jgit/org.eclipse.jgit.ssh.apache/META-INF/MANIFEST.MF

99 lines
5.1 KiB
Plaintext
Raw Normal View History

Manifest-Version: 1.0
Bundle-ManifestVersion: 2
Bundle-Name: %Bundle-Name
Automatic-Module-Name: org.eclipse.jgit.ssh.apache
Bundle-SymbolicName: org.eclipse.jgit.ssh.apache
Bundle-Vendor: %Bundle-Vendor
Bundle-Localization: plugin
Bundle-ActivationPolicy: lazy
Bundle-Version: 6.7.0.qualifier
Bundle-RequiredExecutionEnvironment: JavaSE-11
Export-Package: org.eclipse.jgit.internal.transport.sshd;version="6.7.0";x-internal:=true;
uses:="org.apache.sshd.client,
org.apache.sshd.client.auth,
org.apache.sshd.client.auth.keyboard,
org.apache.sshd.client.auth.pubkey,
org.apache.sshd.client.config.hosts,
org.apache.sshd.client.future,
org.apache.sshd.client.keyverifier,
org.apache.sshd.client.session,
org.apache.sshd.common.config.keys,
org.apache.sshd.common.io,
org.apache.sshd.common.keyprovider,
org.apache.sshd.common.signature,
org.apache.sshd.common.util.buffer,
org.eclipse.jgit.transport",
org.eclipse.jgit.internal.transport.sshd.agent;version="6.7.0";x-internal:=true,
org.eclipse.jgit.internal.transport.sshd.auth;version="6.7.0";x-internal:=true,
ssh: PKCS#11 support Support PKCS#11 HSMs (like YubiKey PIV) for SSH authentication. Use the SunPKCS11 provider as described at [1]. This provider dynamically loads the library from the PKCS11Provider SSH configuration and creates a Java KeyStore with that provider. A Java CallbackHandler is needed to feed PIN prompts from the KeyStore into the JGit CredentialsProvider framework. Because the JGit CredentialsProvider may be specific to a SSH session but the PKCS11Provider may be used by several sessions, the CallbackHandler needs to be configurable per session. PIN prompts respect the NumberOfPasswordPrompts SSH configuration. As long as the library asks only for a PIN, we use the KeyPasswordProvider to prompt for it. This gives automatic integration in Eclipse with the Eclipse secure storage, so a user has even the option to store the PIN there. (Eclipse will then ask for the secure storage master password on first access, so the usefulness of this is debatable.) By default the provider uses the first PKCS#11 token (slot list index zero). This can be overridden by a non-standard PKCS11SlotListIndex ssh configuration entry. (For OpenSSH interoperability, also set "IgnoreUnknown PKCS11SlotListIndex" in the SSH config file then.) Once loaded, the provider and its shared library and the keys contained remain available until the application exits. Manually tested using SoftHSM. See file manual_tests.txt. Kudos to Christopher Lamb for additional manual testing with a real YubiKey, also on Windows.[2] [1] https://docs.oracle.com/en/java/javase/11/security/pkcs11-reference-guide1.html [2] https://www.eclipse.org/forums/index.php/t/1113295/ Change-Id: I544c97e1e24d05e28a9f0e803fd4b9151a76ed11 Signed-off-by: Thomas Wolf <twolf@apache.org>
2023-07-09 21:06:37 +03:00
org.eclipse.jgit.internal.transport.sshd.pkcs11;version="6.7.0";x-internal:=true,
org.eclipse.jgit.internal.transport.sshd.proxy;version="6.7.0";x-friends:="org.eclipse.jgit.ssh.apache.test",
org.eclipse.jgit.transport.sshd;version="6.7.0";
uses:="org.eclipse.jgit.transport,
org.apache.sshd.client.config.hosts,
org.apache.sshd.common.keyprovider,
org.eclipse.jgit.util,
org.apache.sshd.client.session,
org.apache.sshd.client.keyverifier",
org.eclipse.jgit.transport.sshd.agent;version="6.7.0"
Import-Package: net.i2p.crypto.eddsa;version="[0.3.0,0.4.0)",
org.apache.sshd.agent;version="[2.10.0,2.11.0)",
org.apache.sshd.client;version="[2.10.0,2.11.0)",
org.apache.sshd.client.auth;version="[2.10.0,2.11.0)",
org.apache.sshd.client.auth.keyboard;version="[2.10.0,2.11.0)",
org.apache.sshd.client.auth.password;version="[2.10.0,2.11.0)",
org.apache.sshd.client.auth.pubkey;version="[2.10.0,2.11.0)",
org.apache.sshd.client.channel;version="[2.10.0,2.11.0)",
org.apache.sshd.client.config.hosts;version="[2.10.0,2.11.0)",
org.apache.sshd.client.config.keys;version="[2.10.0,2.11.0)",
org.apache.sshd.client.future;version="[2.10.0,2.11.0)",
org.apache.sshd.client.keyverifier;version="[2.10.0,2.11.0)",
org.apache.sshd.client.session;version="[2.10.0,2.11.0)",
org.apache.sshd.client.session.forward;version="[2.10.0,2.11.0)",
org.apache.sshd.common;version="[2.10.0,2.11.0)",
org.apache.sshd.common.auth;version="[2.10.0,2.11.0)",
org.apache.sshd.common.channel;version="[2.10.0,2.11.0)",
org.apache.sshd.common.compression;version="[2.10.0,2.11.0)",
org.apache.sshd.common.config.keys;version="[2.10.0,2.11.0)",
org.apache.sshd.common.config.keys.loader;version="[2.10.0,2.11.0)",
org.apache.sshd.common.config.keys.loader.openssh.kdf;version="[2.10.0,2.11.0)",
org.apache.sshd.common.config.keys.u2f;version="[2.10.0,2.11.0)",
org.apache.sshd.common.digest;version="[2.10.0,2.11.0)",
org.apache.sshd.common.forward;version="[2.10.0,2.11.0)",
org.apache.sshd.common.future;version="[2.10.0,2.11.0)",
org.apache.sshd.common.helpers;version="[2.10.0,2.11.0)",
org.apache.sshd.common.io;version="[2.10.0,2.11.0)",
org.apache.sshd.common.kex;version="[2.10.0,2.11.0)",
org.apache.sshd.common.kex.extension;version="[2.10.0,2.11.0)",
org.apache.sshd.common.kex.extension.parser;version="[2.10.0,2.11.0)",
org.apache.sshd.common.keyprovider;version="[2.10.0,2.11.0)",
org.apache.sshd.common.mac;version="[2.10.0,2.11.0)",
org.apache.sshd.common.random;version="[2.10.0,2.11.0)",
org.apache.sshd.common.session;version="[2.10.0,2.11.0)",
org.apache.sshd.common.session.helpers;version="[2.10.0,2.11.0)",
org.apache.sshd.common.signature;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.buffer;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.buffer.keys;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.closeable;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.io;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.io.der;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.io.functors;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.io.resource;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.logging;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.net;version="[2.10.0,2.11.0)",
org.apache.sshd.common.util.security;version="[2.10.0,2.11.0)",
org.apache.sshd.core;version="[2.10.0,2.11.0)",
org.apache.sshd.server.auth;version="[2.10.0,2.11.0)",
org.apache.sshd.sftp;version="[2.10.0,2.11.0)",
org.apache.sshd.sftp.client;version="[2.10.0,2.11.0)",
org.apache.sshd.sftp.common;version="[2.10.0,2.11.0)",
org.eclipse.jgit.annotations;version="[6.7.0,6.8.0)",
org.eclipse.jgit.errors;version="[6.7.0,6.8.0)",
org.eclipse.jgit.fnmatch;version="[6.7.0,6.8.0)",
org.eclipse.jgit.internal.storage.file;version="[6.7.0,6.8.0)",
org.eclipse.jgit.internal.transport.ssh;version="[6.7.0,6.8.0)",
org.eclipse.jgit.nls;version="[6.7.0,6.8.0)",
org.eclipse.jgit.transport;version="[6.7.0,6.8.0)",
org.eclipse.jgit.util;version="[6.7.0,6.8.0)",
org.slf4j;version="[1.7.0,2.0.0)"