305 lines
		
	
	
		
			9.7 KiB
		
	
	
	
		
			C
		
	
	
			
		
		
	
	
			305 lines
		
	
	
		
			9.7 KiB
		
	
	
	
		
			C
		
	
	
| #ifndef CREDENTIAL_H
 | |
| #define CREDENTIAL_H
 | |
| 
 | |
| #include "string-list.h"
 | |
| #include "strvec.h"
 | |
| 
 | |
| /**
 | |
|  * The credentials API provides an abstracted way of gathering
 | |
|  * authentication credentials from the user.
 | |
|  *
 | |
|  * Typical setup
 | |
|  * -------------
 | |
|  *
 | |
|  * ------------
 | |
|  * +-----------------------+
 | |
|  * | Git code (C)          |--- to server requiring --->
 | |
|  * |                       |        authentication
 | |
|  * |.......................|
 | |
|  * | C credential API      |--- prompt ---> User
 | |
|  * +-----------------------+
 | |
|  * 	^      |
 | |
|  * 	| pipe |
 | |
|  * 	|      v
 | |
|  * +-----------------------+
 | |
|  * | Git credential helper |
 | |
|  * +-----------------------+
 | |
|  * ------------
 | |
|  *
 | |
|  * The Git code (typically a remote-helper) will call the C API to obtain
 | |
|  * credential data like a login/password pair (credential_fill). The
 | |
|  * API will itself call a remote helper (e.g. "git credential-cache" or
 | |
|  * "git credential-store") that may retrieve credential data from a
 | |
|  * store. If the credential helper cannot find the information, the C API
 | |
|  * will prompt the user. Then, the caller of the API takes care of
 | |
|  * contacting the server, and does the actual authentication.
 | |
|  *
 | |
|  * C API
 | |
|  * -----
 | |
|  *
 | |
|  * The credential C API is meant to be called by Git code which needs to
 | |
|  * acquire or store a credential. It is centered around an object
 | |
|  * representing a single credential and provides three basic operations:
 | |
|  * fill (acquire credentials by calling helpers and/or prompting the user),
 | |
|  * approve (mark a credential as successfully used so that it can be stored
 | |
|  * for later use), and reject (mark a credential as unsuccessful so that it
 | |
|  * can be erased from any persistent storage).
 | |
|  *
 | |
|  * Example
 | |
|  * ~~~~~~~
 | |
|  *
 | |
|  * The example below shows how the functions of the credential API could be
 | |
|  * used to login to a fictitious "foo" service on a remote host:
 | |
|  *
 | |
|  * -----------------------------------------------------------------------
 | |
|  * int foo_login(struct foo_connection *f)
 | |
|  * {
 | |
|  * 	int status;
 | |
|  * 	// Create a credential with some context; we don't yet know the
 | |
|  * 	// username or password.
 | |
|  *
 | |
|  * struct credential c = CREDENTIAL_INIT;
 | |
|  * c.protocol = xstrdup("foo");
 | |
|  * c.host = xstrdup(f->hostname);
 | |
|  *
 | |
|  * // Fill in the username and password fields by contacting
 | |
|  * // helpers and/or asking the user. The function will die if it
 | |
|  * // fails.
 | |
|  * credential_fill(&c);
 | |
|  *
 | |
|  * // Otherwise, we have a username and password. Try to use it.
 | |
|  *
 | |
|  * status = send_foo_login(f, c.username, c.password);
 | |
|  * switch (status) {
 | |
|  * case FOO_OK:
 | |
|  * // It worked. Store the credential for later use.
 | |
|  * credential_accept(&c);
 | |
|  * break;
 | |
|  * case FOO_BAD_LOGIN:
 | |
|  * // Erase the credential from storage so we don't try it again.
 | |
|  * credential_reject(&c);
 | |
|  * break;
 | |
|  * default:
 | |
|  * // Some other error occurred. We don't know if the
 | |
|  * // credential is good or bad, so report nothing to the
 | |
|  * // credential subsystem.
 | |
|  * }
 | |
|  *
 | |
|  * // Free any associated resources.
 | |
|  * credential_clear(&c);
 | |
|  *
 | |
|  * return status;
 | |
|  * }
 | |
|  * -----------------------------------------------------------------------
 | |
|  */
 | |
| 
 | |
| /*
 | |
|  * These values define the kind of operation we're performing and the
 | |
|  * capabilities at each stage.  The first is either an external request (via git
 | |
|  * credential fill) or an internal request (e.g., via the HTTP) code.  The
 | |
|  * second is the call to the credential helper, and the third is the response
 | |
|  * we're providing.
 | |
|  *
 | |
|  * At each stage, we will emit the capability only if the previous stage
 | |
|  * supported it.
 | |
|  */
 | |
| enum credential_op_type {
 | |
| 	CREDENTIAL_OP_INITIAL  = 1,
 | |
| 	CREDENTIAL_OP_HELPER   = 2,
 | |
| 	CREDENTIAL_OP_RESPONSE = 3,
 | |
| };
 | |
| 
 | |
| struct credential_capability {
 | |
| 	unsigned request_initial:1,
 | |
| 		 request_helper:1,
 | |
| 		 response:1;
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * This struct represents a single login credential (typically a
 | |
|  * username/password combination) along with any associated
 | |
|  * context. All string fields should be heap-allocated (or NULL if
 | |
|  * they are not known or not applicable). The meaning of the
 | |
|  * individual context fields is the same as their counterparts in
 | |
|  * the helper protocol.
 | |
|  *
 | |
|  * This struct should always be initialized with `CREDENTIAL_INIT` or
 | |
|  * `credential_init`.
 | |
|  */
 | |
| struct credential {
 | |
| 
 | |
| 	/**
 | |
| 	 * A `string_list` of helpers. Each string specifies an external
 | |
| 	 * helper which will be run, in order, to either acquire or store
 | |
| 	 * credentials. This list is filled-in by the API functions
 | |
| 	 * according to the corresponding configuration variables before
 | |
| 	 * consulting helpers, so there usually is no need for a caller to
 | |
| 	 * modify the helpers field at all.
 | |
| 	 */
 | |
| 	struct string_list helpers;
 | |
| 
 | |
| 	/**
 | |
| 	 * A `strvec` of WWW-Authenticate header values. Each string
 | |
| 	 * is the value of a WWW-Authenticate header in an HTTP response,
 | |
| 	 * in the order they were received in the response.
 | |
| 	 */
 | |
| 	struct strvec wwwauth_headers;
 | |
| 
 | |
| 	/**
 | |
| 	 * A `strvec` of state headers received from credential helpers.
 | |
| 	 */
 | |
| 	struct strvec state_headers;
 | |
| 
 | |
| 	/**
 | |
| 	 * A `strvec` of state headers to send to credential helpers.
 | |
| 	 */
 | |
| 	struct strvec state_headers_to_send;
 | |
| 
 | |
| 	/**
 | |
| 	 * Internal use only. Keeps track of if we previously matched against a
 | |
| 	 * WWW-Authenticate header line in order to re-fold future continuation
 | |
| 	 * lines into one value.
 | |
| 	 */
 | |
| 	unsigned header_is_last_match:1;
 | |
| 
 | |
| 	unsigned approved:1,
 | |
| 		 ephemeral:1,
 | |
| 		 configured:1,
 | |
| 		 multistage: 1,
 | |
| 		 quit:1,
 | |
| 		 use_http_path:1,
 | |
| 		 username_from_proto:1;
 | |
| 
 | |
| 	struct credential_capability capa_authtype;
 | |
| 	struct credential_capability capa_state;
 | |
| 
 | |
| 	char *username;
 | |
| 	char *password;
 | |
| 	char *credential;
 | |
| 	char *protocol;
 | |
| 	char *host;
 | |
| 	char *path;
 | |
| 	char *oauth_refresh_token;
 | |
| 	timestamp_t password_expiry_utc;
 | |
| 
 | |
| 	/**
 | |
| 	 * The authorization scheme to use.  If this is NULL, libcurl is free to
 | |
| 	 * negotiate any scheme it likes.
 | |
| 	 */
 | |
| 	char *authtype;
 | |
| };
 | |
| 
 | |
| #define CREDENTIAL_INIT { \
 | |
| 	.helpers = STRING_LIST_INIT_DUP, \
 | |
| 	.password_expiry_utc = TIME_MAX, \
 | |
| 	.wwwauth_headers = STRVEC_INIT, \
 | |
| 	.state_headers = STRVEC_INIT, \
 | |
| 	.state_headers_to_send = STRVEC_INIT, \
 | |
| }
 | |
| 
 | |
| /* Initialize a credential structure, setting all fields to empty. */
 | |
| void credential_init(struct credential *);
 | |
| 
 | |
| /**
 | |
|  * Free any resources associated with the credential structure, returning
 | |
|  * it to a pristine initialized state.
 | |
|  */
 | |
| void credential_clear(struct credential *);
 | |
| 
 | |
| /**
 | |
|  * Instruct the credential subsystem to fill the username and
 | |
|  * password (or authtype and credential) fields of the passed
 | |
|  * credential struct by first consulting helpers, then asking the
 | |
|  * user. After this function returns, either the username and
 | |
|  * password fields or the credential field of the credential are
 | |
|  * guaranteed to be non-NULL. If an error occurs, the function
 | |
|  * will die().
 | |
|  *
 | |
|  * If all_capabilities is set, this is an internal user that is prepared
 | |
|  * to deal with all known capabilities, and we should advertise that fact.
 | |
|  */
 | |
| void credential_fill(struct credential *, int all_capabilities);
 | |
| 
 | |
| /**
 | |
|  * Inform the credential subsystem that the provided credentials
 | |
|  * were successfully used for authentication.  This will cause the
 | |
|  * credential subsystem to notify any helpers of the approval, so
 | |
|  * that they may store the result to be used again.  Any errors
 | |
|  * from helpers are ignored.
 | |
|  */
 | |
| void credential_approve(struct credential *);
 | |
| 
 | |
| /**
 | |
|  * Inform the credential subsystem that the provided credentials
 | |
|  * have been rejected. This will cause the credential subsystem to
 | |
|  * notify any helpers of the rejection (which allows them, for
 | |
|  * example, to purge the invalid credentials from storage). It
 | |
|  * will also free() the username, password, and credential fields
 | |
|  * of the credential and set them to NULL (readying the credential
 | |
|  * for another call to `credential_fill`). Any errors from helpers
 | |
|  * are ignored.
 | |
|  */
 | |
| void credential_reject(struct credential *);
 | |
| 
 | |
| /**
 | |
|  * Enable all of the supported credential flags in this credential.
 | |
|  */
 | |
| void credential_set_all_capabilities(struct credential *c,
 | |
| 				     enum credential_op_type op_type);
 | |
| 
 | |
| /**
 | |
|  * Clear the secrets in this credential, but leave other data intact.
 | |
|  *
 | |
|  * This is useful for resetting credentials in preparation for a subsequent
 | |
|  * stage of filling.
 | |
|  */
 | |
| void credential_clear_secrets(struct credential *c);
 | |
| 
 | |
| /**
 | |
|  * Print a list of supported capabilities and version numbers to standard
 | |
|  * output.
 | |
|  */
 | |
| void credential_announce_capabilities(struct credential *c, FILE *fp);
 | |
| 
 | |
| /**
 | |
|  * Prepares the credential for the next iteration of the helper protocol by
 | |
|  * updating the state headers to send with the ones read by the last iteration
 | |
|  * of the protocol.
 | |
|  *
 | |
|  * Except for internal callers, this should be called exactly once between
 | |
|  * reading credentials with `credential_fill` and writing them.
 | |
|  */
 | |
| void credential_next_state(struct credential *c);
 | |
| 
 | |
| /**
 | |
|  * Return true if the capability is enabled for an operation of op_type.
 | |
|  */
 | |
| int credential_has_capability(const struct credential_capability *capa,
 | |
| 			      enum credential_op_type op_type);
 | |
| 
 | |
| int credential_read(struct credential *, FILE *,
 | |
| 		    enum credential_op_type);
 | |
| void credential_write(const struct credential *, FILE *,
 | |
| 		      enum credential_op_type);
 | |
| 
 | |
| /*
 | |
|  * Parse a url into a credential struct, replacing any existing contents.
 | |
|  *
 | |
|  * If the url can't be parsed (e.g., a missing "proto://" component), the
 | |
|  * resulting credential will be empty and the function will return an
 | |
|  * error (even in the "gently" form).
 | |
|  *
 | |
|  * If we encounter a component which cannot be represented as a credential
 | |
|  * value (e.g., because it contains a newline), the "gently" form will return
 | |
|  * an error but leave the broken state in the credential object for further
 | |
|  * examination.  The non-gentle form will issue a warning to stderr and return
 | |
|  * an empty credential.
 | |
|  */
 | |
| void credential_from_url(struct credential *, const char *url);
 | |
| int credential_from_url_gently(struct credential *, const char *url, int quiet);
 | |
| 
 | |
| int credential_match(const struct credential *want,
 | |
| 		     const struct credential *have, int match_password);
 | |
| 
 | |
| #endif /* CREDENTIAL_H */
 |