1
0
mirror of https://github.com/git/git.git synced 2024-11-08 12:59:54 +01:00

credential: add method for querying capabilities

Right now, there's no specific way to determine whether a credential
helper or git credential itself supports a given set of capabilities.
It would be helpful to have such a way, so let's let credential helpers
and git credential take an argument, "capability", which has it list the
capabilities and a version number on standard output.

Specifically choose a format that is slightly different from regular
credential output and assume that no capabilities are supported if a
non-zero exit status occurs or the data deviates from the format.  It is
common for users to write small shell scripts as the argument to
credential.helper, which will almost never be designed to emit
capabilities.  We want callers to gracefully handle this case by
assuming that they are not capable of extended support because that is
almost certainly the case, and specifying the error behavior up front
does this and preserves backwards compatibility in a graceful way.

Signed-off-by: brian m. carlson <sandals@crustytoothpaste.net>
Signed-off-by: Junio C Hamano <gitster@pobox.com>
This commit is contained in:
brian m. carlson 2024-04-17 00:02:40 +00:00 committed by Junio C Hamano
parent 40220f48b1
commit ffff4ac065
5 changed files with 60 additions and 1 deletions

@ -8,7 +8,7 @@ git-credential - Retrieve and store user credentials
SYNOPSIS SYNOPSIS
-------- --------
------------------ ------------------
'git credential' (fill|approve|reject) 'git credential' (fill|approve|reject|capability)
------------------ ------------------
DESCRIPTION DESCRIPTION
@ -41,6 +41,9 @@ If the action is `reject`, git-credential will send the description to
any configured credential helpers, which may erase any stored any configured credential helpers, which may erase any stored
credentials matching the description. credentials matching the description.
If the action is `capability`, git-credential will announce any capabilities
it supports to standard output.
If the action is `approve` or `reject`, no output should be emitted. If the action is `approve` or `reject`, no output should be emitted.
TYPICAL USE OF GIT CREDENTIAL TYPICAL USE OF GIT CREDENTIAL
@ -263,6 +266,29 @@ is supported, but they should not be provided without the capability.
Unrecognised attributes and capabilities are silently discarded. Unrecognised attributes and capabilities are silently discarded.
[[CAPA-IOFMT]]
CAPABILITY INPUT/OUTPUT FORMAT
------------------------------
For `git credential capability`, the format is slightly different. First, a
`version 0` announcement is made to indicate the current version of the
protocol, and then each capability is announced with a line like `capability
authtype`. Credential helpers may also implement this format, again with the
`capability` argument. Additional lines may be added in the future; callers
should ignore lines which they don't understand.
Because this is a new part of the credential helper protocol, older versions of
Git, as well as some credential helpers, may not support it. If a non-zero
exit status is received, or if the first line doesn't start with the word
`version` and a space, callers should assume that no capabilities are supported.
The intention of this format is to differentiate it from the credential output
in an unambiguous way. It is possible to use very simple credential helpers
(e.g., inline shell scripts) which always produce identical output. Using a
distinct format allows users to continue to use this syntax without having to
worry about correctly implementing capability advertisements or accidentally
confusing callers querying for capabilities.
GIT GIT
--- ---
Part of the linkgit:git[1] suite Part of the linkgit:git[1] suite

@ -1,4 +1,5 @@
#include "builtin.h" #include "builtin.h"
#include "credential.h"
#include "gettext.h" #include "gettext.h"
#include "parse-options.h" #include "parse-options.h"
#include "path.h" #include "path.h"
@ -127,6 +128,13 @@ static char *get_socket_path(void)
return socket; return socket;
} }
static void announce_capabilities(void)
{
struct credential c = CREDENTIAL_INIT;
c.capa_authtype.request_initial = 1;
credential_announce_capabilities(&c, stdout);
}
int cmd_credential_cache(int argc, const char **argv, const char *prefix) int cmd_credential_cache(int argc, const char **argv, const char *prefix)
{ {
char *socket_path = NULL; char *socket_path = NULL;
@ -160,6 +168,8 @@ int cmd_credential_cache(int argc, const char **argv, const char *prefix)
do_cache(socket_path, op, timeout, FLAG_RELAY); do_cache(socket_path, op, timeout, FLAG_RELAY);
else if (!strcmp(op, "store")) else if (!strcmp(op, "store"))
do_cache(socket_path, op, timeout, FLAG_RELAY|FLAG_SPAWN); do_cache(socket_path, op, timeout, FLAG_RELAY|FLAG_SPAWN);
else if (!strcmp(op, "capability"))
announce_capabilities();
else else
; /* ignore unknown operation */ ; /* ignore unknown operation */

@ -17,6 +17,12 @@ int cmd_credential(int argc, const char **argv, const char *prefix UNUSED)
usage(usage_msg); usage(usage_msg);
op = argv[1]; op = argv[1];
if (!strcmp(op, "capability")) {
credential_set_all_capabilities(&c, CREDENTIAL_OP_INITIAL);
credential_announce_capabilities(&c, stdout);
return 0;
}
if (credential_read(&c, stdin, CREDENTIAL_OP_INITIAL) < 0) if (credential_read(&c, stdin, CREDENTIAL_OP_INITIAL) < 0)
die("unable to read credential from stdin"); die("unable to read credential from stdin");

@ -72,6 +72,17 @@ void credential_set_all_capabilities(struct credential *c,
credential_set_capability(&c->capa_state, op_type); credential_set_capability(&c->capa_state, op_type);
} }
static void announce_one(struct credential_capability *cc, const char *name, FILE *fp) {
if (cc->request_initial)
fprintf(fp, "capability %s\n", name);
}
void credential_announce_capabilities(struct credential *c, FILE *fp) {
fprintf(fp, "version 0\n");
announce_one(&c->capa_authtype, "authtype", fp);
announce_one(&c->capa_state, "state", fp);
}
int credential_match(const struct credential *want, int credential_match(const struct credential *want,
const struct credential *have, int match_password) const struct credential *have, int match_password)
{ {

@ -253,6 +253,12 @@ void credential_set_all_capabilities(struct credential *c,
*/ */
void credential_clear_secrets(struct credential *c); void credential_clear_secrets(struct credential *c);
/**
* Print a list of supported capabilities and version numbers to standard
* output.
*/
void credential_announce_capabilities(struct credential *c, FILE *fp);
/** /**
* Prepares the credential for the next iteration of the helper protocol by * Prepares the credential for the next iteration of the helper protocol by
* updating the state headers to send with the ones read by the last iteration * updating the state headers to send with the ones read by the last iteration