// Copyright 2019 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // gitauth uses 'git credential' to implement the GOAUTH protocol described in // https://golang.org/issue/26232. It expects an absolute path to the working // directory for the 'git' command as the first command-line argument. // // Example GOAUTH usage: // export GOAUTH="gitauth $HOME" // // See https://git-scm.com/docs/gitcredentials or run 'man gitcredentials' for // information on how to configure 'git credential'. package main import ( "bytes" "fmt" "log" "net/http" "net/url" "os" "os/exec" "path/filepath" "strings" ) func main() { if len(os.Args) < 2 || !filepath.IsAbs(os.Args[1]) { fmt.Fprintf(os.Stderr, "usage: %s WORKDIR [URL]", os.Args[0]) os.Exit(2) } log.SetPrefix("gitauth: ") if len(os.Args) != 3 { // No explicit URL was passed on the command line, but 'git credential' // provides no way to enumerate existing credentials. // Wait for a request for a specific URL. return } u, err := url.ParseRequestURI(os.Args[2]) if err != nil { log.Fatalf("invalid request URI (%v): %q\n", err, os.Args[1]) } var ( prefix *url.URL lastHeader http.Header lastStatus = http.StatusUnauthorized ) for lastStatus == http.StatusUnauthorized { cmd := exec.Command("git", "credential", "fill") // We don't want to execute a 'git' command in an arbitrary directory, since // that opens up a number of config-injection attacks (for example, // https://golang.org/issue/29230). Instead, we have the user configure a // directory explicitly on the command line. cmd.Dir = os.Args[1] cmd.Stdin = strings.NewReader(fmt.Sprintf("url=%s\n", u)) cmd.Stderr = os.Stderr out, err := cmd.Output() if err != nil { log.Fatalf("'git credential fill' failed: %v\n", err) } prefix = new(url.URL) var username, password string lines := strings.Split(string(out), "\n") for _, line := range lines { frags := strings.SplitN(line, "=", 2) if len(frags) != 2 { continue // Ignore unrecognized response lines. } switch strings.TrimSpace(frags[0]) { case "protocol": prefix.Scheme = frags[1] case "host": prefix.Host = frags[1] case "path": prefix.Path = frags[1] case "username": username = frags[1] case "password": password = frags[1] case "url": // Write to a local variable instead of updating prefix directly: // if the url field is malformed, we don't want to invalidate // information parsed from the protocol, host, and path fields. u, err := url.ParseRequestURI(frags[1]) if err == nil { prefix = u } else { log.Printf("malformed URL from 'git credential fill' (%v): %q\n", err, frags[1]) // Proceed anyway: we might be able to parse the prefix from other fields of the response. } } } // Double-check that the URL Git gave us is a prefix of the one we requested. if !strings.HasPrefix(u.String(), prefix.String()) { log.Fatalf("requested a credential for %q, but 'git credential fill' provided one for %q\n", u, prefix) } // Send a HEAD request to try to detect whether the credential is valid. // If the user just typed in a correct password and has caching enabled, // we don't want to nag them for it again the next time they run a 'go' command. req, err := http.NewRequest("HEAD", u.String(), nil) if err != nil { log.Fatalf("internal error constructing HTTP HEAD request: %v\n", err) } req.SetBasicAuth(username, password) lastHeader = req.Header resp, err := http.DefaultClient.Do(req) if err != nil { log.Printf("HTTPS HEAD request failed to connect: %v\n", err) // Couldn't verify the credential, but we have no evidence that it is invalid either. // Proceed, but don't update git's credential cache. break } lastStatus = resp.StatusCode if resp.StatusCode != http.StatusOK { log.Printf("%s: %v %s\n", u, resp.StatusCode, http.StatusText(resp.StatusCode)) } if resp.StatusCode == http.StatusOK || resp.StatusCode == http.StatusUnauthorized { // We learned something about the credential: it either worked or it was invalid. // Approve or reject the credential (on a best-effort basis) // so that the git credential helper can update its cache as appropriate. action := "approve" if resp.StatusCode != http.StatusOK { action = "reject" } cmd = exec.Command("git", "credential", action) cmd.Stderr = os.Stderr cmd.Stdout = os.Stderr cmd.Stdin = bytes.NewReader(out) _ = cmd.Run() } } // Write out the credential in the format expected by the 'go' command. fmt.Printf("%s\n\n", prefix) lastHeader.Write(os.Stdout) fmt.Println() }