X-Git-Url: https://git.josue.xyz/?a=blobdiff_plain;f=.config%2Fcoc%2Fextensions%2Fcoc-go-data%2Ftools%2Fpkg%2Fmod%2Fgolang.org%2Fx%2Ftools%40v0.1.0%2Fcmd%2Fauth%2Fgitauth%2Fgitauth.go;fp=.config%2Fcoc%2Fextensions%2Fcoc-go-data%2Ftools%2Fpkg%2Fmod%2Fgolang.org%2Fx%2Ftools%40v0.1.0%2Fcmd%2Fauth%2Fgitauth%2Fgitauth.go;h=7bfca6efb66f96b78258e893253bbca3dccbfed5;hb=3c06164f15bd10aed7d66b6314764a2961a14762;hp=0000000000000000000000000000000000000000;hpb=0e9c3ceb40901f4d44981c1376cb9e23a248e006;p=dotfiles%2F.git diff --git a/.config/coc/extensions/coc-go-data/tools/pkg/mod/golang.org/x/tools@v0.1.0/cmd/auth/gitauth/gitauth.go b/.config/coc/extensions/coc-go-data/tools/pkg/mod/golang.org/x/tools@v0.1.0/cmd/auth/gitauth/gitauth.go new file mode 100644 index 00000000..7bfca6ef --- /dev/null +++ b/.config/coc/extensions/coc-go-data/tools/pkg/mod/golang.org/x/tools@v0.1.0/cmd/auth/gitauth/gitauth.go @@ -0,0 +1,149 @@ +// Copyright 2019 The Go Authors. All rights reserved. +// Use of this source code is governed by a BSD-style +// license that can be found in the LICENSE file. + +// gitauth uses 'git credential' to implement the GOAUTH protocol described in +// https://golang.org/issue/26232. It expects an absolute path to the working +// directory for the 'git' command as the first command-line argument. +// +// Example GOAUTH usage: +// export GOAUTH="gitauth $HOME" +// +// See https://git-scm.com/docs/gitcredentials or run 'man gitcredentials' for +// information on how to configure 'git credential'. +package main + +import ( + "bytes" + "fmt" + exec "golang.org/x/sys/execabs" + "log" + "net/http" + "net/url" + "os" + "path/filepath" + "strings" +) + +func main() { + if len(os.Args) < 2 || !filepath.IsAbs(os.Args[1]) { + fmt.Fprintf(os.Stderr, "usage: %s WORKDIR [URL]", os.Args[0]) + os.Exit(2) + } + + log.SetPrefix("gitauth: ") + + if len(os.Args) != 3 { + // No explicit URL was passed on the command line, but 'git credential' + // provides no way to enumerate existing credentials. + // Wait for a request for a specific URL. + return + } + + u, err := url.ParseRequestURI(os.Args[2]) + if err != nil { + log.Fatalf("invalid request URI (%v): %q\n", err, os.Args[1]) + } + + var ( + prefix *url.URL + lastHeader http.Header + lastStatus = http.StatusUnauthorized + ) + for lastStatus == http.StatusUnauthorized { + cmd := exec.Command("git", "credential", "fill") + + // We don't want to execute a 'git' command in an arbitrary directory, since + // that opens up a number of config-injection attacks (for example, + // https://golang.org/issue/29230). Instead, we have the user configure a + // directory explicitly on the command line. + cmd.Dir = os.Args[1] + + cmd.Stdin = strings.NewReader(fmt.Sprintf("url=%s\n", u)) + cmd.Stderr = os.Stderr + out, err := cmd.Output() + if err != nil { + log.Fatalf("'git credential fill' failed: %v\n", err) + } + + prefix = new(url.URL) + var username, password string + lines := strings.Split(string(out), "\n") + for _, line := range lines { + frags := strings.SplitN(line, "=", 2) + if len(frags) != 2 { + continue // Ignore unrecognized response lines. + } + switch strings.TrimSpace(frags[0]) { + case "protocol": + prefix.Scheme = frags[1] + case "host": + prefix.Host = frags[1] + case "path": + prefix.Path = frags[1] + case "username": + username = frags[1] + case "password": + password = frags[1] + case "url": + // Write to a local variable instead of updating prefix directly: + // if the url field is malformed, we don't want to invalidate + // information parsed from the protocol, host, and path fields. + u, err := url.ParseRequestURI(frags[1]) + if err == nil { + prefix = u + } else { + log.Printf("malformed URL from 'git credential fill' (%v): %q\n", err, frags[1]) + // Proceed anyway: we might be able to parse the prefix from other fields of the response. + } + } + } + + // Double-check that the URL Git gave us is a prefix of the one we requested. + if !strings.HasPrefix(u.String(), prefix.String()) { + log.Fatalf("requested a credential for %q, but 'git credential fill' provided one for %q\n", u, prefix) + } + + // Send a HEAD request to try to detect whether the credential is valid. + // If the user just typed in a correct password and has caching enabled, + // we don't want to nag them for it again the next time they run a 'go' command. + req, err := http.NewRequest("HEAD", u.String(), nil) + if err != nil { + log.Fatalf("internal error constructing HTTP HEAD request: %v\n", err) + } + req.SetBasicAuth(username, password) + lastHeader = req.Header + resp, err := http.DefaultClient.Do(req) + if err != nil { + log.Printf("HTTPS HEAD request failed to connect: %v\n", err) + // Couldn't verify the credential, but we have no evidence that it is invalid either. + // Proceed, but don't update git's credential cache. + break + } + lastStatus = resp.StatusCode + + if resp.StatusCode != http.StatusOK { + log.Printf("%s: %v %s\n", u, resp.StatusCode, http.StatusText(resp.StatusCode)) + } + + if resp.StatusCode == http.StatusOK || resp.StatusCode == http.StatusUnauthorized { + // We learned something about the credential: it either worked or it was invalid. + // Approve or reject the credential (on a best-effort basis) + // so that the git credential helper can update its cache as appropriate. + action := "approve" + if resp.StatusCode != http.StatusOK { + action = "reject" + } + cmd = exec.Command("git", "credential", action) + cmd.Stderr = os.Stderr + cmd.Stdout = os.Stderr + cmd.Stdin = bytes.NewReader(out) + _ = cmd.Run() + } + } + + // Write out the credential in the format expected by the 'go' command. + fmt.Printf("%s\n\n", prefix) + lastHeader.Write(os.Stdout) + fmt.Println() +}