Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
G
git2
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
lvzhengyang
git2
Commits
18293385
Unverified
Commit
18293385
authored
Aug 29, 2021
by
Edward Thomson
Committed by
GitHub
Aug 29, 2021
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #5395 from josharian/http-use-eauth
Use error code GIT_EAUTH for authentication failures
parents
78cd7624
9937967e
Hide whitespace changes
Inline
Side-by-side
Showing
9 changed files
with
27 additions
and
23 deletions
+27
-23
docs/changelog.md
+3
-0
include/git2/errors.h
+6
-6
src/transports/auth.c
+1
-1
src/transports/auth_negotiate.c
+1
-1
src/transports/auth_ntlm.c
+1
-1
src/transports/http.c
+6
-6
src/transports/httpclient.c
+1
-0
src/transports/ssh.c
+4
-4
src/transports/winhttp.c
+4
-4
No files found.
docs/changelog.md
View file @
18293385
...
@@ -509,6 +509,9 @@ with v0.28.0.
...
@@ -509,6 +509,9 @@ with v0.28.0.
The breaking change is that the `
username
` member of the underlying struct
The breaking change is that the `
username
` member of the underlying struct
is now hidden, and a new `
git_cred_get_username
` function has been provided.
is now hidden, and a new `
git_cred_get_username
` function has been provided.
* Some errors of class `
GIT_ERROR_NET
` now have class `
GIT_ERROR_HTTP
`.
Most authentication failures now have error code `
GIT_EAUTH
` instead of `
GIT_ERROR
`.
### Breaking CMake configuration changes
### Breaking CMake configuration changes
* The CMake option to use a system http-parser library, instead of the
* The CMake option to use a system http-parser library, instead of the
...
...
include/git2/errors.h
View file @
18293385
...
@@ -42,14 +42,14 @@ typedef enum {
...
@@ -42,14 +42,14 @@ typedef enum {
GIT_ECONFLICT
=
-
13
,
/**< Checkout conflicts prevented operation */
GIT_ECONFLICT
=
-
13
,
/**< Checkout conflicts prevented operation */
GIT_ELOCKED
=
-
14
,
/**< Lock file prevented operation */
GIT_ELOCKED
=
-
14
,
/**< Lock file prevented operation */
GIT_EMODIFIED
=
-
15
,
/**< Reference value does not match expected */
GIT_EMODIFIED
=
-
15
,
/**< Reference value does not match expected */
GIT_EAUTH
=
-
16
,
/**< Authentication error */
GIT_EAUTH
=
-
16
,
/**< Authentication error */
GIT_ECERTIFICATE
=
-
17
,
/**< Server certificate is invalid */
GIT_ECERTIFICATE
=
-
17
,
/**< Server certificate is invalid */
GIT_EAPPLIED
=
-
18
,
/**< Patch/merge has already been applied */
GIT_EAPPLIED
=
-
18
,
/**< Patch/merge has already been applied */
GIT_EPEEL
=
-
19
,
/**< The requested peel operation is not possible */
GIT_EPEEL
=
-
19
,
/**< The requested peel operation is not possible */
GIT_EEOF
=
-
20
,
/**< Unexpected EOF */
GIT_EEOF
=
-
20
,
/**< Unexpected EOF */
GIT_EINVALID
=
-
21
,
/**< Invalid operation or input */
GIT_EINVALID
=
-
21
,
/**< Invalid operation or input */
GIT_EUNCOMMITTED
=
-
22
,
/**< Uncommitted changes in index prevented operation */
GIT_EUNCOMMITTED
=
-
22
,
/**< Uncommitted changes in index prevented operation */
GIT_EDIRECTORY
=
-
23
,
/**< The operation is not valid for a directory */
GIT_EDIRECTORY
=
-
23
,
/**< The operation is not valid for a directory */
GIT_EMERGECONFLICT
=
-
24
,
/**< A merge conflict exists and cannot continue */
GIT_EMERGECONFLICT
=
-
24
,
/**< A merge conflict exists and cannot continue */
GIT_PASSTHROUGH
=
-
30
,
/**< A user-configured callback refused to act */
GIT_PASSTHROUGH
=
-
30
,
/**< A user-configured callback refused to act */
...
...
src/transports/auth.c
View file @
18293385
...
@@ -18,7 +18,7 @@ static int basic_next_token(
...
@@ -18,7 +18,7 @@ static int basic_next_token(
{
{
git_credential_userpass_plaintext
*
cred
;
git_credential_userpass_plaintext
*
cred
;
git_buf
raw
=
GIT_BUF_INIT
;
git_buf
raw
=
GIT_BUF_INIT
;
int
error
=
-
1
;
int
error
=
GIT_EAUTH
;
GIT_UNUSED
(
ctx
);
GIT_UNUSED
(
ctx
);
...
...
src/transports/auth_negotiate.c
View file @
18293385
...
@@ -267,7 +267,7 @@ static int negotiate_init_context(
...
@@ -267,7 +267,7 @@ static int negotiate_init_context(
if
(
!
ctx
->
oid
)
{
if
(
!
ctx
->
oid
)
{
git_error_set
(
GIT_ERROR_NET
,
"negotiate authentication is not supported"
);
git_error_set
(
GIT_ERROR_NET
,
"negotiate authentication is not supported"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
git_buf_puts
(
&
ctx
->
target
,
"HTTP@"
);
git_buf_puts
(
&
ctx
->
target
,
"HTTP@"
);
...
...
src/transports/auth_ntlm.c
View file @
18293385
...
@@ -85,7 +85,7 @@ static int ntlm_next_token(
...
@@ -85,7 +85,7 @@ static int ntlm_next_token(
git_buf
input_buf
=
GIT_BUF_INIT
;
git_buf
input_buf
=
GIT_BUF_INIT
;
const
unsigned
char
*
msg
;
const
unsigned
char
*
msg
;
size_t
challenge_len
,
msg_len
;
size_t
challenge_len
,
msg_len
;
int
error
=
-
1
;
int
error
=
GIT_EAUTH
;
GIT_ASSERT_ARG
(
buf
);
GIT_ASSERT_ARG
(
buf
);
GIT_ASSERT_ARG
(
ctx
);
GIT_ASSERT_ARG
(
ctx
);
...
...
src/transports/http.c
View file @
18293385
...
@@ -162,7 +162,7 @@ static int handle_auth(
...
@@ -162,7 +162,7 @@ static int handle_auth(
if
(
error
>
0
)
{
if
(
error
>
0
)
{
git_error_set
(
GIT_ERROR_HTTP
,
"%s authentication required but no callback set"
,
server_type
);
git_error_set
(
GIT_ERROR_HTTP
,
"%s authentication required but no callback set"
,
server_type
);
error
=
-
1
;
error
=
GIT_EAUTH
;
}
}
if
(
!
error
)
if
(
!
error
)
...
@@ -179,7 +179,7 @@ GIT_INLINE(int) handle_remote_auth(
...
@@ -179,7 +179,7 @@ GIT_INLINE(int) handle_remote_auth(
if
(
response
->
server_auth_credtypes
==
0
)
{
if
(
response
->
server_auth_credtypes
==
0
)
{
git_error_set
(
GIT_ERROR_HTTP
,
"server requires authentication that we do not support"
);
git_error_set
(
GIT_ERROR_HTTP
,
"server requires authentication that we do not support"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
/* Otherwise, prompt for credentials. */
/* Otherwise, prompt for credentials. */
...
@@ -201,7 +201,7 @@ GIT_INLINE(int) handle_proxy_auth(
...
@@ -201,7 +201,7 @@ GIT_INLINE(int) handle_proxy_auth(
if
(
response
->
proxy_auth_credtypes
==
0
)
{
if
(
response
->
proxy_auth_credtypes
==
0
)
{
git_error_set
(
GIT_ERROR_HTTP
,
"proxy requires authentication that we do not support"
);
git_error_set
(
GIT_ERROR_HTTP
,
"proxy requires authentication that we do not support"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
/* Otherwise, prompt for credentials. */
/* Otherwise, prompt for credentials. */
...
@@ -259,7 +259,7 @@ static int handle_response(
...
@@ -259,7 +259,7 @@ static int handle_response(
}
else
if
(
response
->
status
==
GIT_HTTP_STATUS_UNAUTHORIZED
||
}
else
if
(
response
->
status
==
GIT_HTTP_STATUS_UNAUTHORIZED
||
response
->
status
==
GIT_HTTP_STATUS_PROXY_AUTHENTICATION_REQUIRED
)
{
response
->
status
==
GIT_HTTP_STATUS_PROXY_AUTHENTICATION_REQUIRED
)
{
git_error_set
(
GIT_ERROR_HTTP
,
"unexpected authentication failure"
);
git_error_set
(
GIT_ERROR_HTTP
,
"unexpected authentication failure"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
if
(
response
->
status
!=
GIT_HTTP_STATUS_OK
)
{
if
(
response
->
status
!=
GIT_HTTP_STATUS_OK
)
{
...
@@ -416,7 +416,7 @@ static int http_stream_read(
...
@@ -416,7 +416,7 @@ static int http_stream_read(
if
(
stream
->
state
==
HTTP_STATE_SENDING_REQUEST
)
{
if
(
stream
->
state
==
HTTP_STATE_SENDING_REQUEST
)
{
git_error_set
(
GIT_ERROR_HTTP
,
"too many redirects or authentication replays"
);
git_error_set
(
GIT_ERROR_HTTP
,
"too many redirects or authentication replays"
);
error
=
-
1
;
error
=
GIT_ERROR
;
/* not GIT_EAUTH, because the exact cause is unclear */
goto
done
;
goto
done
;
}
}
...
@@ -554,7 +554,7 @@ static int http_stream_write(
...
@@ -554,7 +554,7 @@ static int http_stream_write(
if
(
stream
->
state
==
HTTP_STATE_NONE
)
{
if
(
stream
->
state
==
HTTP_STATE_NONE
)
{
git_error_set
(
GIT_ERROR_HTTP
,
git_error_set
(
GIT_ERROR_HTTP
,
"too many redirects or authentication replays"
);
"too many redirects or authentication replays"
);
error
=
-
1
;
error
=
GIT_ERROR
;
/* not GIT_EAUTH because the exact cause is unclear */
goto
done
;
goto
done
;
}
}
...
...
src/transports/httpclient.c
View file @
18293385
...
@@ -597,6 +597,7 @@ static int apply_credentials(
...
@@ -597,6 +597,7 @@ static int apply_credentials(
free_auth_context
(
server
);
free_auth_context
(
server
);
}
else
if
(
!
token
.
size
)
{
}
else
if
(
!
token
.
size
)
{
git_error_set
(
GIT_ERROR_HTTP
,
"failed to respond to authentication challenge"
);
git_error_set
(
GIT_ERROR_HTTP
,
"failed to respond to authentication challenge"
);
error
=
GIT_EAUTH
;
error
=
-
1
;
error
=
-
1
;
goto
done
;
goto
done
;
}
}
...
...
src/transports/ssh.c
View file @
18293385
...
@@ -461,13 +461,13 @@ static int request_creds(git_credential **out, ssh_subtransport *t, const char *
...
@@ -461,13 +461,13 @@ static int request_creds(git_credential **out, ssh_subtransport *t, const char *
if
(
no_callback
)
{
if
(
no_callback
)
{
git_error_set
(
GIT_ERROR_SSH
,
"authentication required but no callback set"
);
git_error_set
(
GIT_ERROR_SSH
,
"authentication required but no callback set"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
if
(
!
(
cred
->
credtype
&
auth_methods
))
{
if
(
!
(
cred
->
credtype
&
auth_methods
))
{
cred
->
free
(
cred
);
cred
->
free
(
cred
);
git_error_set
(
GIT_ERROR_SSH
,
"callback returned unsupported credentials type"
);
git_error_set
(
GIT_ERROR_SSH
,
"
authentication
callback returned unsupported credentials type"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
*
out
=
cred
;
*
out
=
cred
;
...
@@ -840,7 +840,7 @@ static int list_auth_methods(int *out, LIBSSH2_SESSION *session, const char *use
...
@@ -840,7 +840,7 @@ static int list_auth_methods(int *out, LIBSSH2_SESSION *session, const char *use
/* either error, or the remote accepts NONE auth, which is bizarre, let's punt */
/* either error, or the remote accepts NONE auth, which is bizarre, let's punt */
if
(
list
==
NULL
&&
!
libssh2_userauth_authenticated
(
session
))
{
if
(
list
==
NULL
&&
!
libssh2_userauth_authenticated
(
session
))
{
ssh_error
(
session
,
"Failed to retrieve list of SSH authentication methods"
);
ssh_error
(
session
,
"Failed to retrieve list of SSH authentication methods"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
ptr
=
list
;
ptr
=
list
;
...
...
src/transports/winhttp.c
View file @
18293385
...
@@ -154,7 +154,7 @@ static int apply_userpass_credentials(HINTERNET request, DWORD target, int mecha
...
@@ -154,7 +154,7 @@ static int apply_userpass_credentials(HINTERNET request, DWORD target, int mecha
native_scheme
=
WINHTTP_AUTH_SCHEME_BASIC
;
native_scheme
=
WINHTTP_AUTH_SCHEME_BASIC
;
}
else
{
}
else
{
git_error_set
(
GIT_ERROR_HTTP
,
"invalid authentication scheme"
);
git_error_set
(
GIT_ERROR_HTTP
,
"invalid authentication scheme"
);
error
=
-
1
;
error
=
GIT_EAUTH
;
goto
done
;
goto
done
;
}
}
...
@@ -193,7 +193,7 @@ static int apply_default_credentials(HINTERNET request, DWORD target, int mechan
...
@@ -193,7 +193,7 @@ static int apply_default_credentials(HINTERNET request, DWORD target, int mechan
native_scheme
=
WINHTTP_AUTH_SCHEME_NTLM
;
native_scheme
=
WINHTTP_AUTH_SCHEME_NTLM
;
}
else
{
}
else
{
git_error_set
(
GIT_ERROR_HTTP
,
"invalid authentication scheme"
);
git_error_set
(
GIT_ERROR_HTTP
,
"invalid authentication scheme"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
/*
/*
...
@@ -616,7 +616,7 @@ static int parse_unauthorized_response(
...
@@ -616,7 +616,7 @@ static int parse_unauthorized_response(
*/
*/
if
(
!
WinHttpQueryAuthSchemes
(
request
,
&
supported
,
&
first
,
&
target
))
{
if
(
!
WinHttpQueryAuthSchemes
(
request
,
&
supported
,
&
first
,
&
target
))
{
git_error_set
(
GIT_ERROR_OS
,
"failed to parse supported auth schemes"
);
git_error_set
(
GIT_ERROR_OS
,
"failed to parse supported auth schemes"
);
return
-
1
;
return
GIT_EAUTH
;
}
}
if
(
WINHTTP_AUTH_SCHEME_NTLM
&
supported
)
{
if
(
WINHTTP_AUTH_SCHEME_NTLM
&
supported
)
{
...
@@ -1040,7 +1040,7 @@ replay:
...
@@ -1040,7 +1040,7 @@ replay:
/* Enforce a reasonable cap on the number of replays */
/* Enforce a reasonable cap on the number of replays */
if
(
replay_count
++
>=
GIT_HTTP_REPLAY_MAX
)
{
if
(
replay_count
++
>=
GIT_HTTP_REPLAY_MAX
)
{
git_error_set
(
GIT_ERROR_HTTP
,
"too many redirects or authentication replays"
);
git_error_set
(
GIT_ERROR_HTTP
,
"too many redirects or authentication replays"
);
return
-
1
;
return
GIT_ERROR
;
/* not GIT_EAUTH because the exact cause is not clear */
}
}
/* Connect if necessary */
/* Connect if necessary */
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment