|  | #ifndef CREDENTIAL_H | 
|  | #define CREDENTIAL_H | 
|  |  | 
|  | #include "string-list.h" | 
|  | #include "strvec.h" | 
|  |  | 
|  | /** | 
|  | * The credentials API provides an abstracted way of gathering | 
|  | * authentication credentials from the user. | 
|  | * | 
|  | * Typical setup | 
|  | * ------------- | 
|  | * | 
|  | * ------------ | 
|  | * +-----------------------+ | 
|  | * | Git code (C)          |--- to server requiring ---> | 
|  | * |                       |        authentication | 
|  | * |.......................| | 
|  | * | C credential API      |--- prompt ---> User | 
|  | * +-----------------------+ | 
|  | * 	^      | | 
|  | * 	| pipe | | 
|  | * 	|      v | 
|  | * +-----------------------+ | 
|  | * | Git credential helper | | 
|  | * +-----------------------+ | 
|  | * ------------ | 
|  | * | 
|  | * The Git code (typically a remote-helper) will call the C API to obtain | 
|  | * credential data like a login/password pair (credential_fill). The | 
|  | * API will itself call a remote helper (e.g. "git credential-cache" or | 
|  | * "git credential-store") that may retrieve credential data from a | 
|  | * store. If the credential helper cannot find the information, the C API | 
|  | * will prompt the user. Then, the caller of the API takes care of | 
|  | * contacting the server, and does the actual authentication. | 
|  | * | 
|  | * C API | 
|  | * ----- | 
|  | * | 
|  | * The credential C API is meant to be called by Git code which needs to | 
|  | * acquire or store a credential. It is centered around an object | 
|  | * representing a single credential and provides three basic operations: | 
|  | * fill (acquire credentials by calling helpers and/or prompting the user), | 
|  | * approve (mark a credential as successfully used so that it can be stored | 
|  | * for later use), and reject (mark a credential as unsuccessful so that it | 
|  | * can be erased from any persistent storage). | 
|  | * | 
|  | * Example | 
|  | * ~~~~~~~ | 
|  | * | 
|  | * The example below shows how the functions of the credential API could be | 
|  | * used to login to a fictitious "foo" service on a remote host: | 
|  | * | 
|  | * ----------------------------------------------------------------------- | 
|  | * int foo_login(struct foo_connection *f) | 
|  | * { | 
|  | * 	int status; | 
|  | * 	// Create a credential with some context; we don't yet know the | 
|  | * 	// username or password. | 
|  | * | 
|  | * struct credential c = CREDENTIAL_INIT; | 
|  | * c.protocol = xstrdup("foo"); | 
|  | * c.host = xstrdup(f->hostname); | 
|  | * | 
|  | * // Fill in the username and password fields by contacting | 
|  | * // helpers and/or asking the user. The function will die if it | 
|  | * // fails. | 
|  | * credential_fill(&c); | 
|  | * | 
|  | * // Otherwise, we have a username and password. Try to use it. | 
|  | * | 
|  | * status = send_foo_login(f, c.username, c.password); | 
|  | * switch (status) { | 
|  | * case FOO_OK: | 
|  | * // It worked. Store the credential for later use. | 
|  | * credential_accept(&c); | 
|  | * break; | 
|  | * case FOO_BAD_LOGIN: | 
|  | * // Erase the credential from storage so we don't try it again. | 
|  | * credential_reject(&c); | 
|  | * break; | 
|  | * default: | 
|  | * // Some other error occurred. We don't know if the | 
|  | * // credential is good or bad, so report nothing to the | 
|  | * // credential subsystem. | 
|  | * } | 
|  | * | 
|  | * // Free any associated resources. | 
|  | * credential_clear(&c); | 
|  | * | 
|  | * return status; | 
|  | * } | 
|  | * ----------------------------------------------------------------------- | 
|  | */ | 
|  |  | 
|  | /* | 
|  | * These values define the kind of operation we're performing and the | 
|  | * capabilities at each stage.  The first is either an external request (via git | 
|  | * credential fill) or an internal request (e.g., via the HTTP) code.  The | 
|  | * second is the call to the credential helper, and the third is the response | 
|  | * we're providing. | 
|  | * | 
|  | * At each stage, we will emit the capability only if the previous stage | 
|  | * supported it. | 
|  | */ | 
|  | enum credential_op_type { | 
|  | CREDENTIAL_OP_INITIAL  = 1, | 
|  | CREDENTIAL_OP_HELPER   = 2, | 
|  | CREDENTIAL_OP_RESPONSE = 3, | 
|  | }; | 
|  |  | 
|  | struct credential_capability { | 
|  | unsigned request_initial:1, | 
|  | request_helper:1, | 
|  | response:1; | 
|  | }; | 
|  |  | 
|  | /** | 
|  | * This struct represents a single login credential (typically a | 
|  | * username/password combination) along with any associated | 
|  | * context. All string fields should be heap-allocated (or NULL if | 
|  | * they are not known or not applicable). The meaning of the | 
|  | * individual context fields is the same as their counterparts in | 
|  | * the helper protocol. | 
|  | * | 
|  | * This struct should always be initialized with `CREDENTIAL_INIT` or | 
|  | * `credential_init`. | 
|  | */ | 
|  | struct credential { | 
|  |  | 
|  | /** | 
|  | * A `string_list` of helpers. Each string specifies an external | 
|  | * helper which will be run, in order, to either acquire or store | 
|  | * credentials. This list is filled-in by the API functions | 
|  | * according to the corresponding configuration variables before | 
|  | * consulting helpers, so there usually is no need for a caller to | 
|  | * modify the helpers field at all. | 
|  | */ | 
|  | struct string_list helpers; | 
|  |  | 
|  | /** | 
|  | * A `strvec` of WWW-Authenticate header values. Each string | 
|  | * is the value of a WWW-Authenticate header in an HTTP response, | 
|  | * in the order they were received in the response. | 
|  | */ | 
|  | struct strvec wwwauth_headers; | 
|  |  | 
|  | /** | 
|  | * A `strvec` of state headers received from credential helpers. | 
|  | */ | 
|  | struct strvec state_headers; | 
|  |  | 
|  | /** | 
|  | * A `strvec` of state headers to send to credential helpers. | 
|  | */ | 
|  | struct strvec state_headers_to_send; | 
|  |  | 
|  | /** | 
|  | * Internal use only. Keeps track of if we previously matched against a | 
|  | * WWW-Authenticate header line in order to re-fold future continuation | 
|  | * lines into one value. | 
|  | */ | 
|  | unsigned header_is_last_match:1; | 
|  |  | 
|  | unsigned approved:1, | 
|  | ephemeral:1, | 
|  | configured:1, | 
|  | multistage: 1, | 
|  | quit:1, | 
|  | use_http_path:1, | 
|  | username_from_proto:1, | 
|  | sanitize_prompt:1, | 
|  | protect_protocol:1; | 
|  |  | 
|  | struct credential_capability capa_authtype; | 
|  | struct credential_capability capa_state; | 
|  |  | 
|  | char *username; | 
|  | char *password; | 
|  | char *credential; | 
|  | char *protocol; | 
|  | char *host; | 
|  | char *path; | 
|  | char *oauth_refresh_token; | 
|  | timestamp_t password_expiry_utc; | 
|  |  | 
|  | /** | 
|  | * The authorization scheme to use.  If this is NULL, libcurl is free to | 
|  | * negotiate any scheme it likes. | 
|  | */ | 
|  | char *authtype; | 
|  | }; | 
|  |  | 
|  | #define CREDENTIAL_INIT { \ | 
|  | .helpers = STRING_LIST_INIT_DUP, \ | 
|  | .password_expiry_utc = TIME_MAX, \ | 
|  | .wwwauth_headers = STRVEC_INIT, \ | 
|  | .state_headers = STRVEC_INIT, \ | 
|  | .state_headers_to_send = STRVEC_INIT, \ | 
|  | .sanitize_prompt = 1, \ | 
|  | .protect_protocol = 1, \ | 
|  | } | 
|  |  | 
|  | /* Initialize a credential structure, setting all fields to empty. */ | 
|  | void credential_init(struct credential *); | 
|  |  | 
|  | /** | 
|  | * Free any resources associated with the credential structure, returning | 
|  | * it to a pristine initialized state. | 
|  | */ | 
|  | void credential_clear(struct credential *); | 
|  |  | 
|  | /** | 
|  | * Instruct the credential subsystem to fill the username and | 
|  | * password (or authtype and credential) fields of the passed | 
|  | * credential struct by first consulting helpers, then asking the | 
|  | * user. After this function returns, either the username and | 
|  | * password fields or the credential field of the credential are | 
|  | * guaranteed to be non-NULL. If an error occurs, the function | 
|  | * will die(). | 
|  | * | 
|  | * If all_capabilities is set, this is an internal user that is prepared | 
|  | * to deal with all known capabilities, and we should advertise that fact. | 
|  | */ | 
|  | void credential_fill(struct credential *, int all_capabilities); | 
|  |  | 
|  | /** | 
|  | * Inform the credential subsystem that the provided credentials | 
|  | * were successfully used for authentication.  This will cause the | 
|  | * credential subsystem to notify any helpers of the approval, so | 
|  | * that they may store the result to be used again.  Any errors | 
|  | * from helpers are ignored. | 
|  | */ | 
|  | void credential_approve(struct credential *); | 
|  |  | 
|  | /** | 
|  | * Inform the credential subsystem that the provided credentials | 
|  | * have been rejected. This will cause the credential subsystem to | 
|  | * notify any helpers of the rejection (which allows them, for | 
|  | * example, to purge the invalid credentials from storage). It | 
|  | * will also free() the username, password, and credential fields | 
|  | * of the credential and set them to NULL (readying the credential | 
|  | * for another call to `credential_fill`). Any errors from helpers | 
|  | * are ignored. | 
|  | */ | 
|  | void credential_reject(struct credential *); | 
|  |  | 
|  | /** | 
|  | * Enable all of the supported credential flags in this credential. | 
|  | */ | 
|  | void credential_set_all_capabilities(struct credential *c, | 
|  | enum credential_op_type op_type); | 
|  |  | 
|  | /** | 
|  | * Clear the secrets in this credential, but leave other data intact. | 
|  | * | 
|  | * This is useful for resetting credentials in preparation for a subsequent | 
|  | * stage of filling. | 
|  | */ | 
|  | void credential_clear_secrets(struct credential *c); | 
|  |  | 
|  | /** | 
|  | * Print a list of supported capabilities and version numbers to standard | 
|  | * output. | 
|  | */ | 
|  | void credential_announce_capabilities(struct credential *c, FILE *fp); | 
|  |  | 
|  | /** | 
|  | * Prepares the credential for the next iteration of the helper protocol by | 
|  | * updating the state headers to send with the ones read by the last iteration | 
|  | * of the protocol. | 
|  | * | 
|  | * Except for internal callers, this should be called exactly once between | 
|  | * reading credentials with `credential_fill` and writing them. | 
|  | */ | 
|  | void credential_next_state(struct credential *c); | 
|  |  | 
|  | /** | 
|  | * Return true if the capability is enabled for an operation of op_type. | 
|  | */ | 
|  | int credential_has_capability(const struct credential_capability *capa, | 
|  | enum credential_op_type op_type); | 
|  |  | 
|  | int credential_read(struct credential *, FILE *, | 
|  | enum credential_op_type); | 
|  | void credential_write(const struct credential *, FILE *, | 
|  | enum credential_op_type); | 
|  |  | 
|  | /* | 
|  | * Parse a url into a credential struct, replacing any existing contents. | 
|  | * | 
|  | * If the url can't be parsed (e.g., a missing "proto://" component), the | 
|  | * resulting credential will be empty and the function will return an | 
|  | * error (even in the "gently" form). | 
|  | * | 
|  | * If we encounter a component which cannot be represented as a credential | 
|  | * value (e.g., because it contains a newline), the "gently" form will return | 
|  | * an error but leave the broken state in the credential object for further | 
|  | * examination.  The non-gentle form will issue a warning to stderr and return | 
|  | * an empty credential. | 
|  | */ | 
|  | void credential_from_url(struct credential *, const char *url); | 
|  | int credential_from_url_gently(struct credential *, const char *url, int quiet); | 
|  |  | 
|  | int credential_match(const struct credential *want, | 
|  | const struct credential *have, int match_password); | 
|  |  | 
|  | #endif /* CREDENTIAL_H */ |