You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

AuthenticationChallenge.java 3.8KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. /*
  2. * Copyright (C) 2018, Thomas Wolf <thomas.wolf@paranor.ch>
  3. * and other copyright owners as documented in the project's IP log.
  4. *
  5. * This program and the accompanying materials are made available
  6. * under the terms of the Eclipse Distribution License v1.0 which
  7. * accompanies this distribution, is reproduced below, and is
  8. * available at http://www.eclipse.org/org/documents/edl-v10.php
  9. *
  10. * All rights reserved.
  11. *
  12. * Redistribution and use in source and binary forms, with or
  13. * without modification, are permitted provided that the following
  14. * conditions are met:
  15. *
  16. * - Redistributions of source code must retain the above copyright
  17. * notice, this list of conditions and the following disclaimer.
  18. *
  19. * - Redistributions in binary form must reproduce the above
  20. * copyright notice, this list of conditions and the following
  21. * disclaimer in the documentation and/or other materials provided
  22. * with the distribution.
  23. *
  24. * - Neither the name of the Eclipse Foundation, Inc. nor the
  25. * names of its contributors may be used to endorse or promote
  26. * products derived from this software without specific prior
  27. * written permission.
  28. *
  29. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
  30. * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
  31. * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  32. * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  33. * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
  34. * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  35. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  36. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  37. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  38. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  39. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  40. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
  41. * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  42. */
  43. package org.eclipse.jgit.internal.transport.sshd.proxy;
  44. import java.util.Collections;
  45. import java.util.LinkedHashMap;
  46. import java.util.Map;
  47. import org.eclipse.jgit.annotations.NonNull;
  48. /**
  49. * A simple representation of an authentication challenge as sent in a
  50. * "WWW-Authenticate" or "Proxy-Authenticate" header. Such challenges start with
  51. * a mechanism name, followed either by one single token, or by a list of
  52. * key=value pairs.
  53. *
  54. * @see <a href="https://tools.ietf.org/html/rfc7235#section-2.1">RFC 7235, sec.
  55. * 2.1</a>
  56. */
  57. public class AuthenticationChallenge {
  58. private final String mechanism;
  59. private String token;
  60. private Map<String, String> arguments;
  61. /**
  62. * Create a new {@link AuthenticationChallenge} with the given mechanism.
  63. *
  64. * @param mechanism
  65. * for the challenge
  66. */
  67. public AuthenticationChallenge(String mechanism) {
  68. this.mechanism = mechanism;
  69. }
  70. /**
  71. * Retrieves the authentication mechanism specified by this challenge, for
  72. * instance "Basic".
  73. *
  74. * @return the mechanism name
  75. */
  76. public String getMechanism() {
  77. return mechanism;
  78. }
  79. /**
  80. * Retrieves the token of the challenge, if any.
  81. *
  82. * @return the token, or {@code null} if there is none.
  83. */
  84. public String getToken() {
  85. return token;
  86. }
  87. /**
  88. * Retrieves the arguments of the challenge.
  89. *
  90. * @return a possibly empty map of the key=value arguments of the challenge
  91. */
  92. @NonNull
  93. public Map<String, String> getArguments() {
  94. return arguments == null ? Collections.emptyMap() : arguments;
  95. }
  96. void addArgument(String key, String value) {
  97. if (arguments == null) {
  98. arguments = new LinkedHashMap<>();
  99. }
  100. arguments.put(key, value);
  101. }
  102. void setToken(String token) {
  103. this.token = token;
  104. }
  105. @Override
  106. public String toString() {
  107. return "AuthenticationChallenge[" + mechanism + ',' + token + ',' //$NON-NLS-1$
  108. + (arguments == null ? "<none>" : arguments.toString()) + ']'; //$NON-NLS-1$
  109. }
  110. }