{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":15991457,"defaultBranch":"master","name":"openssh-portable","ownerLogin":"openssh","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2014-01-17T05:53:25.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/2387206?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1710153750.0","currentOid":""},"activityList":{"items":[{"before":"cfe243cd9fde148ed060637876e27bb55ac78be9","after":"4de80ff4e6fab5a6bb0028e7d57c6c23d1485adb","ref":"refs/heads/master","pushedAt":"2024-06-12T22:36:54.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: split PerSourcePenalties address tracking. Previously it\n\nused one shared table and overflow policy for IPv4 and IPv6 addresses, now it\nwill use separate tables and optionally different overflow policies.\n\nThis prevents misbehaviour from IPv6 addresses (which are vastly easier\nto obtain many of) from affecting IPv4 connections and may allow for\nstricter overflow policies.\n\nok deraadt@\n\nOpenBSD-Commit-ID: 12637ed0aa4d5f1f3e702da42ea967cbd8bfdfd9","shortMessageHtmlLink":"upstream: split PerSourcePenalties address tracking. Previously it"}},{"before":"ef878d58798f6688c7f4d4e417dc0c29023ea831","after":"cfe243cd9fde148ed060637876e27bb55ac78be9","ref":"refs/heads/master","pushedAt":"2024-06-11T02:55:33.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: reap preauth net child if it hangs up during privsep message\n\nsend, not just message receive\n\nOpenBSD-Commit-ID: 02a093f4ab4f8f83f0cd1ea2bb35b9ca420448f0","shortMessageHtmlLink":"upstream: reap preauth net child if it hangs up during privsep message"}},{"before":"0e0c69761a4c33ccd4a256560f522784a753d1a8","after":"ef878d58798f6688c7f4d4e417dc0c29023ea831","ref":"refs/heads/master","pushedAt":"2024-06-11T01:27:09.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: a little more RB_TREE paranoia\n\nOpenBSD-Commit-ID: 8dc2fd21eebd8830c4a4d25461ac4fe228e11156","shortMessageHtmlLink":"upstream: a little more RB_TREE paranoia"}},{"before":"9774b938578327d88a651f4c63c504809717590a","after":"0e0c69761a4c33ccd4a256560f522784a753d1a8","ref":"refs/heads/master","pushedAt":"2024-06-06T20:26:28.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: enable PerSourcePenalties by default.\n\nok markus\n\nNB. if you run a sshd that accepts connections from behind large NAT\nblocks, proxies or anything else that aggregates many possible users\nbehind few IP addresses, then this change may cause legitimate traffic\nto be denied.\n\nPlease read the PerSourcePenalties, PerSourcePenaltyExemptList and\nPerSourceNetBlockSize options in sshd_config(5) for how to tune your\nsshd(8) for your specific circumstances.\n\nOpenBSD-Commit-ID: 24a0e5c23d37e5a63e16d2c6da3920a51078f6ce","shortMessageHtmlLink":"upstream: enable PerSourcePenalties by default."}},{"before":"81c1099d22b81ebfd20a334ce986c4f753b0db29","after":"9774b938578327d88a651f4c63c504809717590a","ref":"refs/heads/master","pushedAt":"2024-06-06T19:54:47.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: regress test for PerSourcePenalties\n\nOpenBSD-Regress-ID: a1af13d411b25a727742644459d26480b9a1b0f1","shortMessageHtmlLink":"upstream: regress test for PerSourcePenalties"}},{"before":"cc80d51d034bcb24fd0f2564a4bdf1612000a2a2","after":"81c1099d22b81ebfd20a334ce986c4f753b0db29","ref":"refs/heads/master","pushedAt":"2024-06-06T18:05:02.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Add a facility to sshd(8) to penalise particular\n\nproblematic client behaviours, controlled by two new sshd_config(5) options:\nPerSourcePenalties and PerSourcePenaltyExemptList.\n\nWhen PerSourcePenalties are enabled, sshd(8) will monitor the exit\nstatus of its child pre-auth session processes. Through the exit\nstatus, it can observe situations where the session did not\nauthenticate as expected. These conditions include when the client\nrepeatedly attempted authentication unsucessfully (possibly indicating\nan attack against one or more accounts, e.g. password guessing), or\nwhen client behaviour caused sshd to crash (possibly indicating\nattempts to exploit sshd).\n\nWhen such a condition is observed, sshd will record a penalty of some\nduration (e.g. 30 seconds) against the client's address. If this time\nis above a minimum threshold specified by the PerSourcePenalties, then\nconnections from the client address will be refused (along with any\nothers in the same PerSourceNetBlockSize CIDR range).\n\nRepeated offenses by the same client address will accrue greater\npenalties, up to a configurable maximum. A PerSourcePenaltyExemptList\noption allows certain address ranges to be exempt from all penalties.\n\nWe hope these options will make it significantly more difficult for\nattackers to find accounts with weak/guessable passwords or exploit\nbugs in sshd(8) itself.\n\nPerSourcePenalties is off by default, but we expect to enable it\nautomatically in the near future.\n\nmuch feedback markus@ and others, ok markus@\n\nOpenBSD-Commit-ID: 89ded70eccb2b4926ef0366a4d58a693de366cca","shortMessageHtmlLink":"upstream: Add a facility to sshd(8) to penalise particular"}},{"before":"8785491123d4d722b310c20f383570be758f8263","after":"cc80d51d034bcb24fd0f2564a4bdf1612000a2a2","ref":"refs/heads/master","pushedAt":"2024-06-04T16:22:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"remove PRIVSEP macros for osx","shortMessageHtmlLink":"remove PRIVSEP macros for osx"}},{"before":"f1c8918cb98459910fb159373baea053ba4108c0","after":"8785491123d4d722b310c20f383570be758f8263","ref":"refs/heads/master","pushedAt":"2024-06-01T07:05:21.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: be really strict with fds reserved for communication with the\n\nseparate sshd-session process - reserve them early and fatal if we can't\ndup2(2) them later. The pre-split fallback to re-reading the configuration\nfiles is not possible, so sshd-session absolutely requires the fd the\nconfiguration is passed over to be in order.\n\nok deraadt@\n\nOpenBSD-Commit-ID: 308a98ef3c8a6665ebf92c7c9a0fc9600ccd7065","shortMessageHtmlLink":"upstream: be really strict with fds reserved for communication with the"}},{"before":"8054b906983ceaed01fabd8188d3dac24c05ba39","after":"f1c8918cb98459910fb159373baea053ba4108c0","ref":"refs/heads/master","pushedAt":"2024-05-31T09:12:41.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"depend","shortMessageHtmlLink":"depend"}},{"before":"fc5dc092830de23767c6ef67baa18310a64ee533","after":"8054b906983ceaed01fabd8188d3dac24c05ba39","ref":"refs/heads/master","pushedAt":"2024-05-27T01:55:44.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: don't need sys/queue.h here\n\nOpenBSD-Commit-ID: dd137396828171eb19e4911581812ca58de6c578","shortMessageHtmlLink":"upstream: don't need sys/queue.h here"}},{"before":"24a1f3e5ad6f4a49377d4c74c36637e9a239efd0","after":"fc5dc092830de23767c6ef67baa18310a64ee533","ref":"refs/heads/master","pushedAt":"2024-05-22T04:22:10.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: this test has been broken since 2014, and has been\n\ntesting the same key exchange algorithm repeatedly instead of testing all of\nthem. Spotted by nreilly AT blackberry.com in bz3692\n\nWho broke the test? me.\n\nOpenBSD-Regress-ID: 48f4f5946276f975667141957d25441b3c9a50e2","shortMessageHtmlLink":"upstream: this test has been broken since 2014, and has been"}},{"before":"17b566eeb7a0c6acc9c48b35c08885901186f861","after":"24a1f3e5ad6f4a49377d4c74c36637e9a239efd0","ref":"refs/heads/master","pushedAt":"2024-05-17T04:51:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"attempt at updating RPM specs for sshd-session","shortMessageHtmlLink":"attempt at updating RPM specs for sshd-session"}},{"before":"1c0d81357921f8d3bab06841df649edac515ae5b","after":"17b566eeb7a0c6acc9c48b35c08885901186f861","ref":"refs/heads/master","pushedAt":"2024-05-17T04:47:08.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: g/c unused variable\n\nOpenBSD-Commit-ID: aa6ef0778a1f1bde0d73efba72a777c48d2bd010","shortMessageHtmlLink":"upstream: g/c unused variable"}},{"before":"cbbbf76aa6cd54fce32eacce1300e7abcf9461d4","after":"1c0d81357921f8d3bab06841df649edac515ae5b","ref":"refs/heads/master","pushedAt":"2024-05-10T08:41:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: simplify exit message handling, which was more complicated\n\nthan it needed to be because of unexpunged ssh1 remnants. ok markus@\n\nOpenBSD-Commit-ID: 8b0cd2c0dee75fb053718f442aa89510b684610b","shortMessageHtmlLink":"upstream: simplify exit message handling, which was more complicated"}},{"before":"6a42b70e56bef1aacdcdf06352396e837883e84f","after":"cbbbf76aa6cd54fce32eacce1300e7abcf9461d4","ref":"refs/heads/master","pushedAt":"2024-05-08T04:58:00.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: remove SSH1 leftovers\n\nAuthored with Space Meyer \n\nok djm\n\nOpenBSD-Commit-ID: 81db602e4cb407baae472689db1c222ed7b2afa3","shortMessageHtmlLink":"upstream: remove SSH1 leftovers"}},{"before":"385ecb31e147dfea59c1c488a1d2011d3867e60e","after":"6a42b70e56bef1aacdcdf06352396e837883e84f","ref":"refs/heads/master","pushedAt":"2024-05-07T23:44:32.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"sync getrrsetbyname.c with recent upstream changes","shortMessageHtmlLink":"sync getrrsetbyname.c with recent upstream changes"}},{"before":"14e2b16bc67ffcc188906f65008667e22f73d103","after":"385ecb31e147dfea59c1c488a1d2011d3867e60e","ref":"refs/heads/master","pushedAt":"2024-04-30T06:24:44.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: fix home-directory extension implementation, it always\n\nreturned the current user's home directory contrary to the spec.\n\nPatch from Jakub Jelen via GHPR477\n\nOpenBSD-Commit-ID: 5afd775eab7f9cbe222d7fbae4c793de6c3b3d28","shortMessageHtmlLink":"upstream: fix home-directory extension implementation, it always"}},{"before":"2e69a724051488e3fb3cd11531c4b5bc1764945b","after":"14e2b16bc67ffcc188906f65008667e22f73d103","ref":"refs/heads/master","pushedAt":"2024-04-30T06:17:36.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: flush stdout after writing \"sftp>\" prompt when not using\n\neditline.\n\nFrom Alpine Linux via GHPR480\n\nOpenBSD-Commit-ID: 80bdc7ffe0358dc090eb9b93e6dedb2b087b24cd","shortMessageHtmlLink":"upstream: flush stdout after writing \"sftp>\" prompt when not using"}},{"before":"da757b022bf18c6f7d04e685a10cd96ed00f83da","after":"2e69a724051488e3fb3cd11531c4b5bc1764945b","ref":"refs/heads/master","pushedAt":"2024-04-30T05:53:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: stricter validation of messaging socket fd number; disallow\n\nusage of stderr. Based on GHPR492 by RealHurrison\n\nOpenBSD-Commit-ID: 73dbbe82ea16f73ce1d044d3232bc869ae2f2ce8","shortMessageHtmlLink":"upstream: stricter validation of messaging socket fd number; disallow"}},{"before":"16d0b82fa08038f35f1b3630c70116979f49784f","after":"da757b022bf18c6f7d04e685a10cd96ed00f83da","ref":"refs/heads/master","pushedAt":"2024-04-30T05:46:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: add missing reserved fields to key constraint protocol\n\ndocumentation.\n\nfrom Wiktor Kwapisiewicz via GHPR487\n\nOpenBSD-Commit-ID: 0dfb69998cfdb3fa00cbb0e7809e7d2f6126e3df","shortMessageHtmlLink":"upstream: add missing reserved fields to key constraint protocol"}},{"before":"00e63688920905e326d8667cb47f17a156b6dc8f","after":"16d0b82fa08038f35f1b3630c70116979f49784f","ref":"refs/heads/master","pushedAt":"2024-04-30T02:39:48.000Z","pushType":"push","commitsCount":14,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"depend","shortMessageHtmlLink":"depend"}},{"before":"2eded551ba96e66bc3afbbcc883812c2eac02bd7","after":"00e63688920905e326d8667cb47f17a156b6dc8f","ref":"refs/heads/master","pushedAt":"2024-04-25T03:34:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Shell syntax fix (leftover from a sync).\n\nSigned-off-by: renmingshuai ","shortMessageHtmlLink":"Shell syntax fix (leftover from a sync)."}},{"before":"88351eca17dcc55189991ba60e50819b6d4193c1","after":"2eded551ba96e66bc3afbbcc883812c2eac02bd7","ref":"refs/heads/master","pushedAt":"2024-04-25T03:24:11.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Merge flags for OpenSSL 3.x versions.\n\nOpenSSL has moved to 3.4 which we don't currently accept. Based on\nthe OpenSSL versioning policy[0] it looks like all of the 3.x versions\nshould work with OpenSSH, so remove the distinction in configure and\naccept all of them.\n\n[0] https://openssl.org/policies/general/versioning-policy.html","shortMessageHtmlLink":"Merge flags for OpenSSL 3.x versions."}},{"before":"08f579231cd38a1c657aaa6ddeb8ab57a1fd4f5c","after":"88351eca17dcc55189991ba60e50819b6d4193c1","ref":"refs/heads/master","pushedAt":"2024-04-05T21:18:10.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Fix missing header for systemd notification","shortMessageHtmlLink":"Fix missing header for systemd notification"}},{"before":"43e7c1c07cf6aae7f4394ca8ae91a3efc46514e2","after":"08f579231cd38a1c657aaa6ddeb8ab57a1fd4f5c","ref":"refs/heads/master","pushedAt":"2024-04-03T03:42:26.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"notify systemd on listen and reload\n\nStandalone implementation that does not depend on libsystemd.\nWith assistance from Luca Boccassi, and feedback/testing from Colin\nWatson. bz2641","shortMessageHtmlLink":"notify systemd on listen and reload"}},{"before":"281ea25a44bff53eefb4af7bab7aa670b1f8b6b2","after":"43e7c1c07cf6aae7f4394ca8ae91a3efc46514e2","ref":"refs/heads/master","pushedAt":"2024-03-31T11:27:00.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Port changes from selfhosted to upstream tests.\n\nShould get them working again.","shortMessageHtmlLink":"Port changes from selfhosted to upstream tests."}},{"before":"2d2c068de8d696fe3246f390b146197f51ea1e83","after":"281ea25a44bff53eefb4af7bab7aa670b1f8b6b2","ref":"refs/heads/master","pushedAt":"2024-03-30T07:22:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Check if OpenSSL implementation supports DSA.\n\nIf --enable/disable-dsa-keys is not specified, set based on what OpenSSL\nsupports. If specified as enabled, but not supported by OpenSSL error\nout. ok djm@","shortMessageHtmlLink":"Check if OpenSSL implementation supports DSA."}},{"before":"c2c0bdd3e96b3ef66d77fccb85ff4962dc76caf0","after":"2d2c068de8d696fe3246f390b146197f51ea1e83","ref":"refs/heads/master","pushedAt":"2024-03-30T05:57:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: in OpenSSH private key format, correct type for subsequent\n\nprivate keys in blob. From Jakub Jelen via GHPR430\n\nOpenBSD-Commit-ID: d17dbf47554de2d752061592f95b5d772baab50b","shortMessageHtmlLink":"upstream: in OpenSSH private key format, correct type for subsequent"}},{"before":"02c5ad23124ae801cf248d99ea5068fc4331ca01","after":"c2c0bdd3e96b3ef66d77fccb85ff4962dc76caf0","ref":"refs/heads/master","pushedAt":"2024-03-30T05:49:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Expose SSH_AUTH_INFO_0 always to PAM auth modules.\n\nThis changes SSH_AUTH_INFO_0 to be exposed to PAM auth modules also\nwhen a password authentication method is in use and not only\nwhen a keyboard-interactive authentication method is in use.","shortMessageHtmlLink":"Expose SSH_AUTH_INFO_0 always to PAM auth modules."}},{"before":"cd8a72707c02615365d0851ac51063ab6bfe258f","after":"02c5ad23124ae801cf248d99ea5068fc4331ca01","ref":"refs/heads/master","pushedAt":"2024-03-30T05:42:30.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Rearrange selfhosted VM scheduling.\n\nInstead of trying to infer the type of the self hosted tests in each of\nthe driver scripts (inconsistently...), set one of the following\nvariables to \"true\" in the workflow:\n\nVM: tests run in a virtual machine.\nEPHEMERAL: tests run on an ephemeral virtual machine.\nPERSISTENT: tests run on a persistent virtual machine\nREMOTE: tests run on a physical remote host.\n\nEPHEMERAL VMs can have multiple instances of any given VM can exist\nsimultaneously and are run by a runner pool. The other types have a\ndedicated runner instance and can only run a single test at a time.\n\nOther settings:\nSSHFS: We need to sshfs mount over the repo so the workflow can collect\n\tbuild artifacts. This also implies the tests must be run over ssh.\nDEBUG_ACTIONS: enable \"set -x\" in scripts for debugging.","shortMessageHtmlLink":"Rearrange selfhosted VM scheduling."}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEY88N7AA","startCursor":null,"endCursor":null}},"title":"Activity ยท openssh/openssh-portable"}