* [PATCH v2 1/2] credential: avoid erasing distinct password
2023-06-14 21:40 ` [PATCH v2 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
@ 2023-06-14 21:40 ` M Hickford via GitGitGadget
2023-06-14 22:43 ` Jeff King
2023-06-14 21:40 ` [PATCH v2 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
` (2 subsequent siblings)
3 siblings, 1 reply; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-14 21:40 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford, M Hickford
From: M Hickford <mirth.hickford@gmail.com>
Test that credential helpers do not erase a password distinct from the
input. Such calls can happen when multiple credential helpers are
configured.
Fixes for credential-cache and credential-store.
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
---
builtin/credential-cache--daemon.c | 8 ++++----
builtin/credential-store.c | 18 ++++++++++--------
credential.c | 11 ++++++-----
credential.h | 2 +-
t/lib-credential.sh | 26 ++++++++++++++++++++++++++
5 files changed, 47 insertions(+), 18 deletions(-)
diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
index 756c5f02aef..82f376d3351 100644
--- a/builtin/credential-cache--daemon.c
+++ b/builtin/credential-cache--daemon.c
@@ -33,12 +33,12 @@ static void cache_credential(struct credential *c, int timeout)
e->expiration = time(NULL) + timeout;
}
-static struct credential_cache_entry *lookup_credential(const struct credential *c)
+static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
{
int i;
for (i = 0; i < entries_nr; i++) {
struct credential *e = &entries[i].item;
- if (credential_match(c, e))
+ if (credential_match(c, e, match_password))
return &entries[i];
}
return NULL;
@@ -48,7 +48,7 @@ static void remove_credential(const struct credential *c)
{
struct credential_cache_entry *e;
- e = lookup_credential(c);
+ e = lookup_credential(c, c->password != NULL);
if (e)
e->expiration = 0;
}
@@ -127,7 +127,7 @@ static void serve_one_client(FILE *in, FILE *out)
if (read_request(in, &c, &action, &timeout) < 0)
/* ignore error */ ;
else if (!strcmp(action.buf, "get")) {
- struct credential_cache_entry *e = lookup_credential(&c);
+ struct credential_cache_entry *e = lookup_credential(&c, 0);
if (e) {
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
diff --git a/builtin/credential-store.c b/builtin/credential-store.c
index 30c6ccf56c0..e0ae028b1c3 100644
--- a/builtin/credential-store.c
+++ b/builtin/credential-store.c
@@ -13,12 +13,14 @@ static struct lock_file credential_lock;
static int parse_credential_file(const char *fn,
struct credential *c,
void (*match_cb)(struct credential *),
- void (*other_cb)(struct strbuf *))
+ void (*other_cb)(struct strbuf *),
+ const char* op)
{
FILE *fh;
struct strbuf line = STRBUF_INIT;
struct credential entry = CREDENTIAL_INIT;
int found_credential = 0;
+ const int match_password = !strcmp(op, "erase") && c->password != NULL;
fh = fopen(fn, "r");
if (!fh) {
@@ -29,8 +31,8 @@ static int parse_credential_file(const char *fn,
while (strbuf_getline_lf(&line, fh) != EOF) {
if (!credential_from_url_gently(&entry, line.buf, 1) &&
- entry.username && entry.password &&
- credential_match(c, &entry)) {
+ entry.username && entry.password &&
+ credential_match(c, &entry, match_password)) {
found_credential = 1;
if (match_cb) {
match_cb(&entry);
@@ -60,7 +62,7 @@ static void print_line(struct strbuf *buf)
}
static void rewrite_credential_file(const char *fn, struct credential *c,
- struct strbuf *extra)
+ struct strbuf *extra, const char *op)
{
int timeout_ms = 1000;
@@ -69,7 +71,7 @@ static void rewrite_credential_file(const char *fn, struct credential *c,
die_errno(_("unable to get credential storage lock in %d ms"), timeout_ms);
if (extra)
print_line(extra);
- parse_credential_file(fn, c, NULL, print_line);
+ parse_credential_file(fn, c, NULL, print_line, op);
if (commit_lock_file(&credential_lock) < 0)
die_errno("unable to write credential store");
}
@@ -91,7 +93,7 @@ static void store_credential_file(const char *fn, struct credential *c)
is_rfc3986_reserved_or_unreserved);
}
- rewrite_credential_file(fn, c, &buf);
+ rewrite_credential_file(fn, c, &buf, "store");
strbuf_release(&buf);
}
@@ -138,7 +140,7 @@ static void remove_credential(const struct string_list *fns, struct credential *
return;
for_each_string_list_item(fn, fns)
if (!access(fn->string, F_OK))
- rewrite_credential_file(fn->string, c, NULL);
+ rewrite_credential_file(fn->string, c, NULL, "erase");
}
static void lookup_credential(const struct string_list *fns, struct credential *c)
@@ -146,7 +148,7 @@ static void lookup_credential(const struct string_list *fns, struct credential *
struct string_list_item *fn;
for_each_string_list_item(fn, fns)
- if (parse_credential_file(fn->string, c, print_entry, NULL))
+ if (parse_credential_file(fn->string, c, print_entry, NULL, "get"))
return; /* Found credential */
}
diff --git a/credential.c b/credential.c
index 023b59d5711..9157ff0865e 100644
--- a/credential.c
+++ b/credential.c
@@ -33,13 +33,14 @@ void credential_clear(struct credential *c)
}
int credential_match(const struct credential *want,
- const struct credential *have)
+ const struct credential *have, int match_password)
{
#define CHECK(x) (!want->x || (have->x && !strcmp(want->x, have->x)))
return CHECK(protocol) &&
- CHECK(host) &&
- CHECK(path) &&
- CHECK(username);
+ CHECK(host) &&
+ CHECK(path) &&
+ CHECK(username) &&
+ (!match_password || CHECK(password));
#undef CHECK
}
@@ -102,7 +103,7 @@ static int match_partial_url(const char *url, void *cb)
warning(_("skipping credential lookup for key: credential.%s"),
url);
else
- matches = credential_match(&want, c);
+ matches = credential_match(&want, c, 0);
credential_clear(&want);
return matches;
diff --git a/credential.h b/credential.h
index b8e2936d1dc..acc41adf548 100644
--- a/credential.h
+++ b/credential.h
@@ -211,6 +211,6 @@ void credential_from_url(struct credential *, const char *url);
int credential_from_url_gently(struct credential *, const char *url, int quiet);
int credential_match(const struct credential *want,
- const struct credential *have);
+ const struct credential *have, int match_password);
#endif /* CREDENTIAL_H */
diff --git a/t/lib-credential.sh b/t/lib-credential.sh
index f1ab92ba35c..f7e4e29c5e1 100644
--- a/t/lib-credential.sh
+++ b/t/lib-credential.sh
@@ -44,6 +44,7 @@ helper_test_clean() {
reject $1 https example.com user1
reject $1 https example.com user2
reject $1 https example.com user4
+ reject $1 https example.com user5
reject $1 http path.tld user
reject $1 https timeout.tld user
reject $1 https sso.tld
@@ -221,6 +222,31 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) does not erase a password distinct from input" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user5
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user5
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ username=user5
+ --
+ protocol=https
+ host=example.com
+ username=user5
+ password=pass1
+ EOF
+ '
+
test_expect_success "helper ($HELPER) can forget user" '
check reject $HELPER <<-\EOF &&
protocol=https
--
gitgitgadget
^ permalink raw reply related [flat|nested] 26+ messages in thread
* Re: [PATCH v2 1/2] credential: avoid erasing distinct password
2023-06-14 21:40 ` [PATCH v2 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
@ 2023-06-14 22:43 ` Jeff King
2023-06-15 4:51 ` M Hickford
0 siblings, 1 reply; 26+ messages in thread
From: Jeff King @ 2023-06-14 22:43 UTC (permalink / raw)
To: M Hickford via GitGitGadget
Cc: Junio C Hamano, git, Matthew John Cheetham, M Hickford
On Wed, Jun 14, 2023 at 09:40:37PM +0000, M Hickford via GitGitGadget wrote:
> From: M Hickford <mirth.hickford@gmail.com>
>
> Test that credential helpers do not erase a password distinct from the
> input. Such calls can happen when multiple credential helpers are
> configured.
>
> Fixes for credential-cache and credential-store.
I think this goal makes sense. I missed the "multiple helpers" part of
your message at first, and wondered how you would even get such
duplicate entries stored in a helper. But the point is that you might
have two helpers with two separate passwords.
Which is...weird, I'd think, because we will only ever use one of them.
But from past discussions, I guess you're in a situation where you could
use some kind of renewable token _or_ possibly a more stable password,
via two different helpers. And when the token expires, you want to be
able to remove it from a caching helper without asking for the stable
password to be dropped.
I don't think it's strictly necessary to spell out the intended use in
the commit message. The behavior you're proposing seems like the
least-surprising thing to me in general (and it is only because the
situation is rare that nobody complained about the existing behavior in
the last decade). But it might not hurt to outline the case that we'd
expect this to help.
The other thing I'd watch out for is how this behavior would affect
non-erase modes. Let's see...
> diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
> index 756c5f02aef..82f376d3351 100644
> --- a/builtin/credential-cache--daemon.c
> +++ b/builtin/credential-cache--daemon.c
> @@ -33,12 +33,12 @@ static void cache_credential(struct credential *c, int timeout)
> e->expiration = time(NULL) + timeout;
> }
>
> -static struct credential_cache_entry *lookup_credential(const struct credential *c)
> +static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
> {
> int i;
> for (i = 0; i < entries_nr; i++) {
> struct credential *e = &entries[i].item;
> - if (credential_match(c, e))
> + if (credential_match(c, e, match_password))
> return &entries[i];
> }
> return NULL;
> [...]
> @@ -127,7 +127,7 @@ static void serve_one_client(FILE *in, FILE *out)
> if (read_request(in, &c, &action, &timeout) < 0)
> /* ignore error */ ;
> else if (!strcmp(action.buf, "get")) {
> - struct credential_cache_entry *e = lookup_credential(&c);
> + struct credential_cache_entry *e = lookup_credential(&c, 0);
> if (e) {
> fprintf(out, "username=%s\n", e->item.username);
> fprintf(out, "password=%s\n", e->item.password);
OK, for a cache "get" we'll continue not to match the password. This
shouldn't trigger in practice, as Git will stop asking helpers once it
has a username and password, but it is good to retain the existing
behavior here.
> @@ -48,7 +48,7 @@ static void remove_credential(const struct credential *c)
> {
> struct credential_cache_entry *e;
>
> - e = lookup_credential(c);
> + e = lookup_credential(c, c->password != NULL);
> if (e)
> e->expiration = 0;
> }
And this is erase, where we do want to respect it. I actually think
passing an unconditional "1" here instead of the NULL check would be OK,
as the CHECK() macro in credential_match() treats NULL as "always
match". But I am also OK with making that logic explicit here.
This made me wonder how "store" works, since it's not touched here. It's
implemented as remove_credential(), plus an unconditional allocation via
cache_credential().
It seems like overwriting would be broken, then, wouldn't it? If I
store:
https://user:pass1@example.com
and then try to store:
https://user:pass2@example.com
then the call to remove_credential() will see a "struct credential" with
the password set to "pass2". And because it always passes
match_password, it will fail to remove it, and we'll end up with two.
We should be able to test that pretty easily, like this:
echo url=https://user:pass1@example.com | git credential-cache store
echo url=https://user:pass2@example.com | git credential-cache store
echo url=https://example.com | git credential-cache get
Before your patch that will return "pass1". After, it returns "pass2",
because the old credential is left in place. I think you'd want
something like:
diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
index 82f376d335..f64dd21d33 100644
--- a/builtin/credential-cache--daemon.c
+++ b/builtin/credential-cache--daemon.c
@@ -44,11 +44,11 @@ static struct credential_cache_entry *lookup_credential(const struct credential
return NULL;
}
-static void remove_credential(const struct credential *c)
+static void remove_credential(const struct credential *c, int match_password)
{
struct credential_cache_entry *e;
- e = lookup_credential(c, c->password != NULL);
+ e = lookup_credential(c, match_password);
if (e)
e->expiration = 0;
}
@@ -151,14 +151,14 @@ static void serve_one_client(FILE *in, FILE *out)
exit(0);
}
else if (!strcmp(action.buf, "erase"))
- remove_credential(&c);
+ remove_credential(&c, 1);
else if (!strcmp(action.buf, "store")) {
if (timeout < 0)
warning("cache client didn't specify a timeout");
else if (!c.username || !c.password)
warning("cache client gave us a partial credential");
else {
- remove_credential(&c);
+ remove_credential(&c, 0);
cache_credential(&c, timeout);
}
}
Unless your goal really is to store two entries that differ only in
their passwords within a single cache. That seems weird, though. Again,
it might help if your use case was fleshed out a bit more.
> diff --git a/builtin/credential-store.c b/builtin/credential-store.c
> index 30c6ccf56c0..e0ae028b1c3 100644
> --- a/builtin/credential-store.c
> +++ b/builtin/credential-store.c
> @@ -13,12 +13,14 @@ static struct lock_file credential_lock;
> static int parse_credential_file(const char *fn,
> struct credential *c,
> void (*match_cb)(struct credential *),
> - void (*other_cb)(struct strbuf *))
> + void (*other_cb)(struct strbuf *),
> + const char* op)
> {
> FILE *fh;
> struct strbuf line = STRBUF_INIT;
> struct credential entry = CREDENTIAL_INIT;
> int found_credential = 0;
> + const int match_password = !strcmp(op, "erase") && c->password != NULL;
>
> fh = fopen(fn, "r");
> if (!fh) {
> @@ -29,8 +31,8 @@ static int parse_credential_file(const char *fn,
>
> while (strbuf_getline_lf(&line, fh) != EOF) {
> if (!credential_from_url_gently(&entry, line.buf, 1) &&
> - entry.username && entry.password &&
> - credential_match(c, &entry)) {
> + entry.username && entry.password &&
> + credential_match(c, &entry, match_password)) {
> found_credential = 1;
> if (match_cb) {
> match_cb(&entry);
OK, so for credential-store we only kick in the new behavior for
"erase". So it would not have the same quirk that I mentioned above.
I do think your logic could likewise here be:
const int match_password = !strcmp(op, "erase");
because credential_match() handles the NULL case already.
(It's also unusual for us to declare non-parameter variables as "const";
it's not wrong to do so, so it's really just a style thing, but there's
not much benefit).
> @@ -60,7 +62,7 @@ static void print_line(struct strbuf *buf)
> }
>
> static void rewrite_credential_file(const char *fn, struct credential *c,
> - struct strbuf *extra)
> + struct strbuf *extra, const char *op)
> {
> int timeout_ms = 1000;
>
> @@ -69,7 +71,7 @@ static void rewrite_credential_file(const char *fn, struct credential *c,
> die_errno(_("unable to get credential storage lock in %d ms"), timeout_ms);
> if (extra)
> print_line(extra);
> - parse_credential_file(fn, c, NULL, print_line);
> + parse_credential_file(fn, c, NULL, print_line, op);
> if (commit_lock_file(&credential_lock) < 0)
> die_errno("unable to write credential store");
> }
If we have to plumb through this "op" string, I wonder if it would be
more flexible and robust to just pass along a match_password flag.
That's generally a bit more robust than string matching (where a
misspelling in one string would not be caught by the compiler, unlike a
boolean variable).
> @@ -221,6 +222,31 @@ helper_test() {
> EOF
> '
>
> + test_expect_success "helper ($HELPER) does not erase a password distinct from input" '
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> + username=user5
> + password=pass1
> + EOF
> + check reject $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> + username=user5
> + password=pass2
> + EOF
> + check fill $HELPER <<-\EOF
> + protocol=https
> + host=example.com
> + username=user5
> + --
> + protocol=https
> + host=example.com
> + username=user5
> + password=pass1
> + EOF
> + '
The test makes sense. We are not using multiple helpers, but the
behavior can be checked using a single helper, since the point is that
it should be independent of what any other helper is doing.
-Peff
^ permalink raw reply related [flat|nested] 26+ messages in thread
* Re: [PATCH v2 1/2] credential: avoid erasing distinct password
2023-06-14 22:43 ` Jeff King
@ 2023-06-15 4:51 ` M Hickford
0 siblings, 0 replies; 26+ messages in thread
From: M Hickford @ 2023-06-15 4:51 UTC (permalink / raw)
To: Jeff King
Cc: M Hickford via GitGitGadget, Junio C Hamano, git,
Matthew John Cheetham, M Hickford
On Wed, 14 Jun 2023 at 23:44, Jeff King <peff@peff.net> wrote:
>
> On Wed, Jun 14, 2023 at 09:40:37PM +0000, M Hickford via GitGitGadget wrote:
>
> > From: M Hickford <mirth.hickford@gmail.com>
> >
> > Test that credential helpers do not erase a password distinct from the
> > input. Such calls can happen when multiple credential helpers are
> > configured.
> >
> > Fixes for credential-cache and credential-store.
>
> I think this goal makes sense. I missed the "multiple helpers" part of
> your message at first, and wondered how you would even get such
> duplicate entries stored in a helper. But the point is that you might
> have two helpers with two separate passwords.
>
> Which is...weird, I'd think, because we will only ever use one of them.
> But from past discussions, I guess you're in a situation where you could
> use some kind of renewable token _or_ possibly a more stable password,
> via two different helpers. And when the token expires, you want to be
> able to remove it from a caching helper without asking for the stable
> password to be dropped.
>
> I don't think it's strictly necessary to spell out the intended use in
> the commit message. The behavior you're proposing seems like the
> least-surprising thing to me in general (and it is only because the
> situation is rare that nobody complained about the existing behavior in
> the last decade). But it might not hurt to outline the case that we'd
> expect this to help.
>
> The other thing I'd watch out for is how this behavior would affect
> non-erase modes. Let's see...
>
> > diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
> > index 756c5f02aef..82f376d3351 100644
> > --- a/builtin/credential-cache--daemon.c
> > +++ b/builtin/credential-cache--daemon.c
> > @@ -33,12 +33,12 @@ static void cache_credential(struct credential *c, int timeout)
> > e->expiration = time(NULL) + timeout;
> > }
> >
> > -static struct credential_cache_entry *lookup_credential(const struct credential *c)
> > +static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
> > {
> > int i;
> > for (i = 0; i < entries_nr; i++) {
> > struct credential *e = &entries[i].item;
> > - if (credential_match(c, e))
> > + if (credential_match(c, e, match_password))
> > return &entries[i];
> > }
> > return NULL;
> > [...]
> > @@ -127,7 +127,7 @@ static void serve_one_client(FILE *in, FILE *out)
> > if (read_request(in, &c, &action, &timeout) < 0)
> > /* ignore error */ ;
> > else if (!strcmp(action.buf, "get")) {
> > - struct credential_cache_entry *e = lookup_credential(&c);
> > + struct credential_cache_entry *e = lookup_credential(&c, 0);
> > if (e) {
> > fprintf(out, "username=%s\n", e->item.username);
> > fprintf(out, "password=%s\n", e->item.password);
>
> OK, for a cache "get" we'll continue not to match the password. This
> shouldn't trigger in practice, as Git will stop asking helpers once it
> has a username and password, but it is good to retain the existing
> behavior here.
>
> > @@ -48,7 +48,7 @@ static void remove_credential(const struct credential *c)
> > {
> > struct credential_cache_entry *e;
> >
> > - e = lookup_credential(c);
> > + e = lookup_credential(c, c->password != NULL);
> > if (e)
> > e->expiration = 0;
> > }
>
> And this is erase, where we do want to respect it. I actually think
> passing an unconditional "1" here instead of the NULL check would be OK,
> as the CHECK() macro in credential_match() treats NULL as "always
> match". But I am also OK with making that logic explicit here.
>
> This made me wonder how "store" works, since it's not touched here. It's
> implemented as remove_credential(), plus an unconditional allocation via
> cache_credential().
>
> It seems like overwriting would be broken, then, wouldn't it? If I
Thanks Jeff for spotting and for the fix. I'll apply and add a test in patch v3.
> store:
>
> https://user:pass1@example.com
>
> and then try to store:
>
> https://user:pass2@example.com
>
> then the call to remove_credential() will see a "struct credential" with
> the password set to "pass2". And because it always passes
> match_password, it will fail to remove it, and we'll end up with two.
>
> We should be able to test that pretty easily, like this:
>
> echo url=https://user:pass1@example.com | git credential-cache store
> echo url=https://user:pass2@example.com | git credential-cache store
> echo url=https://example.com | git credential-cache get
>
> Before your patch that will return "pass1". After, it returns "pass2",
> because the old credential is left in place. I think you'd want
> something like:
>
> diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
> index 82f376d335..f64dd21d33 100644
> --- a/builtin/credential-cache--daemon.c
> +++ b/builtin/credential-cache--daemon.c
> @@ -44,11 +44,11 @@ static struct credential_cache_entry *lookup_credential(const struct credential
> return NULL;
> }
>
> -static void remove_credential(const struct credential *c)
> +static void remove_credential(const struct credential *c, int match_password)
> {
> struct credential_cache_entry *e;
>
> - e = lookup_credential(c, c->password != NULL);
> + e = lookup_credential(c, match_password);
> if (e)
> e->expiration = 0;
> }
> @@ -151,14 +151,14 @@ static void serve_one_client(FILE *in, FILE *out)
> exit(0);
> }
> else if (!strcmp(action.buf, "erase"))
> - remove_credential(&c);
> + remove_credential(&c, 1);
> else if (!strcmp(action.buf, "store")) {
> if (timeout < 0)
> warning("cache client didn't specify a timeout");
> else if (!c.username || !c.password)
> warning("cache client gave us a partial credential");
> else {
> - remove_credential(&c);
> + remove_credential(&c, 0);
> cache_credential(&c, timeout);
> }
> }
>
> Unless your goal really is to store two entries that differ only in
> their passwords within a single cache. That seems weird, though. Again,
> it might help if your use case was fleshed out a bit more.
>
> > diff --git a/builtin/credential-store.c b/builtin/credential-store.c
> > index 30c6ccf56c0..e0ae028b1c3 100644
> > --- a/builtin/credential-store.c
> > +++ b/builtin/credential-store.c
> > @@ -13,12 +13,14 @@ static struct lock_file credential_lock;
> > static int parse_credential_file(const char *fn,
> > struct credential *c,
> > void (*match_cb)(struct credential *),
> > - void (*other_cb)(struct strbuf *))
> > + void (*other_cb)(struct strbuf *),
> > + const char* op)
> > {
> > FILE *fh;
> > struct strbuf line = STRBUF_INIT;
> > struct credential entry = CREDENTIAL_INIT;
> > int found_credential = 0;
> > + const int match_password = !strcmp(op, "erase") && c->password != NULL;
> >
> > fh = fopen(fn, "r");
> > if (!fh) {
> > @@ -29,8 +31,8 @@ static int parse_credential_file(const char *fn,
> >
> > while (strbuf_getline_lf(&line, fh) != EOF) {
> > if (!credential_from_url_gently(&entry, line.buf, 1) &&
> > - entry.username && entry.password &&
> > - credential_match(c, &entry)) {
> > + entry.username && entry.password &&
> > + credential_match(c, &entry, match_password)) {
> > found_credential = 1;
> > if (match_cb) {
> > match_cb(&entry);
>
> OK, so for credential-store we only kick in the new behavior for
> "erase". So it would not have the same quirk that I mentioned above.
>
> I do think your logic could likewise here be:
>
> const int match_password = !strcmp(op, "erase");
>
> because credential_match() handles the NULL case already.
>
> (It's also unusual for us to declare non-parameter variables as "const";
> it's not wrong to do so, so it's really just a style thing, but there's
> not much benefit).
>
> > @@ -60,7 +62,7 @@ static void print_line(struct strbuf *buf)
> > }
> >
> > static void rewrite_credential_file(const char *fn, struct credential *c,
> > - struct strbuf *extra)
> > + struct strbuf *extra, const char *op)
> > {
> > int timeout_ms = 1000;
> >
> > @@ -69,7 +71,7 @@ static void rewrite_credential_file(const char *fn, struct credential *c,
> > die_errno(_("unable to get credential storage lock in %d ms"), timeout_ms);
> > if (extra)
> > print_line(extra);
> > - parse_credential_file(fn, c, NULL, print_line);
> > + parse_credential_file(fn, c, NULL, print_line, op);
> > if (commit_lock_file(&credential_lock) < 0)
> > die_errno("unable to write credential store");
> > }
>
> If we have to plumb through this "op" string, I wonder if it would be
> more flexible and robust to just pass along a match_password flag.
> That's generally a bit more robust than string matching (where a
> misspelling in one string would not be caught by the compiler, unlike a
> boolean variable).
Good idea. Will do in patch v3.
>
> > @@ -221,6 +222,31 @@ helper_test() {
> > EOF
> > '
> >
> > + test_expect_success "helper ($HELPER) does not erase a password distinct from input" '
> > + check approve $HELPER <<-\EOF &&
> > + protocol=https
> > + host=example.com
> > + username=user5
> > + password=pass1
> > + EOF
> > + check reject $HELPER <<-\EOF &&
> > + protocol=https
> > + host=example.com
> > + username=user5
> > + password=pass2
> > + EOF
> > + check fill $HELPER <<-\EOF
> > + protocol=https
> > + host=example.com
> > + username=user5
> > + --
> > + protocol=https
> > + host=example.com
> > + username=user5
> > + password=pass1
> > + EOF
> > + '
>
> The test makes sense. We are not using multiple helpers, but the
> behavior can be checked using a single helper, since the point is that
> it should be independent of what any other helper is doing.
>
> -Peff
^ permalink raw reply [flat|nested] 26+ messages in thread
* [PATCH v2 2/2] credential: erase all matching credentials
2023-06-14 21:40 ` [PATCH v2 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
2023-06-14 21:40 ` [PATCH v2 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
@ 2023-06-14 21:40 ` M Hickford via GitGitGadget
2023-06-14 22:51 ` Jeff King
2023-06-14 21:56 ` [PATCH v2 0/2] credential: improvements to erase in helpers Junio C Hamano
2023-06-15 6:03 ` [PATCH v3 " M Hickford via GitGitGadget
3 siblings, 1 reply; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-14 21:40 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford, M Hickford
From: M Hickford <mirth.hickford@gmail.com>
`credential reject` sends the erase action to each helper, but the
exact behaviour of erase isn't specified in documentation or tests.
Some helpers (such as credential-libsecret) delete all matching
credentials, others (such as credential-cache and credential-store)
delete at most one matching credential.
Test that helpers erase all matching credentials. This behaviour is
easiest to reason about. Users expect that `echo
"url=https://example.com" | git credential reject` or `echo
"url=https://example.com\nusername=tim" | git credential reject` erase
all matching credentials.
Fix credential-cache and credential-store.
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
---
Documentation/git-credential.txt | 4 ++--
Documentation/gitcredentials.txt | 2 +-
builtin/credential-cache--daemon.c | 15 ++++++++------
builtin/credential-store.c | 3 ++-
t/lib-credential.sh | 33 ++++++++++++++++++++++++++++++
5 files changed, 47 insertions(+), 10 deletions(-)
diff --git a/Documentation/git-credential.txt b/Documentation/git-credential.txt
index 0e6d9e85ec7..04bfb918de6 100644
--- a/Documentation/git-credential.txt
+++ b/Documentation/git-credential.txt
@@ -38,8 +38,8 @@ to any configured credential helpers, which may store the credential
for later use.
If the action is `reject`, git-credential will send the description to
-any configured credential helpers, which may erase any stored
-credential matching the description.
+any configured credential helpers, which may erase stored credentials
+matching the description.
If the action is `approve` or `reject`, no output should be emitted.
diff --git a/Documentation/gitcredentials.txt b/Documentation/gitcredentials.txt
index 100f045bb1a..65d652dc40e 100644
--- a/Documentation/gitcredentials.txt
+++ b/Documentation/gitcredentials.txt
@@ -260,7 +260,7 @@ appended to its command line, which is one of:
`erase`::
- Remove a matching credential, if any, from the helper's storage.
+ Remove matching credentials, if any, from the helper's storage.
The details of the credential will be provided on the helper's stdin
stream. The exact format is the same as the input/output format of the
diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
index 82f376d3351..5e3a766e42d 100644
--- a/builtin/credential-cache--daemon.c
+++ b/builtin/credential-cache--daemon.c
@@ -33,12 +33,12 @@ static void cache_credential(struct credential *c, int timeout)
e->expiration = time(NULL) + timeout;
}
-static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
+static struct credential_cache_entry *lookup_credential(const struct credential *c)
{
int i;
for (i = 0; i < entries_nr; i++) {
struct credential *e = &entries[i].item;
- if (credential_match(c, e, match_password))
+ if (credential_match(c, e, 0))
return &entries[i];
}
return NULL;
@@ -48,9 +48,12 @@ static void remove_credential(const struct credential *c)
{
struct credential_cache_entry *e;
- e = lookup_credential(c, c->password != NULL);
- if (e)
- e->expiration = 0;
+ int i;
+ for (i = 0; i < entries_nr; i++) {
+ e = &entries[i];
+ if (credential_match(c, &e->item, c->password != NULL))
+ e->expiration = 0;
+ }
}
static timestamp_t check_expirations(void)
@@ -127,7 +130,7 @@ static void serve_one_client(FILE *in, FILE *out)
if (read_request(in, &c, &action, &timeout) < 0)
/* ignore error */ ;
else if (!strcmp(action.buf, "get")) {
- struct credential_cache_entry *e = lookup_credential(&c, 0);
+ struct credential_cache_entry *e = lookup_credential(&c);
if (e) {
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
diff --git a/builtin/credential-store.c b/builtin/credential-store.c
index e0ae028b1c3..85b147e460f 100644
--- a/builtin/credential-store.c
+++ b/builtin/credential-store.c
@@ -36,7 +36,8 @@ static int parse_credential_file(const char *fn,
found_credential = 1;
if (match_cb) {
match_cb(&entry);
- break;
+ if (strcmp(op, "erase"))
+ break;
}
}
else if (other_cb)
diff --git a/t/lib-credential.sh b/t/lib-credential.sh
index f7e4e29c5e1..3f4100b6ce2 100644
--- a/t/lib-credential.sh
+++ b/t/lib-credential.sh
@@ -45,6 +45,8 @@ helper_test_clean() {
reject $1 https example.com user2
reject $1 https example.com user4
reject $1 https example.com user5
+ reject $1 https example.com user6
+ reject $1 https example.com user7
reject $1 http path.tld user
reject $1 https timeout.tld user
reject $1 https sso.tld
@@ -298,6 +300,37 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) erases all matching credentials" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user6
+ password=pass1
+ EOF
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user7
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ --
+ protocol=https
+ host=example.com
+ username=askpass-username
+ password=askpass-password
+ --
+ askpass: Username for '\''https://example.com'\'':
+ askpass: Password for '\''https://askpass-username@example.com'\'':
+ EOF
+ '
+
: ${GIT_TEST_LONG_CRED_BUFFER:=1024}
# 23 bytes accounts for "wwwauth[]=basic realm=" plus NUL
LONG_VALUE_LEN=$((GIT_TEST_LONG_CRED_BUFFER - 23))
--
gitgitgadget
^ permalink raw reply related [flat|nested] 26+ messages in thread
* Re: [PATCH v2 2/2] credential: erase all matching credentials
2023-06-14 21:40 ` [PATCH v2 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
@ 2023-06-14 22:51 ` Jeff King
2023-06-15 4:57 ` M Hickford
0 siblings, 1 reply; 26+ messages in thread
From: Jeff King @ 2023-06-14 22:51 UTC (permalink / raw)
To: M Hickford via GitGitGadget; +Cc: git, Matthew John Cheetham, M Hickford
On Wed, Jun 14, 2023 at 09:40:38PM +0000, M Hickford via GitGitGadget wrote:
> From: M Hickford <mirth.hickford@gmail.com>
>
> `credential reject` sends the erase action to each helper, but the
> exact behaviour of erase isn't specified in documentation or tests.
> Some helpers (such as credential-libsecret) delete all matching
> credentials, others (such as credential-cache and credential-store)
> delete at most one matching credential.
>
> Test that helpers erase all matching credentials. This behaviour is
> easiest to reason about. Users expect that `echo
> "url=https://example.com" | git credential reject` or `echo
> "url=https://example.com\nusername=tim" | git credential reject` erase
> all matching credentials.
>
> Fix credential-cache and credential-store.
I think this was how it was intended to work all along, but I agree that
credential-cache does not behave this way. I think credential-store
already works, though.
> diff --git a/Documentation/git-credential.txt b/Documentation/git-credential.txt
> index 0e6d9e85ec7..04bfb918de6 100644
> --- a/Documentation/git-credential.txt
> +++ b/Documentation/git-credential.txt
> @@ -38,8 +38,8 @@ to any configured credential helpers, which may store the credential
> for later use.
>
> If the action is `reject`, git-credential will send the description to
> -any configured credential helpers, which may erase any stored
> -credential matching the description.
> +any configured credential helpers, which may erase stored credentials
> +matching the description.
I read the existing documentation as claiming to delete all such
matching credentials, but I guess it is ambiguous (and I did not look,
but it is almost a certainty that I wrote the original ;) ).
Saying "credentials" in the plural makes it more clear we are getting
all of them. But losing "any" makes it less clear to me. Maybe:
...which may erase any stored credentials matching the description.
is the best of both?
> diff --git a/Documentation/gitcredentials.txt b/Documentation/gitcredentials.txt
> index 100f045bb1a..65d652dc40e 100644
> --- a/Documentation/gitcredentials.txt
> +++ b/Documentation/gitcredentials.txt
> @@ -260,7 +260,7 @@ appended to its command line, which is one of:
>
> `erase`::
>
> - Remove a matching credential, if any, from the helper's storage.
> + Remove matching credentials, if any, from the helper's storage.
This one seems like a strict improvement in ambiguity.
> diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
> index 82f376d3351..5e3a766e42d 100644
> --- a/builtin/credential-cache--daemon.c
> +++ b/builtin/credential-cache--daemon.c
> [...]
> @@ -48,9 +48,12 @@ static void remove_credential(const struct credential *c)
> {
> struct credential_cache_entry *e;
>
> - e = lookup_credential(c, c->password != NULL);
> - if (e)
> - e->expiration = 0;
> + int i;
> + for (i = 0; i < entries_nr; i++) {
> + e = &entries[i];
> + if (credential_match(c, &e->item, c->password != NULL))
> + e->expiration = 0;
> + }
> }
OK, so now instead of looking up a single credential, we loop and cover
them all. That makes perfect sense. It is a little funny that we undo
the extra parameter to lookup_credential() that was added in the
previous commit. I wonder if reversing the order of the patches would
make it simpler, but it is probably not a big deal either way.
> diff --git a/builtin/credential-store.c b/builtin/credential-store.c
> index e0ae028b1c3..85b147e460f 100644
> --- a/builtin/credential-store.c
> +++ b/builtin/credential-store.c
> @@ -36,7 +36,8 @@ static int parse_credential_file(const char *fn,
> found_credential = 1;
> if (match_cb) {
> match_cb(&entry);
> - break;
> + if (strcmp(op, "erase"))
> + break;
> }
> }
> else if (other_cb)
I think this hunk does nothing. When the op is "erase", we do not pass a
match_cb at all, so this break would never trigger (and indeed, it would
be disastrous if it did, because we would stop copying entries from the
old file to the new, losing everything after the matched entry).
And I think if you revert this, your new test still passes.
> @@ -298,6 +300,37 @@ helper_test() {
> EOF
> '
>
> + test_expect_success "helper ($HELPER) erases all matching credentials" '
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> + username=user6
> + password=pass1
> + EOF
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> + username=user7
> + password=pass1
> + EOF
> + check reject $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> + EOF
> + check fill $HELPER <<-\EOF
> + protocol=https
> + host=example.com
> + --
> + protocol=https
> + host=example.com
> + username=askpass-username
> + password=askpass-password
> + --
> + askpass: Username for '\''https://example.com'\'':
> + askpass: Password for '\''https://askpass-username@example.com'\'':
> + EOF
> + '
The test makes sense. We add two, delete them both, and then check that
nothing is left to serve.
-Peff
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [PATCH v2 2/2] credential: erase all matching credentials
2023-06-14 22:51 ` Jeff King
@ 2023-06-15 4:57 ` M Hickford
0 siblings, 0 replies; 26+ messages in thread
From: M Hickford @ 2023-06-15 4:57 UTC (permalink / raw)
To: Jeff King
Cc: M Hickford via GitGitGadget, git, Matthew John Cheetham,
M Hickford
On Wed, 14 Jun 2023 at 23:51, Jeff King <peff@peff.net> wrote:
>
> On Wed, Jun 14, 2023 at 09:40:38PM +0000, M Hickford via GitGitGadget wrote:
>
> > From: M Hickford <mirth.hickford@gmail.com>
> >
> > `credential reject` sends the erase action to each helper, but the
> > exact behaviour of erase isn't specified in documentation or tests.
> > Some helpers (such as credential-libsecret) delete all matching
> > credentials, others (such as credential-cache and credential-store)
> > delete at most one matching credential.
> >
> > Test that helpers erase all matching credentials. This behaviour is
> > easiest to reason about. Users expect that `echo
> > "url=https://example.com" | git credential reject` or `echo
> > "url=https://example.com\nusername=tim" | git credential reject` erase
> > all matching credentials.
> >
> > Fix credential-cache and credential-store.
>
> I think this was how it was intended to work all along, but I agree that
> credential-cache does not behave this way. I think credential-store
> already works, though.
>
> > diff --git a/Documentation/git-credential.txt b/Documentation/git-credential.txt
> > index 0e6d9e85ec7..04bfb918de6 100644
> > --- a/Documentation/git-credential.txt
> > +++ b/Documentation/git-credential.txt
> > @@ -38,8 +38,8 @@ to any configured credential helpers, which may store the credential
> > for later use.
> >
> > If the action is `reject`, git-credential will send the description to
> > -any configured credential helpers, which may erase any stored
> > -credential matching the description.
> > +any configured credential helpers, which may erase stored credentials
> > +matching the description.
>
> I read the existing documentation as claiming to delete all such
> matching credentials, but I guess it is ambiguous (and I did not look,
> but it is almost a certainty that I wrote the original ;) ).
>
> Saying "credentials" in the plural makes it more clear we are getting
> all of them. But losing "any" makes it less clear to me. Maybe:
>
> ...which may erase any stored credentials matching the description.
>
> is the best of both?
Will update in patch v3.
>
> > diff --git a/Documentation/gitcredentials.txt b/Documentation/gitcredentials.txt
> > index 100f045bb1a..65d652dc40e 100644
> > --- a/Documentation/gitcredentials.txt
> > +++ b/Documentation/gitcredentials.txt
> > @@ -260,7 +260,7 @@ appended to its command line, which is one of:
> >
> > `erase`::
> >
> > - Remove a matching credential, if any, from the helper's storage.
> > + Remove matching credentials, if any, from the helper's storage.
>
> This one seems like a strict improvement in ambiguity.
>
> > diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
> > index 82f376d3351..5e3a766e42d 100644
> > --- a/builtin/credential-cache--daemon.c
> > +++ b/builtin/credential-cache--daemon.c
> > [...]
> > @@ -48,9 +48,12 @@ static void remove_credential(const struct credential *c)
> > {
> > struct credential_cache_entry *e;
> >
> > - e = lookup_credential(c, c->password != NULL);
> > - if (e)
> > - e->expiration = 0;
> > + int i;
> > + for (i = 0; i < entries_nr; i++) {
> > + e = &entries[i];
> > + if (credential_match(c, &e->item, c->password != NULL))
> > + e->expiration = 0;
> > + }
> > }
>
> OK, so now instead of looking up a single credential, we loop and cover
> them all. That makes perfect sense. It is a little funny that we undo
> the extra parameter to lookup_credential() that was added in the
> previous commit. I wonder if reversing the order of the patches would
> make it simpler, but it is probably not a big deal either way.
>
> > diff --git a/builtin/credential-store.c b/builtin/credential-store.c
> > index e0ae028b1c3..85b147e460f 100644
> > --- a/builtin/credential-store.c
> > +++ b/builtin/credential-store.c
> > @@ -36,7 +36,8 @@ static int parse_credential_file(const char *fn,
> > found_credential = 1;
> > if (match_cb) {
> > match_cb(&entry);
> > - break;
> > + if (strcmp(op, "erase"))
> > + break;
> > }
> > }
> > else if (other_cb)
>
> I think this hunk does nothing. When the op is "erase", we do not pass a
> match_cb at all, so this break would never trigger (and indeed, it would
> be disastrous if it did, because we would stop copying entries from the
> old file to the new, losing everything after the matched entry).
>
> And I think if you revert this, your new test still passes.
You're right. I'll revert in patch v3.
>
> > @@ -298,6 +300,37 @@ helper_test() {
> > EOF
> > '
> >
> > + test_expect_success "helper ($HELPER) erases all matching credentials" '
> > + check approve $HELPER <<-\EOF &&
> > + protocol=https
> > + host=example.com
> > + username=user6
> > + password=pass1
> > + EOF
> > + check approve $HELPER <<-\EOF &&
> > + protocol=https
> > + host=example.com
> > + username=user7
> > + password=pass1
> > + EOF
> > + check reject $HELPER <<-\EOF &&
> > + protocol=https
> > + host=example.com
> > + EOF
> > + check fill $HELPER <<-\EOF
> > + protocol=https
> > + host=example.com
> > + --
> > + protocol=https
> > + host=example.com
> > + username=askpass-username
> > + password=askpass-password
> > + --
> > + askpass: Username for '\''https://example.com'\'':
> > + askpass: Password for '\''https://askpass-username@example.com'\'':
> > + EOF
> > + '
>
> The test makes sense. We add two, delete them both, and then check that
> nothing is left to serve.
>
> -Peff
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [PATCH v2 0/2] credential: improvements to erase in helpers
2023-06-14 21:40 ` [PATCH v2 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
2023-06-14 21:40 ` [PATCH v2 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
2023-06-14 21:40 ` [PATCH v2 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
@ 2023-06-14 21:56 ` Junio C Hamano
2023-06-14 22:51 ` Jeff King
2023-06-15 6:03 ` [PATCH v3 " M Hickford via GitGitGadget
3 siblings, 1 reply; 26+ messages in thread
From: Junio C Hamano @ 2023-06-14 21:56 UTC (permalink / raw)
To: M Hickford via GitGitGadget
Cc: git, Jeff King, Matthew John Cheetham, M Hickford
"M Hickford via GitGitGadget" <gitgitgadget@gmail.com> writes:
> M Hickford (2):
> credential: avoid erasing distinct password
> credential: erase all matching credentials
Will queue. Comments by folks with more experience (than me) who
have worked on the credential subsystem are very much welcomed.
Thanks.
>
> Documentation/git-credential.txt | 4 +-
> Documentation/gitcredentials.txt | 2 +-
> builtin/credential-cache--daemon.c | 11 ++++--
> builtin/credential-store.c | 21 ++++++-----
> credential.c | 11 +++---
> credential.h | 2 +-
> t/lib-credential.sh | 59 ++++++++++++++++++++++++++++++
> 7 files changed, 88 insertions(+), 22 deletions(-)
>
>
> base-commit: fe86abd7511a9a6862d5706c6fa1d9b57a63ba09
> Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-git-1525%2Fhickford%2Ferase-test-v2
> Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-git-1525/hickford/erase-test-v2
> Pull-Request: https://github.com/git/git/pull/1525
>
> Range-diff vs v1:
>
> 1: 35ee1795bcd = 1: 35ee1795bcd credential: avoid erasing distinct password
> 2: fcdb579263f ! 2: 9b12f17dc7e credential: erase all matching credentials
> @@ Metadata
> ## Commit message ##
> credential: erase all matching credentials
>
> - Users expect that
> - `echo "url=https://example.com" | git credential reject` or
> - `echo "url=https://example.com\nusername=tim" | git credential reject`
> - erase all matching credentials.
> + `credential reject` sends the erase action to each helper, but the
> + exact behaviour of erase isn't specified in documentation or tests.
> + Some helpers (such as credential-libsecret) delete all matching
> + credentials, others (such as credential-cache and credential-store)
> + delete at most one matching credential.
>
> - Fixes for credential-cache and credential-store.
> + Test that helpers erase all matching credentials. This behaviour is
> + easiest to reason about. Users expect that `echo
> + "url=https://example.com" | git credential reject` or `echo
> + "url=https://example.com\nusername=tim" | git credential reject` erase
> + all matching credentials.
> +
> + Fix credential-cache and credential-store.
>
> Signed-off-by: M Hickford <mirth.hickford@gmail.com>
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [PATCH v2 0/2] credential: improvements to erase in helpers
2023-06-14 21:56 ` [PATCH v2 0/2] credential: improvements to erase in helpers Junio C Hamano
@ 2023-06-14 22:51 ` Jeff King
0 siblings, 0 replies; 26+ messages in thread
From: Jeff King @ 2023-06-14 22:51 UTC (permalink / raw)
To: Junio C Hamano
Cc: M Hickford via GitGitGadget, git, Matthew John Cheetham,
M Hickford
On Wed, Jun 14, 2023 at 02:56:11PM -0700, Junio C Hamano wrote:
> "M Hickford via GitGitGadget" <gitgitgadget@gmail.com> writes:
>
> > M Hickford (2):
> > credential: avoid erasing distinct password
> > credential: erase all matching credentials
>
> Will queue. Comments by folks with more experience (than me) who
> have worked on the credential subsystem are very much welcomed.
I think the direction is good, but there are a few small bits in each
patch to tweak, and we'll want a v3.
-Peff
^ permalink raw reply [flat|nested] 26+ messages in thread
* [PATCH v3 0/2] credential: improvements to erase in helpers
2023-06-14 21:40 ` [PATCH v2 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
` (2 preceding siblings ...)
2023-06-14 21:56 ` [PATCH v2 0/2] credential: improvements to erase in helpers Junio C Hamano
@ 2023-06-15 6:03 ` M Hickford via GitGitGadget
2023-06-15 6:03 ` [PATCH v3 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
` (2 more replies)
3 siblings, 3 replies; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-15 6:03 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford
M Hickford (2):
credential: avoid erasing distinct password
credential: erase all matching credentials
Documentation/git-credential.txt | 2 +-
Documentation/gitcredentials.txt | 2 +-
builtin/credential-cache--daemon.c | 17 +++--
builtin/credential-store.c | 18 ++---
credential.c | 11 +--
credential.h | 2 +-
t/lib-credential.sh | 103 +++++++++++++++++++++++++++++
7 files changed, 131 insertions(+), 24 deletions(-)
base-commit: d7d8841f67f29e6ecbad85a11805c907d0f00d5d
Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-git-1525%2Fhickford%2Ferase-test-v3
Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-git-1525/hickford/erase-test-v3
Pull-Request: https://github.com/git/git/pull/1525
Range-diff vs v2:
1: 35ee1795bcd ! 1: df3c8a15bf8 credential: avoid erasing distinct password
@@ builtin/credential-cache--daemon.c: static void cache_credential(struct credenti
return &entries[i];
}
return NULL;
-@@ builtin/credential-cache--daemon.c: static void remove_credential(const struct credential *c)
+ }
+
+-static void remove_credential(const struct credential *c)
++static void remove_credential(const struct credential *c, int match_password)
{
struct credential_cache_entry *e;
- e = lookup_credential(c);
-+ e = lookup_credential(c, c->password != NULL);
++ e = lookup_credential(c, match_password);
if (e)
e->expiration = 0;
}
@@ builtin/credential-cache--daemon.c: static void serve_one_client(FILE *in, FILE
if (e) {
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
+@@ builtin/credential-cache--daemon.c: static void serve_one_client(FILE *in, FILE *out)
+ exit(0);
+ }
+ else if (!strcmp(action.buf, "erase"))
+- remove_credential(&c);
++ remove_credential(&c, 1);
+ else if (!strcmp(action.buf, "store")) {
+ if (timeout < 0)
+ warning("cache client didn't specify a timeout");
+ else if (!c.username || !c.password)
+ warning("cache client gave us a partial credential");
+ else {
+- remove_credential(&c);
++ remove_credential(&c, 0);
+ cache_credential(&c, timeout);
+ }
+ }
## builtin/credential-store.c ##
@@ builtin/credential-store.c: static struct lock_file credential_lock;
@@ builtin/credential-store.c: static struct lock_file credential_lock;
void (*match_cb)(struct credential *),
- void (*other_cb)(struct strbuf *))
+ void (*other_cb)(struct strbuf *),
-+ const char* op)
++ int match_password)
{
FILE *fh;
struct strbuf line = STRBUF_INIT;
- struct credential entry = CREDENTIAL_INIT;
- int found_credential = 0;
-+ const int match_password = !strcmp(op, "erase") && c->password != NULL;
-
- fh = fopen(fn, "r");
- if (!fh) {
@@ builtin/credential-store.c: static int parse_credential_file(const char *fn,
while (strbuf_getline_lf(&line, fh) != EOF) {
@@ builtin/credential-store.c: static void print_line(struct strbuf *buf)
static void rewrite_credential_file(const char *fn, struct credential *c,
- struct strbuf *extra)
-+ struct strbuf *extra, const char *op)
++ struct strbuf *extra, int match_password)
{
int timeout_ms = 1000;
@@ builtin/credential-store.c: static void rewrite_credential_file(const char *fn,
if (extra)
print_line(extra);
- parse_credential_file(fn, c, NULL, print_line);
-+ parse_credential_file(fn, c, NULL, print_line, op);
++ parse_credential_file(fn, c, NULL, print_line, match_password);
if (commit_lock_file(&credential_lock) < 0)
die_errno("unable to write credential store");
}
@@ builtin/credential-store.c: static void store_credential_file(const char *fn, st
}
- rewrite_credential_file(fn, c, &buf);
-+ rewrite_credential_file(fn, c, &buf, "store");
++ rewrite_credential_file(fn, c, &buf, 0);
strbuf_release(&buf);
}
@@ builtin/credential-store.c: static void remove_credential(const struct string_li
for_each_string_list_item(fn, fns)
if (!access(fn->string, F_OK))
- rewrite_credential_file(fn->string, c, NULL);
-+ rewrite_credential_file(fn->string, c, NULL, "erase");
++ rewrite_credential_file(fn->string, c, NULL, 1);
}
static void lookup_credential(const struct string_list *fns, struct credential *c)
@@ builtin/credential-store.c: static void lookup_credential(const struct string_li
for_each_string_list_item(fn, fns)
- if (parse_credential_file(fn->string, c, print_entry, NULL))
-+ if (parse_credential_file(fn->string, c, print_entry, NULL, "get"))
++ if (parse_credential_file(fn->string, c, print_entry, NULL, 0))
return; /* Found credential */
}
@@ t/lib-credential.sh: helper_test_clean() {
reject $1 https example.com user2
reject $1 https example.com user4
+ reject $1 https example.com user5
++ reject $1 https example.com user8
reject $1 http path.tld user
reject $1 https timeout.tld user
reject $1 https sso.tld
@@ t/lib-credential.sh: helper_test() {
EOF
'
++ test_expect_success "helper ($HELPER) overwrites on store" '
++ check approve $HELPER <<-\EOF &&
++ protocol=https
++ host=example.com
++ username=user8
++ password=pass1
++ EOF
++ check approve $HELPER <<-\EOF &&
++ protocol=https
++ host=example.com
++ username=user8
++ password=pass2
++ EOF
++ check fill $HELPER <<-\EOF &&
++ protocol=https
++ host=example.com
++ username=user8
++ --
++ protocol=https
++ host=example.com
++ username=user8
++ password=pass2
++ EOF
++ check reject $HELPER <<-\EOF &&
++ protocol=https
++ host=example.com
++ username=user8
++ password=pass2
++ EOF
++ check fill $HELPER <<-\EOF
++ protocol=https
++ host=example.com
++ username=user8
++ --
++ protocol=https
++ host=example.com
++ username=user8
++ password=askpass-password
++ --
++ askpass: Password for '\''https://user8@example.com'\'':
++ EOF
++ '
++
+ test_expect_success "helper ($HELPER) can forget host" '
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+@@ t/lib-credential.sh: helper_test() {
+ EOF
+ '
+
+ test_expect_success "helper ($HELPER) does not erase a password distinct from input" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
2: 9b12f17dc7e ! 2: e06d80e99a0 credential: erase all matching credentials
@@ Commit message
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
## Documentation/git-credential.txt ##
-@@ Documentation/git-credential.txt: to any configured credential helpers, which may store the credential
- for later use.
+@@ Documentation/git-credential.txt: for later use.
If the action is `reject`, git-credential will send the description to
--any configured credential helpers, which may erase any stored
+ any configured credential helpers, which may erase any stored
-credential matching the description.
-+any configured credential helpers, which may erase stored credentials
-+matching the description.
++credentials matching the description.
If the action is `approve` or `reject`, no output should be emitted.
@@ builtin/credential-cache--daemon.c: static void cache_credential(struct credenti
return &entries[i];
}
return NULL;
-@@ builtin/credential-cache--daemon.c: static void remove_credential(const struct credential *c)
+@@ builtin/credential-cache--daemon.c: static void remove_credential(const struct credential *c, int match_password)
{
struct credential_cache_entry *e;
-- e = lookup_credential(c, c->password != NULL);
+- e = lookup_credential(c, match_password);
- if (e)
- e->expiration = 0;
+ int i;
+ for (i = 0; i < entries_nr; i++) {
+ e = &entries[i];
-+ if (credential_match(c, &e->item, c->password != NULL))
++ if (credential_match(c, &e->item, match_password))
+ e->expiration = 0;
+ }
}
@@ builtin/credential-store.c: static int parse_credential_file(const char *fn,
if (match_cb) {
match_cb(&entry);
- break;
-+ if (strcmp(op, "erase"))
-+ break;
}
}
else if (other_cb)
@@ t/lib-credential.sh: helper_test_clean() {
reject $1 https example.com user5
+ reject $1 https example.com user6
+ reject $1 https example.com user7
+ reject $1 https example.com user8
reject $1 http path.tld user
reject $1 https timeout.tld user
- reject $1 https sso.tld
@@ t/lib-credential.sh: helper_test() {
EOF
'
--
gitgitgadget
^ permalink raw reply [flat|nested] 26+ messages in thread
* [PATCH v3 1/2] credential: avoid erasing distinct password
2023-06-15 6:03 ` [PATCH v3 " M Hickford via GitGitGadget
@ 2023-06-15 6:03 ` M Hickford via GitGitGadget
2023-06-15 7:08 ` Jeff King
2023-06-15 6:03 ` [PATCH v3 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
2023-06-15 19:19 ` [PATCH v4 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
2 siblings, 1 reply; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-15 6:03 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford, M Hickford
From: M Hickford <mirth.hickford@gmail.com>
Test that credential helpers do not erase a password distinct from the
input. Such calls can happen when multiple credential helpers are
configured.
Fixes for credential-cache and credential-store.
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
---
builtin/credential-cache--daemon.c | 14 +++---
builtin/credential-store.c | 17 ++++----
credential.c | 11 ++---
credential.h | 2 +-
t/lib-credential.sh | 70 ++++++++++++++++++++++++++++++
5 files changed, 93 insertions(+), 21 deletions(-)
diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
index 756c5f02aef..f64dd21d335 100644
--- a/builtin/credential-cache--daemon.c
+++ b/builtin/credential-cache--daemon.c
@@ -33,22 +33,22 @@ static void cache_credential(struct credential *c, int timeout)
e->expiration = time(NULL) + timeout;
}
-static struct credential_cache_entry *lookup_credential(const struct credential *c)
+static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
{
int i;
for (i = 0; i < entries_nr; i++) {
struct credential *e = &entries[i].item;
- if (credential_match(c, e))
+ if (credential_match(c, e, match_password))
return &entries[i];
}
return NULL;
}
-static void remove_credential(const struct credential *c)
+static void remove_credential(const struct credential *c, int match_password)
{
struct credential_cache_entry *e;
- e = lookup_credential(c);
+ e = lookup_credential(c, match_password);
if (e)
e->expiration = 0;
}
@@ -127,7 +127,7 @@ static void serve_one_client(FILE *in, FILE *out)
if (read_request(in, &c, &action, &timeout) < 0)
/* ignore error */ ;
else if (!strcmp(action.buf, "get")) {
- struct credential_cache_entry *e = lookup_credential(&c);
+ struct credential_cache_entry *e = lookup_credential(&c, 0);
if (e) {
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
@@ -151,14 +151,14 @@ static void serve_one_client(FILE *in, FILE *out)
exit(0);
}
else if (!strcmp(action.buf, "erase"))
- remove_credential(&c);
+ remove_credential(&c, 1);
else if (!strcmp(action.buf, "store")) {
if (timeout < 0)
warning("cache client didn't specify a timeout");
else if (!c.username || !c.password)
warning("cache client gave us a partial credential");
else {
- remove_credential(&c);
+ remove_credential(&c, 0);
cache_credential(&c, timeout);
}
}
diff --git a/builtin/credential-store.c b/builtin/credential-store.c
index 30c6ccf56c0..f80ff59f18a 100644
--- a/builtin/credential-store.c
+++ b/builtin/credential-store.c
@@ -13,7 +13,8 @@ static struct lock_file credential_lock;
static int parse_credential_file(const char *fn,
struct credential *c,
void (*match_cb)(struct credential *),
- void (*other_cb)(struct strbuf *))
+ void (*other_cb)(struct strbuf *),
+ int match_password)
{
FILE *fh;
struct strbuf line = STRBUF_INIT;
@@ -29,8 +30,8 @@ static int parse_credential_file(const char *fn,
while (strbuf_getline_lf(&line, fh) != EOF) {
if (!credential_from_url_gently(&entry, line.buf, 1) &&
- entry.username && entry.password &&
- credential_match(c, &entry)) {
+ entry.username && entry.password &&
+ credential_match(c, &entry, match_password)) {
found_credential = 1;
if (match_cb) {
match_cb(&entry);
@@ -60,7 +61,7 @@ static void print_line(struct strbuf *buf)
}
static void rewrite_credential_file(const char *fn, struct credential *c,
- struct strbuf *extra)
+ struct strbuf *extra, int match_password)
{
int timeout_ms = 1000;
@@ -69,7 +70,7 @@ static void rewrite_credential_file(const char *fn, struct credential *c,
die_errno(_("unable to get credential storage lock in %d ms"), timeout_ms);
if (extra)
print_line(extra);
- parse_credential_file(fn, c, NULL, print_line);
+ parse_credential_file(fn, c, NULL, print_line, match_password);
if (commit_lock_file(&credential_lock) < 0)
die_errno("unable to write credential store");
}
@@ -91,7 +92,7 @@ static void store_credential_file(const char *fn, struct credential *c)
is_rfc3986_reserved_or_unreserved);
}
- rewrite_credential_file(fn, c, &buf);
+ rewrite_credential_file(fn, c, &buf, 0);
strbuf_release(&buf);
}
@@ -138,7 +139,7 @@ static void remove_credential(const struct string_list *fns, struct credential *
return;
for_each_string_list_item(fn, fns)
if (!access(fn->string, F_OK))
- rewrite_credential_file(fn->string, c, NULL);
+ rewrite_credential_file(fn->string, c, NULL, 1);
}
static void lookup_credential(const struct string_list *fns, struct credential *c)
@@ -146,7 +147,7 @@ static void lookup_credential(const struct string_list *fns, struct credential *
struct string_list_item *fn;
for_each_string_list_item(fn, fns)
- if (parse_credential_file(fn->string, c, print_entry, NULL))
+ if (parse_credential_file(fn->string, c, print_entry, NULL, 0))
return; /* Found credential */
}
diff --git a/credential.c b/credential.c
index 023b59d5711..9157ff0865e 100644
--- a/credential.c
+++ b/credential.c
@@ -33,13 +33,14 @@ void credential_clear(struct credential *c)
}
int credential_match(const struct credential *want,
- const struct credential *have)
+ const struct credential *have, int match_password)
{
#define CHECK(x) (!want->x || (have->x && !strcmp(want->x, have->x)))
return CHECK(protocol) &&
- CHECK(host) &&
- CHECK(path) &&
- CHECK(username);
+ CHECK(host) &&
+ CHECK(path) &&
+ CHECK(username) &&
+ (!match_password || CHECK(password));
#undef CHECK
}
@@ -102,7 +103,7 @@ static int match_partial_url(const char *url, void *cb)
warning(_("skipping credential lookup for key: credential.%s"),
url);
else
- matches = credential_match(&want, c);
+ matches = credential_match(&want, c, 0);
credential_clear(&want);
return matches;
diff --git a/credential.h b/credential.h
index b8e2936d1dc..acc41adf548 100644
--- a/credential.h
+++ b/credential.h
@@ -211,6 +211,6 @@ void credential_from_url(struct credential *, const char *url);
int credential_from_url_gently(struct credential *, const char *url, int quiet);
int credential_match(const struct credential *want,
- const struct credential *have);
+ const struct credential *have, int match_password);
#endif /* CREDENTIAL_H */
diff --git a/t/lib-credential.sh b/t/lib-credential.sh
index f1ab92ba35c..7b4fdd011d7 100644
--- a/t/lib-credential.sh
+++ b/t/lib-credential.sh
@@ -44,6 +44,8 @@ helper_test_clean() {
reject $1 https example.com user1
reject $1 https example.com user2
reject $1 https example.com user4
+ reject $1 https example.com user5
+ reject $1 https example.com user8
reject $1 http path.tld user
reject $1 https timeout.tld user
reject $1 https sso.tld
@@ -167,6 +169,49 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) overwrites on store" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user8
+ password=pass1
+ EOF
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user8
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user8
+ --
+ protocol=https
+ host=example.com
+ username=user8
+ password=pass2
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user8
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ username=user8
+ --
+ protocol=https
+ host=example.com
+ username=user8
+ password=askpass-password
+ --
+ askpass: Password for '\''https://user8@example.com'\'':
+ EOF
+ '
+
test_expect_success "helper ($HELPER) can forget host" '
check reject $HELPER <<-\EOF &&
protocol=https
@@ -221,6 +266,31 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) does not erase a password distinct from input" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user5
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user5
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ username=user5
+ --
+ protocol=https
+ host=example.com
+ username=user5
+ password=pass1
+ EOF
+ '
+
test_expect_success "helper ($HELPER) can forget user" '
check reject $HELPER <<-\EOF &&
protocol=https
--
gitgitgadget
^ permalink raw reply related [flat|nested] 26+ messages in thread
* Re: [PATCH v3 1/2] credential: avoid erasing distinct password
2023-06-15 6:03 ` [PATCH v3 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
@ 2023-06-15 7:08 ` Jeff King
0 siblings, 0 replies; 26+ messages in thread
From: Jeff King @ 2023-06-15 7:08 UTC (permalink / raw)
To: M Hickford via GitGitGadget; +Cc: git, Matthew John Cheetham, M Hickford
On Thu, Jun 15, 2023 at 06:03:23AM +0000, M Hickford via GitGitGadget wrote:
> @@ -151,14 +151,14 @@ static void serve_one_client(FILE *in, FILE *out)
> exit(0);
> }
> else if (!strcmp(action.buf, "erase"))
> - remove_credential(&c);
> + remove_credential(&c, 1);
> else if (!strcmp(action.buf, "store")) {
> if (timeout < 0)
> warning("cache client didn't specify a timeout");
> else if (!c.username || !c.password)
> warning("cache client gave us a partial credential");
> else {
> - remove_credential(&c);
> + remove_credential(&c, 0);
> cache_credential(&c, timeout);
> }
> }
Great, this hunk fixes the overwrite problem from the previous round.
All of the credential-cache bits look good to me.
> @@ -29,8 +30,8 @@ static int parse_credential_file(const char *fn,
>
> while (strbuf_getline_lf(&line, fh) != EOF) {
> if (!credential_from_url_gently(&entry, line.buf, 1) &&
> - entry.username && entry.password &&
> - credential_match(c, &entry)) {
> + entry.username && entry.password &&
> + credential_match(c, &entry, match_password)) {
> found_credential = 1;
> if (match_cb) {
> match_cb(&entry);
This hunk is from credential-store. I think the code change is doing the
right thing, but the modified indentation is wrong (we'd usually do a
4-space indentation to line up the conditions; doing a full tab confuses
the conditions with the actual body).
> diff --git a/credential.c b/credential.c
> index 023b59d5711..9157ff0865e 100644
> --- a/credential.c
> +++ b/credential.c
> @@ -33,13 +33,14 @@ void credential_clear(struct credential *c)
> }
>
> int credential_match(const struct credential *want,
> - const struct credential *have)
> + const struct credential *have, int match_password)
> {
> #define CHECK(x) (!want->x || (have->x && !strcmp(want->x, have->x)))
> return CHECK(protocol) &&
> - CHECK(host) &&
> - CHECK(path) &&
> - CHECK(username);
> + CHECK(host) &&
> + CHECK(path) &&
> + CHECK(username) &&
> + (!match_password || CHECK(password));
> #undef CHECK
> }
The indentation here seemed funny to me, too, though I think it's a
matter of taste (indent a tab versus line up with the seven chars of
"return ". I'd have a slight preference to leave it as-is, just because
it makes the diff noisier, but I'm OK with it either way.
> diff --git a/t/lib-credential.sh b/t/lib-credential.sh
> index f1ab92ba35c..7b4fdd011d7 100644
> --- a/t/lib-credential.sh
> +++ b/t/lib-credential.sh
> @@ -44,6 +44,8 @@ helper_test_clean() {
> reject $1 https example.com user1
> reject $1 https example.com user2
> reject $1 https example.com user4
> + reject $1 https example.com user5
> + reject $1 https example.com user8
> reject $1 http path.tld user
> reject $1 https timeout.tld user
> reject $1 https sso.tld
This is a funny gap to have (I realize it is because you use 6-7 in the
next patch, but usually we'd try to do things in order and rebase
downstream patches as appropriate). Doubly funny here is that the test
for "8" comes before "5". That's not wrong from a code/testing
standpoint, but it may make the script harder to read or modify later
on.
Maybe it would be easier to read if we gave these users non-numeric
names that match how we will use them. E.g., can we call user8
user-overwrite or something? That makes the intention obvious, and then
we do not have to worry about maintaining ordering constraints.
> @@ -167,6 +169,49 @@ helper_test() {
> EOF
> '
>
> + test_expect_success "helper ($HELPER) overwrites on store" '
> [...]
Great, thank you for adding a test for this case. The test itself looks
good to me.
> @@ -221,6 +266,31 @@ helper_test() {
> EOF
> '
>
> + test_expect_success "helper ($HELPER) does not erase a password distinct from input" '
> [...]
And this one continues to look good. I think the username could be
"user-distinct-pass" or something if we wanted to go with
human-understandable ones.
-Peff
^ permalink raw reply [flat|nested] 26+ messages in thread
* [PATCH v3 2/2] credential: erase all matching credentials
2023-06-15 6:03 ` [PATCH v3 " M Hickford via GitGitGadget
2023-06-15 6:03 ` [PATCH v3 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
@ 2023-06-15 6:03 ` M Hickford via GitGitGadget
2023-06-15 7:09 ` Jeff King
2023-06-15 19:19 ` [PATCH v4 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
2 siblings, 1 reply; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-15 6:03 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford, M Hickford
From: M Hickford <mirth.hickford@gmail.com>
`credential reject` sends the erase action to each helper, but the
exact behaviour of erase isn't specified in documentation or tests.
Some helpers (such as credential-libsecret) delete all matching
credentials, others (such as credential-cache and credential-store)
delete at most one matching credential.
Test that helpers erase all matching credentials. This behaviour is
easiest to reason about. Users expect that `echo
"url=https://example.com" | git credential reject` or `echo
"url=https://example.com\nusername=tim" | git credential reject` erase
all matching credentials.
Fix credential-cache and credential-store.
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
---
Documentation/git-credential.txt | 2 +-
Documentation/gitcredentials.txt | 2 +-
builtin/credential-cache--daemon.c | 15 ++++++++------
builtin/credential-store.c | 1 -
t/lib-credential.sh | 33 ++++++++++++++++++++++++++++++
5 files changed, 44 insertions(+), 9 deletions(-)
diff --git a/Documentation/git-credential.txt b/Documentation/git-credential.txt
index 0e6d9e85ec7..a220afed4f3 100644
--- a/Documentation/git-credential.txt
+++ b/Documentation/git-credential.txt
@@ -39,7 +39,7 @@ for later use.
If the action is `reject`, git-credential will send the description to
any configured credential helpers, which may erase any stored
-credential matching the description.
+credentials matching the description.
If the action is `approve` or `reject`, no output should be emitted.
diff --git a/Documentation/gitcredentials.txt b/Documentation/gitcredentials.txt
index 100f045bb1a..65d652dc40e 100644
--- a/Documentation/gitcredentials.txt
+++ b/Documentation/gitcredentials.txt
@@ -260,7 +260,7 @@ appended to its command line, which is one of:
`erase`::
- Remove a matching credential, if any, from the helper's storage.
+ Remove matching credentials, if any, from the helper's storage.
The details of the credential will be provided on the helper's stdin
stream. The exact format is the same as the input/output format of the
diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
index f64dd21d335..dc1cf2d25fc 100644
--- a/builtin/credential-cache--daemon.c
+++ b/builtin/credential-cache--daemon.c
@@ -33,12 +33,12 @@ static void cache_credential(struct credential *c, int timeout)
e->expiration = time(NULL) + timeout;
}
-static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
+static struct credential_cache_entry *lookup_credential(const struct credential *c)
{
int i;
for (i = 0; i < entries_nr; i++) {
struct credential *e = &entries[i].item;
- if (credential_match(c, e, match_password))
+ if (credential_match(c, e, 0))
return &entries[i];
}
return NULL;
@@ -48,9 +48,12 @@ static void remove_credential(const struct credential *c, int match_password)
{
struct credential_cache_entry *e;
- e = lookup_credential(c, match_password);
- if (e)
- e->expiration = 0;
+ int i;
+ for (i = 0; i < entries_nr; i++) {
+ e = &entries[i];
+ if (credential_match(c, &e->item, match_password))
+ e->expiration = 0;
+ }
}
static timestamp_t check_expirations(void)
@@ -127,7 +130,7 @@ static void serve_one_client(FILE *in, FILE *out)
if (read_request(in, &c, &action, &timeout) < 0)
/* ignore error */ ;
else if (!strcmp(action.buf, "get")) {
- struct credential_cache_entry *e = lookup_credential(&c, 0);
+ struct credential_cache_entry *e = lookup_credential(&c);
if (e) {
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
diff --git a/builtin/credential-store.c b/builtin/credential-store.c
index f80ff59f18a..06bbfa4dd03 100644
--- a/builtin/credential-store.c
+++ b/builtin/credential-store.c
@@ -35,7 +35,6 @@ static int parse_credential_file(const char *fn,
found_credential = 1;
if (match_cb) {
match_cb(&entry);
- break;
}
}
else if (other_cb)
diff --git a/t/lib-credential.sh b/t/lib-credential.sh
index 7b4fdd011d7..3f21ba66929 100644
--- a/t/lib-credential.sh
+++ b/t/lib-credential.sh
@@ -45,6 +45,8 @@ helper_test_clean() {
reject $1 https example.com user2
reject $1 https example.com user4
reject $1 https example.com user5
+ reject $1 https example.com user6
+ reject $1 https example.com user7
reject $1 https example.com user8
reject $1 http path.tld user
reject $1 https timeout.tld user
@@ -342,6 +344,37 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) erases all matching credentials" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user6
+ password=pass1
+ EOF
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user7
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ --
+ protocol=https
+ host=example.com
+ username=askpass-username
+ password=askpass-password
+ --
+ askpass: Username for '\''https://example.com'\'':
+ askpass: Password for '\''https://askpass-username@example.com'\'':
+ EOF
+ '
+
: ${GIT_TEST_LONG_CRED_BUFFER:=1024}
# 23 bytes accounts for "wwwauth[]=basic realm=" plus NUL
LONG_VALUE_LEN=$((GIT_TEST_LONG_CRED_BUFFER - 23))
--
gitgitgadget
^ permalink raw reply related [flat|nested] 26+ messages in thread
* Re: [PATCH v3 2/2] credential: erase all matching credentials
2023-06-15 6:03 ` [PATCH v3 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
@ 2023-06-15 7:09 ` Jeff King
0 siblings, 0 replies; 26+ messages in thread
From: Jeff King @ 2023-06-15 7:09 UTC (permalink / raw)
To: M Hickford via GitGitGadget; +Cc: git, Matthew John Cheetham, M Hickford
On Thu, Jun 15, 2023 at 06:03:24AM +0000, M Hickford via GitGitGadget wrote:
> From: M Hickford <mirth.hickford@gmail.com>
>
> `credential reject` sends the erase action to each helper, but the
> exact behaviour of erase isn't specified in documentation or tests.
> Some helpers (such as credential-libsecret) delete all matching
> credentials, others (such as credential-cache and credential-store)
> delete at most one matching credential.
>
> Test that helpers erase all matching credentials. This behaviour is
> easiest to reason about. Users expect that `echo
> "url=https://example.com" | git credential reject` or `echo
> "url=https://example.com\nusername=tim" | git credential reject` erase
> all matching credentials.
>
> Fix credential-cache and credential-store.
This last sentence is out of date now, right? We are only fixing
credential-cache.
> diff --git a/builtin/credential-store.c b/builtin/credential-store.c
> index f80ff59f18a..06bbfa4dd03 100644
> --- a/builtin/credential-store.c
> +++ b/builtin/credential-store.c
> @@ -35,7 +35,6 @@ static int parse_credential_file(const char *fn,
> found_credential = 1;
> if (match_cb) {
> match_cb(&entry);
> - break;
> }
> }
> else if (other_cb)
This hunk is wrong, isn't it? We should not be touching credential-store
at all (and losing the "break" means that we'd accidentally print
multiple matching entries for "get").
-Peff
^ permalink raw reply [flat|nested] 26+ messages in thread
* [PATCH v4 0/2] credential: improvements to erase in helpers
2023-06-15 6:03 ` [PATCH v3 " M Hickford via GitGitGadget
2023-06-15 6:03 ` [PATCH v3 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
2023-06-15 6:03 ` [PATCH v3 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
@ 2023-06-15 19:19 ` M Hickford via GitGitGadget
2023-06-15 19:19 ` [PATCH v4 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
` (2 more replies)
2 siblings, 3 replies; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-15 19:19 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford
M Hickford (2):
credential: avoid erasing distinct password
credential: erase all matching credentials
Documentation/git-credential.txt | 2 +-
Documentation/gitcredentials.txt | 2 +-
builtin/credential-cache--daemon.c | 17 +++--
builtin/credential-store.c | 15 +++--
credential.c | 7 +-
credential.h | 2 +-
t/lib-credential.sh | 103 +++++++++++++++++++++++++++++
7 files changed, 128 insertions(+), 20 deletions(-)
base-commit: d7d8841f67f29e6ecbad85a11805c907d0f00d5d
Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-git-1525%2Fhickford%2Ferase-test-v4
Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-git-1525/hickford/erase-test-v4
Pull-Request: https://github.com/git/git/pull/1525
Range-diff vs v3:
1: df3c8a15bf8 ! 1: 91d4b04b5e1 credential: avoid erasing distinct password
@@ builtin/credential-store.c: static struct lock_file credential_lock;
FILE *fh;
struct strbuf line = STRBUF_INIT;
@@ builtin/credential-store.c: static int parse_credential_file(const char *fn,
-
while (strbuf_getline_lf(&line, fh) != EOF) {
if (!credential_from_url_gently(&entry, line.buf, 1) &&
-- entry.username && entry.password &&
+ entry.username && entry.password &&
- credential_match(c, &entry)) {
-+ entry.username && entry.password &&
-+ credential_match(c, &entry, match_password)) {
++ credential_match(c, &entry, match_password)) {
found_credential = 1;
if (match_cb) {
match_cb(&entry);
@@ credential.c: void credential_clear(struct credential *c)
{
#define CHECK(x) (!want->x || (have->x && !strcmp(want->x, have->x)))
return CHECK(protocol) &&
-- CHECK(host) &&
-- CHECK(path) &&
+ CHECK(host) &&
+ CHECK(path) &&
- CHECK(username);
-+ CHECK(host) &&
-+ CHECK(path) &&
-+ CHECK(username) &&
-+ (!match_password || CHECK(password));
++ CHECK(username) &&
++ (!match_password || CHECK(password));
#undef CHECK
}
@@ t/lib-credential.sh: helper_test_clean() {
reject $1 https example.com user1
reject $1 https example.com user2
reject $1 https example.com user4
-+ reject $1 https example.com user5
-+ reject $1 https example.com user8
++ reject $1 https example.com user-distinct-pass
++ reject $1 https example.com user-overwrite
reject $1 http path.tld user
reject $1 https timeout.tld user
reject $1 https sso.tld
@@ t/lib-credential.sh: helper_test() {
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user8
++ username=user-overwrite
+ password=pass1
+ EOF
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user8
++ username=user-overwrite
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user8
++ username=user-overwrite
+ --
+ protocol=https
+ host=example.com
-+ username=user8
++ username=user-overwrite
+ password=pass2
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user8
++ username=user-overwrite
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
-+ username=user8
++ username=user-overwrite
+ --
+ protocol=https
+ host=example.com
-+ username=user8
++ username=user-overwrite
+ password=askpass-password
+ --
-+ askpass: Password for '\''https://user8@example.com'\'':
++ askpass: Password for '\''https://user-overwrite@example.com'\'':
+ EOF
+ '
+
@@ t/lib-credential.sh: helper_test() {
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user5
++ username=user-distinct-pass
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user5
++ username=user-distinct-pass
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
-+ username=user5
++ username=user-distinct-pass
+ --
+ protocol=https
+ host=example.com
-+ username=user5
++ username=user-distinct-pass
+ password=pass1
+ EOF
+ '
2: e06d80e99a0 ! 2: 42f41b28e6e credential: erase all matching credentials
@@ Commit message
`credential reject` sends the erase action to each helper, but the
exact behaviour of erase isn't specified in documentation or tests.
- Some helpers (such as credential-libsecret) delete all matching
- credentials, others (such as credential-cache and credential-store)
- delete at most one matching credential.
+ Some helpers (such as credential-store and credential-libsecret) delete
+ all matching credentials, others (such as credential-cache) delete at
+ most one matching credential.
Test that helpers erase all matching credentials. This behaviour is
easiest to reason about. Users expect that `echo
@@ Commit message
"url=https://example.com\nusername=tim" | git credential reject` erase
all matching credentials.
- Fix credential-cache and credential-store.
+ Fix credential-cache.
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
@@ builtin/credential-cache--daemon.c: static void serve_one_client(FILE *in, FILE
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
- ## builtin/credential-store.c ##
-@@ builtin/credential-store.c: static int parse_credential_file(const char *fn,
- found_credential = 1;
- if (match_cb) {
- match_cb(&entry);
-- break;
- }
- }
- else if (other_cb)
-
## t/lib-credential.sh ##
@@ t/lib-credential.sh: helper_test_clean() {
- reject $1 https example.com user2
reject $1 https example.com user4
- reject $1 https example.com user5
-+ reject $1 https example.com user6
-+ reject $1 https example.com user7
- reject $1 https example.com user8
+ reject $1 https example.com user-distinct-pass
+ reject $1 https example.com user-overwrite
++ reject $1 https example.com user-erase1
++ reject $1 https example.com user-erase2
reject $1 http path.tld user
reject $1 https timeout.tld user
+ reject $1 https sso.tld
@@ t/lib-credential.sh: helper_test() {
EOF
'
@@ t/lib-credential.sh: helper_test() {
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user6
++ username=user-erase1
+ password=pass1
+ EOF
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
-+ username=user7
++ username=user-erase2
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
--
gitgitgadget
^ permalink raw reply [flat|nested] 26+ messages in thread
* [PATCH v4 1/2] credential: avoid erasing distinct password
2023-06-15 19:19 ` [PATCH v4 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
@ 2023-06-15 19:19 ` M Hickford via GitGitGadget
2023-06-15 19:19 ` [PATCH v4 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
2023-06-15 21:09 ` [PATCH v4 0/2] credential: improvements to erase in helpers Junio C Hamano
2 siblings, 0 replies; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-15 19:19 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford, M Hickford
From: M Hickford <mirth.hickford@gmail.com>
Test that credential helpers do not erase a password distinct from the
input. Such calls can happen when multiple credential helpers are
configured.
Fixes for credential-cache and credential-store.
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
---
builtin/credential-cache--daemon.c | 14 +++---
builtin/credential-store.c | 15 ++++---
credential.c | 7 +--
credential.h | 2 +-
t/lib-credential.sh | 70 ++++++++++++++++++++++++++++++
5 files changed, 90 insertions(+), 18 deletions(-)
diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
index 756c5f02aef..f64dd21d335 100644
--- a/builtin/credential-cache--daemon.c
+++ b/builtin/credential-cache--daemon.c
@@ -33,22 +33,22 @@ static void cache_credential(struct credential *c, int timeout)
e->expiration = time(NULL) + timeout;
}
-static struct credential_cache_entry *lookup_credential(const struct credential *c)
+static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
{
int i;
for (i = 0; i < entries_nr; i++) {
struct credential *e = &entries[i].item;
- if (credential_match(c, e))
+ if (credential_match(c, e, match_password))
return &entries[i];
}
return NULL;
}
-static void remove_credential(const struct credential *c)
+static void remove_credential(const struct credential *c, int match_password)
{
struct credential_cache_entry *e;
- e = lookup_credential(c);
+ e = lookup_credential(c, match_password);
if (e)
e->expiration = 0;
}
@@ -127,7 +127,7 @@ static void serve_one_client(FILE *in, FILE *out)
if (read_request(in, &c, &action, &timeout) < 0)
/* ignore error */ ;
else if (!strcmp(action.buf, "get")) {
- struct credential_cache_entry *e = lookup_credential(&c);
+ struct credential_cache_entry *e = lookup_credential(&c, 0);
if (e) {
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
@@ -151,14 +151,14 @@ static void serve_one_client(FILE *in, FILE *out)
exit(0);
}
else if (!strcmp(action.buf, "erase"))
- remove_credential(&c);
+ remove_credential(&c, 1);
else if (!strcmp(action.buf, "store")) {
if (timeout < 0)
warning("cache client didn't specify a timeout");
else if (!c.username || !c.password)
warning("cache client gave us a partial credential");
else {
- remove_credential(&c);
+ remove_credential(&c, 0);
cache_credential(&c, timeout);
}
}
diff --git a/builtin/credential-store.c b/builtin/credential-store.c
index 30c6ccf56c0..0937230bced 100644
--- a/builtin/credential-store.c
+++ b/builtin/credential-store.c
@@ -13,7 +13,8 @@ static struct lock_file credential_lock;
static int parse_credential_file(const char *fn,
struct credential *c,
void (*match_cb)(struct credential *),
- void (*other_cb)(struct strbuf *))
+ void (*other_cb)(struct strbuf *),
+ int match_password)
{
FILE *fh;
struct strbuf line = STRBUF_INIT;
@@ -30,7 +31,7 @@ static int parse_credential_file(const char *fn,
while (strbuf_getline_lf(&line, fh) != EOF) {
if (!credential_from_url_gently(&entry, line.buf, 1) &&
entry.username && entry.password &&
- credential_match(c, &entry)) {
+ credential_match(c, &entry, match_password)) {
found_credential = 1;
if (match_cb) {
match_cb(&entry);
@@ -60,7 +61,7 @@ static void print_line(struct strbuf *buf)
}
static void rewrite_credential_file(const char *fn, struct credential *c,
- struct strbuf *extra)
+ struct strbuf *extra, int match_password)
{
int timeout_ms = 1000;
@@ -69,7 +70,7 @@ static void rewrite_credential_file(const char *fn, struct credential *c,
die_errno(_("unable to get credential storage lock in %d ms"), timeout_ms);
if (extra)
print_line(extra);
- parse_credential_file(fn, c, NULL, print_line);
+ parse_credential_file(fn, c, NULL, print_line, match_password);
if (commit_lock_file(&credential_lock) < 0)
die_errno("unable to write credential store");
}
@@ -91,7 +92,7 @@ static void store_credential_file(const char *fn, struct credential *c)
is_rfc3986_reserved_or_unreserved);
}
- rewrite_credential_file(fn, c, &buf);
+ rewrite_credential_file(fn, c, &buf, 0);
strbuf_release(&buf);
}
@@ -138,7 +139,7 @@ static void remove_credential(const struct string_list *fns, struct credential *
return;
for_each_string_list_item(fn, fns)
if (!access(fn->string, F_OK))
- rewrite_credential_file(fn->string, c, NULL);
+ rewrite_credential_file(fn->string, c, NULL, 1);
}
static void lookup_credential(const struct string_list *fns, struct credential *c)
@@ -146,7 +147,7 @@ static void lookup_credential(const struct string_list *fns, struct credential *
struct string_list_item *fn;
for_each_string_list_item(fn, fns)
- if (parse_credential_file(fn->string, c, print_entry, NULL))
+ if (parse_credential_file(fn->string, c, print_entry, NULL, 0))
return; /* Found credential */
}
diff --git a/credential.c b/credential.c
index 023b59d5711..8825c6f1320 100644
--- a/credential.c
+++ b/credential.c
@@ -33,13 +33,14 @@ void credential_clear(struct credential *c)
}
int credential_match(const struct credential *want,
- const struct credential *have)
+ const struct credential *have, int match_password)
{
#define CHECK(x) (!want->x || (have->x && !strcmp(want->x, have->x)))
return CHECK(protocol) &&
CHECK(host) &&
CHECK(path) &&
- CHECK(username);
+ CHECK(username) &&
+ (!match_password || CHECK(password));
#undef CHECK
}
@@ -102,7 +103,7 @@ static int match_partial_url(const char *url, void *cb)
warning(_("skipping credential lookup for key: credential.%s"),
url);
else
- matches = credential_match(&want, c);
+ matches = credential_match(&want, c, 0);
credential_clear(&want);
return matches;
diff --git a/credential.h b/credential.h
index b8e2936d1dc..acc41adf548 100644
--- a/credential.h
+++ b/credential.h
@@ -211,6 +211,6 @@ void credential_from_url(struct credential *, const char *url);
int credential_from_url_gently(struct credential *, const char *url, int quiet);
int credential_match(const struct credential *want,
- const struct credential *have);
+ const struct credential *have, int match_password);
#endif /* CREDENTIAL_H */
diff --git a/t/lib-credential.sh b/t/lib-credential.sh
index f1ab92ba35c..77baec53b6a 100644
--- a/t/lib-credential.sh
+++ b/t/lib-credential.sh
@@ -44,6 +44,8 @@ helper_test_clean() {
reject $1 https example.com user1
reject $1 https example.com user2
reject $1 https example.com user4
+ reject $1 https example.com user-distinct-pass
+ reject $1 https example.com user-overwrite
reject $1 http path.tld user
reject $1 https timeout.tld user
reject $1 https sso.tld
@@ -167,6 +169,49 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) overwrites on store" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-overwrite
+ password=pass1
+ EOF
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-overwrite
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-overwrite
+ --
+ protocol=https
+ host=example.com
+ username=user-overwrite
+ password=pass2
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-overwrite
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ username=user-overwrite
+ --
+ protocol=https
+ host=example.com
+ username=user-overwrite
+ password=askpass-password
+ --
+ askpass: Password for '\''https://user-overwrite@example.com'\'':
+ EOF
+ '
+
test_expect_success "helper ($HELPER) can forget host" '
check reject $HELPER <<-\EOF &&
protocol=https
@@ -221,6 +266,31 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) does not erase a password distinct from input" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-distinct-pass
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-distinct-pass
+ password=pass2
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ username=user-distinct-pass
+ --
+ protocol=https
+ host=example.com
+ username=user-distinct-pass
+ password=pass1
+ EOF
+ '
+
test_expect_success "helper ($HELPER) can forget user" '
check reject $HELPER <<-\EOF &&
protocol=https
--
gitgitgadget
^ permalink raw reply related [flat|nested] 26+ messages in thread
* [PATCH v4 2/2] credential: erase all matching credentials
2023-06-15 19:19 ` [PATCH v4 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
2023-06-15 19:19 ` [PATCH v4 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
@ 2023-06-15 19:19 ` M Hickford via GitGitGadget
2023-06-15 21:09 ` [PATCH v4 0/2] credential: improvements to erase in helpers Junio C Hamano
2 siblings, 0 replies; 26+ messages in thread
From: M Hickford via GitGitGadget @ 2023-06-15 19:19 UTC (permalink / raw)
To: git; +Cc: Jeff King, Matthew John Cheetham, M Hickford, M Hickford
From: M Hickford <mirth.hickford@gmail.com>
`credential reject` sends the erase action to each helper, but the
exact behaviour of erase isn't specified in documentation or tests.
Some helpers (such as credential-store and credential-libsecret) delete
all matching credentials, others (such as credential-cache) delete at
most one matching credential.
Test that helpers erase all matching credentials. This behaviour is
easiest to reason about. Users expect that `echo
"url=https://example.com" | git credential reject` or `echo
"url=https://example.com\nusername=tim" | git credential reject` erase
all matching credentials.
Fix credential-cache.
Signed-off-by: M Hickford <mirth.hickford@gmail.com>
---
Documentation/git-credential.txt | 2 +-
Documentation/gitcredentials.txt | 2 +-
builtin/credential-cache--daemon.c | 15 ++++++++------
t/lib-credential.sh | 33 ++++++++++++++++++++++++++++++
4 files changed, 44 insertions(+), 8 deletions(-)
diff --git a/Documentation/git-credential.txt b/Documentation/git-credential.txt
index 0e6d9e85ec7..a220afed4f3 100644
--- a/Documentation/git-credential.txt
+++ b/Documentation/git-credential.txt
@@ -39,7 +39,7 @@ for later use.
If the action is `reject`, git-credential will send the description to
any configured credential helpers, which may erase any stored
-credential matching the description.
+credentials matching the description.
If the action is `approve` or `reject`, no output should be emitted.
diff --git a/Documentation/gitcredentials.txt b/Documentation/gitcredentials.txt
index 100f045bb1a..65d652dc40e 100644
--- a/Documentation/gitcredentials.txt
+++ b/Documentation/gitcredentials.txt
@@ -260,7 +260,7 @@ appended to its command line, which is one of:
`erase`::
- Remove a matching credential, if any, from the helper's storage.
+ Remove matching credentials, if any, from the helper's storage.
The details of the credential will be provided on the helper's stdin
stream. The exact format is the same as the input/output format of the
diff --git a/builtin/credential-cache--daemon.c b/builtin/credential-cache--daemon.c
index f64dd21d335..dc1cf2d25fc 100644
--- a/builtin/credential-cache--daemon.c
+++ b/builtin/credential-cache--daemon.c
@@ -33,12 +33,12 @@ static void cache_credential(struct credential *c, int timeout)
e->expiration = time(NULL) + timeout;
}
-static struct credential_cache_entry *lookup_credential(const struct credential *c, int match_password)
+static struct credential_cache_entry *lookup_credential(const struct credential *c)
{
int i;
for (i = 0; i < entries_nr; i++) {
struct credential *e = &entries[i].item;
- if (credential_match(c, e, match_password))
+ if (credential_match(c, e, 0))
return &entries[i];
}
return NULL;
@@ -48,9 +48,12 @@ static void remove_credential(const struct credential *c, int match_password)
{
struct credential_cache_entry *e;
- e = lookup_credential(c, match_password);
- if (e)
- e->expiration = 0;
+ int i;
+ for (i = 0; i < entries_nr; i++) {
+ e = &entries[i];
+ if (credential_match(c, &e->item, match_password))
+ e->expiration = 0;
+ }
}
static timestamp_t check_expirations(void)
@@ -127,7 +130,7 @@ static void serve_one_client(FILE *in, FILE *out)
if (read_request(in, &c, &action, &timeout) < 0)
/* ignore error */ ;
else if (!strcmp(action.buf, "get")) {
- struct credential_cache_entry *e = lookup_credential(&c, 0);
+ struct credential_cache_entry *e = lookup_credential(&c);
if (e) {
fprintf(out, "username=%s\n", e->item.username);
fprintf(out, "password=%s\n", e->item.password);
diff --git a/t/lib-credential.sh b/t/lib-credential.sh
index 77baec53b6a..032b2d8fcc4 100644
--- a/t/lib-credential.sh
+++ b/t/lib-credential.sh
@@ -46,6 +46,8 @@ helper_test_clean() {
reject $1 https example.com user4
reject $1 https example.com user-distinct-pass
reject $1 https example.com user-overwrite
+ reject $1 https example.com user-erase1
+ reject $1 https example.com user-erase2
reject $1 http path.tld user
reject $1 https timeout.tld user
reject $1 https sso.tld
@@ -342,6 +344,37 @@ helper_test() {
EOF
'
+ test_expect_success "helper ($HELPER) erases all matching credentials" '
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-erase1
+ password=pass1
+ EOF
+ check approve $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ username=user-erase2
+ password=pass1
+ EOF
+ check reject $HELPER <<-\EOF &&
+ protocol=https
+ host=example.com
+ EOF
+ check fill $HELPER <<-\EOF
+ protocol=https
+ host=example.com
+ --
+ protocol=https
+ host=example.com
+ username=askpass-username
+ password=askpass-password
+ --
+ askpass: Username for '\''https://example.com'\'':
+ askpass: Password for '\''https://askpass-username@example.com'\'':
+ EOF
+ '
+
: ${GIT_TEST_LONG_CRED_BUFFER:=1024}
# 23 bytes accounts for "wwwauth[]=basic realm=" plus NUL
LONG_VALUE_LEN=$((GIT_TEST_LONG_CRED_BUFFER - 23))
--
gitgitgadget
^ permalink raw reply related [flat|nested] 26+ messages in thread
* Re: [PATCH v4 0/2] credential: improvements to erase in helpers
2023-06-15 19:19 ` [PATCH v4 0/2] credential: improvements to erase in helpers M Hickford via GitGitGadget
2023-06-15 19:19 ` [PATCH v4 1/2] credential: avoid erasing distinct password M Hickford via GitGitGadget
2023-06-15 19:19 ` [PATCH v4 2/2] credential: erase all matching credentials M Hickford via GitGitGadget
@ 2023-06-15 21:09 ` Junio C Hamano
2023-06-15 21:21 ` Jeff King
2 siblings, 1 reply; 26+ messages in thread
From: Junio C Hamano @ 2023-06-15 21:09 UTC (permalink / raw)
To: M Hickford via GitGitGadget
Cc: git, Jeff King, Matthew John Cheetham, M Hickford
"M Hickford via GitGitGadget" <gitgitgadget@gmail.com> writes:
> M Hickford (2):
> credential: avoid erasing distinct password
> credential: erase all matching credentials
>
> Documentation/git-credential.txt | 2 +-
> Documentation/gitcredentials.txt | 2 +-
> builtin/credential-cache--daemon.c | 17 +++--
> builtin/credential-store.c | 15 +++--
> credential.c | 7 +-
> credential.h | 2 +-
> t/lib-credential.sh | 103 +++++++++++++++++++++++++++++
> 7 files changed, 128 insertions(+), 20 deletions(-)
It is helpful to reviewers to describe/summarize, in your own words,
what changed since the previous version, in the cover letter.
The range-diff generated for the versions can serve as a good
supporting material, and it would help you while writing that
summary, but not a substitute for the summary.
Thanks.
> base-commit: d7d8841f67f29e6ecbad85a11805c907d0f00d5d
> Published-As: https://github.com/gitgitgadget/git/releases/tag/pr-git-1525%2Fhickford%2Ferase-test-v4
> Fetch-It-Via: git fetch https://github.com/gitgitgadget/git pr-git-1525/hickford/erase-test-v4
> Pull-Request: https://github.com/git/git/pull/1525
>
> Range-diff vs v3:
>
> 1: df3c8a15bf8 ! 1: 91d4b04b5e1 credential: avoid erasing distinct password
> @@ builtin/credential-store.c: static struct lock_file credential_lock;
> FILE *fh;
> struct strbuf line = STRBUF_INIT;
> @@ builtin/credential-store.c: static int parse_credential_file(const char *fn,
> -
> while (strbuf_getline_lf(&line, fh) != EOF) {
> if (!credential_from_url_gently(&entry, line.buf, 1) &&
> -- entry.username && entry.password &&
> + entry.username && entry.password &&
> - credential_match(c, &entry)) {
> -+ entry.username && entry.password &&
> -+ credential_match(c, &entry, match_password)) {
> ++ credential_match(c, &entry, match_password)) {
> found_credential = 1;
> if (match_cb) {
> match_cb(&entry);
> @@ credential.c: void credential_clear(struct credential *c)
> {
> #define CHECK(x) (!want->x || (have->x && !strcmp(want->x, have->x)))
> return CHECK(protocol) &&
> -- CHECK(host) &&
> -- CHECK(path) &&
> + CHECK(host) &&
> + CHECK(path) &&
> - CHECK(username);
> -+ CHECK(host) &&
> -+ CHECK(path) &&
> -+ CHECK(username) &&
> -+ (!match_password || CHECK(password));
> ++ CHECK(username) &&
> ++ (!match_password || CHECK(password));
> #undef CHECK
> }
>
> @@ t/lib-credential.sh: helper_test_clean() {
> reject $1 https example.com user1
> reject $1 https example.com user2
> reject $1 https example.com user4
> -+ reject $1 https example.com user5
> -+ reject $1 https example.com user8
> ++ reject $1 https example.com user-distinct-pass
> ++ reject $1 https example.com user-overwrite
> reject $1 http path.tld user
> reject $1 https timeout.tld user
> reject $1 https sso.tld
> @@ t/lib-credential.sh: helper_test() {
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user8
> ++ username=user-overwrite
> + password=pass1
> + EOF
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user8
> ++ username=user-overwrite
> + password=pass2
> + EOF
> + check fill $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user8
> ++ username=user-overwrite
> + --
> + protocol=https
> + host=example.com
> -+ username=user8
> ++ username=user-overwrite
> + password=pass2
> + EOF
> + check reject $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user8
> ++ username=user-overwrite
> + password=pass2
> + EOF
> + check fill $HELPER <<-\EOF
> + protocol=https
> + host=example.com
> -+ username=user8
> ++ username=user-overwrite
> + --
> + protocol=https
> + host=example.com
> -+ username=user8
> ++ username=user-overwrite
> + password=askpass-password
> + --
> -+ askpass: Password for '\''https://user8@example.com'\'':
> ++ askpass: Password for '\''https://user-overwrite@example.com'\'':
> + EOF
> + '
> +
> @@ t/lib-credential.sh: helper_test() {
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user5
> ++ username=user-distinct-pass
> + password=pass1
> + EOF
> + check reject $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user5
> ++ username=user-distinct-pass
> + password=pass2
> + EOF
> + check fill $HELPER <<-\EOF
> + protocol=https
> + host=example.com
> -+ username=user5
> ++ username=user-distinct-pass
> + --
> + protocol=https
> + host=example.com
> -+ username=user5
> ++ username=user-distinct-pass
> + password=pass1
> + EOF
> + '
> 2: e06d80e99a0 ! 2: 42f41b28e6e credential: erase all matching credentials
> @@ Commit message
>
> `credential reject` sends the erase action to each helper, but the
> exact behaviour of erase isn't specified in documentation or tests.
> - Some helpers (such as credential-libsecret) delete all matching
> - credentials, others (such as credential-cache and credential-store)
> - delete at most one matching credential.
> + Some helpers (such as credential-store and credential-libsecret) delete
> + all matching credentials, others (such as credential-cache) delete at
> + most one matching credential.
>
> Test that helpers erase all matching credentials. This behaviour is
> easiest to reason about. Users expect that `echo
> @@ Commit message
> "url=https://example.com\nusername=tim" | git credential reject` erase
> all matching credentials.
>
> - Fix credential-cache and credential-store.
> + Fix credential-cache.
>
> Signed-off-by: M Hickford <mirth.hickford@gmail.com>
>
> @@ builtin/credential-cache--daemon.c: static void serve_one_client(FILE *in, FILE
> fprintf(out, "username=%s\n", e->item.username);
> fprintf(out, "password=%s\n", e->item.password);
>
> - ## builtin/credential-store.c ##
> -@@ builtin/credential-store.c: static int parse_credential_file(const char *fn,
> - found_credential = 1;
> - if (match_cb) {
> - match_cb(&entry);
> -- break;
> - }
> - }
> - else if (other_cb)
> -
> ## t/lib-credential.sh ##
> @@ t/lib-credential.sh: helper_test_clean() {
> - reject $1 https example.com user2
> reject $1 https example.com user4
> - reject $1 https example.com user5
> -+ reject $1 https example.com user6
> -+ reject $1 https example.com user7
> - reject $1 https example.com user8
> + reject $1 https example.com user-distinct-pass
> + reject $1 https example.com user-overwrite
> ++ reject $1 https example.com user-erase1
> ++ reject $1 https example.com user-erase2
> reject $1 http path.tld user
> reject $1 https timeout.tld user
> + reject $1 https sso.tld
> @@ t/lib-credential.sh: helper_test() {
> EOF
> '
> @@ t/lib-credential.sh: helper_test() {
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user6
> ++ username=user-erase1
> + password=pass1
> + EOF
> + check approve $HELPER <<-\EOF &&
> + protocol=https
> + host=example.com
> -+ username=user7
> ++ username=user-erase2
> + password=pass1
> + EOF
> + check reject $HELPER <<-\EOF &&
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [PATCH v4 0/2] credential: improvements to erase in helpers
2023-06-15 21:09 ` [PATCH v4 0/2] credential: improvements to erase in helpers Junio C Hamano
@ 2023-06-15 21:21 ` Jeff King
2023-06-15 21:52 ` Junio C Hamano
2023-06-16 16:54 ` Junio C Hamano
0 siblings, 2 replies; 26+ messages in thread
From: Jeff King @ 2023-06-15 21:21 UTC (permalink / raw)
To: Junio C Hamano
Cc: M Hickford via GitGitGadget, git, Matthew John Cheetham,
M Hickford
On Thu, Jun 15, 2023 at 02:09:15PM -0700, Junio C Hamano wrote:
> "M Hickford via GitGitGadget" <gitgitgadget@gmail.com> writes:
>
> > M Hickford (2):
> > credential: avoid erasing distinct password
> > credential: erase all matching credentials
> >
> > Documentation/git-credential.txt | 2 +-
> > Documentation/gitcredentials.txt | 2 +-
> > builtin/credential-cache--daemon.c | 17 +++--
> > builtin/credential-store.c | 15 +++--
> > credential.c | 7 +-
> > credential.h | 2 +-
> > t/lib-credential.sh | 103 +++++++++++++++++++++++++++++
> > 7 files changed, 128 insertions(+), 20 deletions(-)
>
> It is helpful to reviewers to describe/summarize, in your own words,
> what changed since the previous version, in the cover letter.
>
> The range-diff generated for the versions can serve as a good
> supporting material, and it would help you while writing that
> summary, but not a substitute for the summary.
Yeah, I agree that would have made reviewing much easier. :)
That said, I just re-reviewed the patches themselves, and everything now
looks good to me.
-Peff
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [PATCH v4 0/2] credential: improvements to erase in helpers
2023-06-15 21:21 ` Jeff King
@ 2023-06-15 21:52 ` Junio C Hamano
2023-06-16 16:54 ` Junio C Hamano
1 sibling, 0 replies; 26+ messages in thread
From: Junio C Hamano @ 2023-06-15 21:52 UTC (permalink / raw)
To: Jeff King
Cc: M Hickford via GitGitGadget, git, Matthew John Cheetham,
M Hickford
Jeff King <peff@peff.net> writes:
> On Thu, Jun 15, 2023 at 02:09:15PM -0700, Junio C Hamano wrote:
>
>> "M Hickford via GitGitGadget" <gitgitgadget@gmail.com> writes:
>>
>> > M Hickford (2):
>> > credential: avoid erasing distinct password
>> > credential: erase all matching credentials
>> >
>> > Documentation/git-credential.txt | 2 +-
>> > Documentation/gitcredentials.txt | 2 +-
>> > builtin/credential-cache--daemon.c | 17 +++--
>> > builtin/credential-store.c | 15 +++--
>> > credential.c | 7 +-
>> > credential.h | 2 +-
>> > t/lib-credential.sh | 103 +++++++++++++++++++++++++++++
>> > 7 files changed, 128 insertions(+), 20 deletions(-)
>>
>> It is helpful to reviewers to describe/summarize, in your own words,
>> what changed since the previous version, in the cover letter.
>>
>> The range-diff generated for the versions can serve as a good
>> supporting material, and it would help you while writing that
>> summary, but not a substitute for the summary.
>
> Yeah, I agree that would have made reviewing much easier. :)
>
> That said, I just re-reviewed the patches themselves, and everything now
> looks good to me.
I missed that you suggested fixing the indentation breakage
introduced in the previous round, and the part of the range-diff,
which was unexpected to me because I lacked the context, was
distracting enough that I missed other changes X-<.
But the end result does look good to me, too.
Thanks.
^ permalink raw reply [flat|nested] 26+ messages in thread
* Re: [PATCH v4 0/2] credential: improvements to erase in helpers
2023-06-15 21:21 ` Jeff King
2023-06-15 21:52 ` Junio C Hamano
@ 2023-06-16 16:54 ` Junio C Hamano
1 sibling, 0 replies; 26+ messages in thread
From: Junio C Hamano @ 2023-06-16 16:54 UTC (permalink / raw)
To: Jeff King
Cc: M Hickford via GitGitGadget, git, Matthew John Cheetham,
M Hickford
Jeff King <peff@peff.net> writes:
> That said, I just re-reviewed the patches themselves, and everything now
> looks good to me.
Thanks for writing and reviewing.
Queued.
^ permalink raw reply [flat|nested] 26+ messages in thread