@SuppressWarnings("rawtypes") public void setInMemoryServersOptions(Map serversOptions) { if (getHostOptionsProvider() instanceof DefaultSVNHostOptionsProvider) { DefaultSVNHostOptionsProvider defaultHostOptionsProvider = (DefaultSVNHostOptionsProvider) getHostOptionsProvider(); defaultHostOptionsProvider.setInMemoryServersOptions(serversOptions); } }
public Collection<String> getAuthTypes(SVNURL url) { return getHostOptionsProvider().getHostOptions(url).getAuthTypes(); }
public TrustManager getTrustManager(SVNURL url) throws SVNException { final ISVNHostOptions hostOptions = getHostOptionsProvider().getHostOptions(url); boolean trustAll = hostOptions.trustDefaultSSLCertificateAuthority(); File[] serverCertFiles = hostOptions.getSSLAuthorityFiles(); File authDir = new File(myConfigDirectory, "auth/svn.ssl.server"); return new DefaultSVNSSLTrustManager(authDir, url, serverCertFiles, trustAll, this); }
protected ISVNAuthenticationProvider createCacheAuthenticationProvider(File authDir, String userName) { ISVNAuthenticationStorageOptions delegatingOptions = createAuthenticationStorageOptions(); return new DefaultSVNPersistentAuthenticationProvider(authDir, userName, delegatingOptions, getDefaultOptions(), getHostOptionsProvider()); }
public int getReadTimeout(SVNRepository repository) { return getHostOptionsProvider().getHostOptions(repository.getLocation()).getReadTimeout(); }
public int getConnectTimeout(SVNRepository repository) { return getHostOptionsProvider().getHostOptions(repository.getLocation()).getConnectTimeout(); }
protected SVNSSHAuthentication getDefaultSSHAuthentication(SVNURL url) { String userName = getDefaultOptions().getDefaultSSHUserName(); String password = getDefaultOptions().getDefaultSSHPassword(); String keyFile = getDefaultOptions().getDefaultSSHKeyFile(); int port = getDefaultOptions().getDefaultSSHPortNumber(); String passphrase = getDefaultOptions().getDefaultSSHPassphrase(); if (userName != null && password != null) { return SVNSSHAuthentication.newInstance(userName, password.toCharArray(), port, getHostOptionsProvider().getHostOptions(url).isAuthStorageEnabled(), url, false); } else if (userName != null && keyFile != null) { return SVNSSHAuthentication.newInstance(userName, new File(keyFile), passphrase != null ? passphrase.toCharArray() : null, port, getHostOptionsProvider().getHostOptions(url).isAuthStorageEnabled(), url, false); } return null; }
} else if (ISVNAuthenticationManager.PASSWORD.equals(kind)) { if (myUserName == null || "".equals(myUserName.trim())) { String defaultUserName = getHostOptionsProvider().getHostOptions(url).getUserName(); defaultUserName = defaultUserName == null ? System.getProperty("user.name") : defaultUserName; if (defaultUserName != null) {
public ISVNProxyManager getProxyManager(SVNURL url) throws SVNException { final ISVNHostOptions hostOptions = getHostOptionsProvider().getHostOptions(url); String proxyHost = hostOptions.getProxyHost(); if (proxyHost == null) { return null; } String proxyPort = hostOptions.getProxyPort(); String proxyUser = hostOptions.getProxyUserName(); String proxyPassword = hostOptions.getProxyPassword(); return new SimpleProxyManager(proxyHost, proxyPort, proxyUser, proxyPassword); }
return SVNUserNameAuthentication.newInstance("", getHostOptionsProvider().getHostOptions(url).isAuthStorageEnabled(), url, false);
boolean store = myAuthManager.getHostOptionsProvider().getHostOptions(myURL).isAuthStorageEnabled(); final CertificateException exception = checkServerTrustedByDefault(certs, algorithm); if (exception != null && exception.getMessage().indexOf("Certificates does not conform to algorithm constraints") >= 0) {
public void verifyHostKey(String hostName, int port, String keyAlgorithm, byte[] hostKey) throws SVNException { String realm = hostName + ":" + port + " <" + keyAlgorithm + ">"; byte[] existingFingerprints = (byte[]) getRuntimeAuthStorage().getData("svn.ssh.server", realm); if (existingFingerprints == null && myProviders[2] instanceof ISVNPersistentAuthenticationProvider) { existingFingerprints = ((ISVNPersistentAuthenticationProvider) myProviders[2]).loadFingerprints(realm); } if (existingFingerprints == null || !equals(existingFingerprints, hostKey)) { SVNURL url = SVNURL.create("svn+ssh", null, hostName, port, "", true); final ISVNHostOptions hostOptions = getHostOptionsProvider().getHostOptions(url); boolean storageEnabled = hostOptions.isAuthStorageEnabled(); if (getAuthenticationProvider() != null) { int accepted = getAuthenticationProvider().acceptServerAuthentication(url, realm, hostKey, storageEnabled); if (accepted == ISVNAuthenticationProvider.ACCEPTED && storageEnabled) { if (storageEnabled && hostKey != null && myProviders[2] instanceof ISVNPersistentAuthenticationProvider) { ((ISVNPersistentAuthenticationProvider) myProviders[2]).saveFingerprints(realm, hostKey); } } else if (accepted == ISVNAuthenticationProvider.REJECTED) { throw new SVNAuthenticationException(SVNErrorMessage.create(SVNErrorCode.AUTHN_CREDS_NOT_SAVED, "Host key ('" + realm + "') can not be verified.")); } if (hostKey != null) { getRuntimeAuthStorage().putData("svn.ssh.server", realm, hostKey); } } } }