JGit 5.11 New and Noteworthy | ||
---|---|---|
![]() |
||
Contributors |
The git protocol is the application-layer protocol git uses for communication between a git client and an upstream (git server). It is implemented atop the transport protocol (like HTTPS or SSH). Git has two different protocols for communicating with an upstream. Protocol V2 is supposed to be more efficient than the older protocol V0/V1.
JGit 5.11 supports git protocol V2 for fetching. When JGit does a fetch, it always requests protocol V2 (unless overridden by a git config, see below). If the server response indicates that the server can do only protocol V0/V1, JGit falls back to using that older protocol. If the server replies with a valid protocol V2 answer, protocol V2 is used.
On the client side, git config protocol.version
controls which protocol is used by JGit for fetching. Possible values are:
(Protocol V0 and V1 are identical except for an additional line "version 1" in V1 in the initial server response. JGit handles both.)
Pushing via JGit always uses protocol V0.
JGit's server side (class UploadPack) has supported protocol V2 for handling fetches for a while already, but it was not the default. With JGit 5.11, protocol V2 has been made the default also for the server side.
JGit 5.11.0 supports preemptive Basic authentication on HTTP or HTTPS connections. Preemptive authentication may save an extra request if it is known that the host will accept the HTTP Basic authentication scheme, and if the user name and password are known up front. There are two ways to use this:
TransportHttp.setPreemptiveBasicAuthentication(String username, String password)
, which can be used, e.g., in a TransportConfigCallback
to configure the transport used by higher-level API commands. Setting a username and password via this method overrides a username and password that might be present in the URL.Programmatically, one might do
String username = ...; String password = ...; Git newlyCloned = Git.cloneRepository() .setDirectory(someDirectory) .setURI(remoteURI) .setTransportConfigCallback(transport -> { if (transport instanceof TransportHttp) { ((TransportHttp) transport).setPreemptiveBasicAuthentication(username, password); } }) .call(); // Do something with 'newlyCloned' // Don't forget to close it eventually when you're done! (Could also use try-with-resource.) newlyCloned.close();
If the original URL results in a redirect to another host, the preemptive Basic authentication is not propagated.
org.eclipse.jgit.lib.GpgObjectSigner
that can be implemented to sign not only commits but also tags; a default implementation using the
Bouncy Castle crypto libraries is available in bundle org.eclipse.jgit.gpg.bc
. API class org.eclipse.jgit.api.TagCommand
has been extended to be able to sign tags using such a GpgObjectSigner, and the command-line program org.eclipse.jgit.pgm.Tag
also supports it. Git configs
tag.gpgSign and
tag.forceSignAnnotated are implemented.
org.eclipse.jgit.api.VerifySignatureCommand
. The JGit command-line program now implements git tag -v, git log --show-signature, and git show --show-signature. An implementation of the new interface org.eclipse.jgit.lib.GpgSignatureVerifier
must be available; a default implementation using the
Bouncy Castle crypto libraries is provided by bundle org.eclipse.jgit.gpg.bc
.
Note that all signature handling in JGit so far is for OpenPGP signatures only . S/MIME X.509 signatures are not handled yet.
org.eclipse.jgit.ssh.apache
newly requires
Apache MINA sshd
2.6.0 (previously 2.4.0). As always, this bundle may not work with newer versions of Apache MINA sshd because of incompatible upstream API changes.
The complete list of new features and bug fixes is available in the release notes.
![]() |
||
Contributors |