 'prefetch' keyword argument to 'SFTPClient.get'/'SFTPClient.getfo' so

2021-07-23

Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild