use crate::{
core::features::cargo_docs_link,
util::{config::ConfigKey, CanonicalUrl, CargoResult, Config, IntoUrl},
};
use anyhow::{bail, Context as _};
use cargo_credential::{
Action, CacheControl, Credential, CredentialResponse, LoginOptions, Operation, RegistryInfo,
Secret,
};
use core::fmt;
use serde::Deserialize;
use std::error::Error;
use time::{Duration, OffsetDateTime};
use url::Url;
use crate::core::SourceId;
use crate::util::config::Value;
use crate::util::credential::adaptor::BasicProcessCredential;
use crate::util::credential::paseto::PasetoCredential;
use super::{
config::{CredentialCacheValue, OptValue, PathAndArgs},
credential::process::CredentialProcessCredential,
credential::token::TokenCredential,
};
#[derive(Deserialize, Clone, Debug)]
#[serde(rename_all = "kebab-case")]
pub struct RegistryConfig {
pub index: Option<String>,
pub token: OptValue<Secret<String>>,
pub credential_provider: Option<PathAndArgs>,
pub secret_key: OptValue<Secret<String>>,
pub secret_key_subject: Option<String>,
#[serde(rename = "protocol")]
_protocol: Option<String>,
}
#[derive(Deserialize)]
#[serde(rename_all = "kebab-case")]
pub struct RegistryConfigExtended {
pub index: Option<String>,
pub token: OptValue<Secret<String>>,
pub credential_provider: Option<PathAndArgs>,
pub secret_key: OptValue<Secret<String>>,
pub secret_key_subject: Option<String>,
#[serde(rename = "default")]
_default: Option<String>,
#[serde(rename = "global-credential-providers")]
_global_credential_providers: Option<Vec<String>>,
}
impl RegistryConfigExtended {
pub fn to_registry_config(self) -> RegistryConfig {
RegistryConfig {
index: self.index,
token: self.token,
credential_provider: self.credential_provider,
secret_key: self.secret_key,
secret_key_subject: self.secret_key_subject,
_protocol: None,
}
}
}
fn credential_provider(
config: &Config,
sid: &SourceId,
require_cred_provider_config: bool,
show_warnings: bool,
) -> CargoResult<Vec<Vec<String>>> {
let warn = |message: String| {
if show_warnings {
config.shell().warn(message)
} else {
Ok(())
}
};
let cfg = registry_credential_config_raw(config, sid)?;
let mut global_provider_defined = true;
let default_providers = || {
global_provider_defined = false;
if config.cli_unstable().asymmetric_token {
vec![
vec!["cargo:token".to_string()],
vec!["cargo:paseto".to_string()],
]
} else {
vec![vec!["cargo:token".to_string()]]
}
};
let global_providers = config
.get::<Option<Vec<Value<String>>>>("registry.global-credential-providers")?
.filter(|p| !p.is_empty())
.map(|p| {
p.iter()
.rev()
.map(PathAndArgs::from_whitespace_separated_string)
.map(|p| resolve_credential_alias(config, p))
.collect()
})
.unwrap_or_else(default_providers);
tracing::debug!(?global_providers);
match cfg {
Some(RegistryConfig {
credential_provider: Some(provider),
token,
secret_key,
..
}) => {
let provider = resolve_credential_alias(config, provider);
if let Some(token) = token {
if provider[0] != "cargo:token" {
warn(format!(
"{sid} has a token configured in {} that will be ignored \
because this registry is configured to use credential-provider `{}`",
token.definition, provider[0],
))?;
}
}
if let Some(secret_key) = secret_key {
if provider[0] != "cargo:paseto" {
warn(format!(
"{sid} has a secret-key configured in {} that will be ignored \
because this registry is configured to use credential-provider `{}`",
secret_key.definition, provider[0],
))?;
}
}
return Ok(vec![provider]);
}
Some(RegistryConfig {
token: Some(token),
secret_key: Some(secret_key),
..
}) if config.cli_unstable().asymmetric_token => {
let token_pos = global_providers
.iter()
.position(|p| p.first().map(String::as_str) == Some("cargo:token"));
let paseto_pos = global_providers
.iter()
.position(|p| p.first().map(String::as_str) == Some("cargo:paseto"));
match (token_pos, paseto_pos) {
(Some(token_pos), Some(paseto_pos)) => {
if token_pos < paseto_pos {
warn(format!(
"{sid} has a `secret_key` configured in {} that will be ignored \
because a `token` is also configured, and the `cargo:token` provider is \
configured with higher precedence",
secret_key.definition
))?;
} else {
warn(format!("{sid} has a `token` configured in {} that will be ignored \
because a `secret_key` is also configured, and the `cargo:paseto` provider is \
configured with higher precedence", token.definition))?;
}
}
(_, _) => {
}
}
}
Some(RegistryConfig {
token: Some(token), ..
}) => {
if !global_providers
.iter()
.any(|p| p.first().map(String::as_str) == Some("cargo:token"))
{
warn(format!(
"{sid} has a token configured in {} that will be ignored \
because the `cargo:token` credential provider is not listed in \
`registry.global-credential-providers`",
token.definition
))?;
}
}
Some(RegistryConfig {
secret_key: Some(token),
..
}) if config.cli_unstable().asymmetric_token => {
if !global_providers
.iter()
.any(|p| p.first().map(String::as_str) == Some("cargo:paseto"))
{
warn(format!(
"{sid} has a secret-key configured in {} that will be ignored \
because the `cargo:paseto` credential provider is not listed in \
`registry.global-credential-providers`",
token.definition
))?;
}
}
None | Some(RegistryConfig { .. }) => {}
};
if !global_provider_defined && require_cred_provider_config {
bail!(
"authenticated registries require a credential-provider to be configured\n\
see {} for details",
cargo_docs_link("reference/registry-authentication.html")
);
}
Ok(global_providers)
}
pub fn registry_credential_config_raw(
config: &Config,
sid: &SourceId,
) -> CargoResult<Option<RegistryConfig>> {
let mut cache = config.registry_config();
if let Some(cfg) = cache.get(&sid) {
return Ok(cfg.clone());
}
let cfg = registry_credential_config_raw_uncached(config, sid)?;
cache.insert(*sid, cfg.clone());
return Ok(cfg);
}
fn registry_credential_config_raw_uncached(
config: &Config,
sid: &SourceId,
) -> CargoResult<Option<RegistryConfig>> {
tracing::trace!("loading credential config for {}", sid);
config.load_credentials()?;
if !sid.is_remote_registry() {
bail!(
"{} does not support API commands.\n\
Check for a source-replacement in .cargo/config.",
sid
);
}
if sid.is_crates_io() {
config.check_registry_index_not_set()?;
return Ok(config
.get::<Option<RegistryConfigExtended>>("registry")?
.map(|c| c.to_registry_config()));
}
let name = {
let index = sid.canonical_url();
let mut names: Vec<_> = config
.env()
.filter_map(|(k, v)| {
Some((
k.strip_prefix("CARGO_REGISTRIES_")?
.strip_suffix("_INDEX")?,
v,
))
})
.filter_map(|(k, v)| Some((k, CanonicalUrl::new(&v.into_url().ok()?).ok()?)))
.filter(|(_, v)| v == index)
.map(|(k, _)| k.to_lowercase())
.collect();
if names.len() == 0 {
if let Some(registries) = config.values()?.get("registries") {
let (registries, _) = registries.table("registries")?;
for (name, value) in registries {
if let Some(v) = value.table(&format!("registries.{name}"))?.0.get("index") {
let (v, _) = v.string(&format!("registries.{name}.index"))?;
if index == &CanonicalUrl::new(&v.into_url()?)? {
names.push(name.clone());
}
}
}
}
}
names.sort();
match names.len() {
0 => None,
1 => Some(std::mem::take(&mut names[0])),
_ => anyhow::bail!(
"multiple registries are configured with the same index url '{}': {}",
&sid.as_url(),
names.join(", ")
),
}
};
if let Some(name) = name.as_deref() {
if Some(name) != sid.alt_registry_key() {
config.shell().note(format!(
"name of alternative registry `{}` set to `{name}`",
sid.url()
))?
}
}
if let Some(name) = &name {
tracing::debug!("found alternative registry name `{name}` for {sid}");
config.get::<Option<RegistryConfig>>(&format!("registries.{name}"))
} else {
tracing::debug!("no registry name found for {sid}");
Ok(None)
}
}
fn resolve_credential_alias(config: &Config, mut provider: PathAndArgs) -> Vec<String> {
if provider.args.is_empty() {
let name = provider.path.raw_value();
let key = format!("credential-alias.{name}");
if let Ok(alias) = config.get::<Value<PathAndArgs>>(&key) {
tracing::debug!("resolving credential alias '{key}' -> '{alias:?}'");
if BUILT_IN_PROVIDERS.contains(&name) {
let _ = config.shell().warn(format!(
"credential-alias `{name}` (defined in `{}`) will be \
ignored because it would shadow a built-in credential-provider",
alias.definition
));
} else {
provider = alias.val;
}
}
}
provider.args.insert(
0,
provider
.path
.resolve_program(config)
.to_str()
.unwrap()
.to_string(),
);
provider.args
}
#[derive(Debug, PartialEq)]
pub enum AuthorizationErrorReason {
TokenMissing,
TokenRejected,
}
impl fmt::Display for AuthorizationErrorReason {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
match self {
AuthorizationErrorReason::TokenMissing => write!(f, "no token found"),
AuthorizationErrorReason::TokenRejected => write!(f, "token rejected"),
}
}
}
#[derive(Debug)]
pub struct AuthorizationError {
sid: SourceId,
default_registry: Option<String>,
pub login_url: Option<Url>,
reason: AuthorizationErrorReason,
display_token_env_help: bool,
}
impl AuthorizationError {
pub fn new(
config: &Config,
sid: SourceId,
login_url: Option<Url>,
reason: AuthorizationErrorReason,
) -> CargoResult<Self> {
let display_token_env_help = credential_provider(config, &sid, false, false)?
.iter()
.any(|p| p.first().map(String::as_str) == Some("cargo:token"));
Ok(AuthorizationError {
sid,
default_registry: config.default_registry()?,
login_url,
reason,
display_token_env_help,
})
}
}
impl Error for AuthorizationError {}
impl fmt::Display for AuthorizationError {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
if self.sid.is_crates_io() {
let args = if self.default_registry.is_some() {
" --registry crates-io"
} else {
""
};
write!(f, "{}, please run `cargo login{args}`", self.reason)?;
if self.display_token_env_help {
write!(f, "\nor use environment variable CARGO_REGISTRY_TOKEN")?;
}
Ok(())
} else if let Some(name) = self.sid.alt_registry_key() {
let key = ConfigKey::from_str(&format!("registries.{name}.token"));
write!(
f,
"{} for `{}`, please run `cargo login --registry {name}`",
self.reason,
self.sid.display_registry_name(),
)?;
if self.display_token_env_help {
write!(f, "\nor use environment variable {}", key.as_env_key())?;
}
Ok(())
} else if self.reason == AuthorizationErrorReason::TokenMissing {
write!(
f,
r#"{} for `{}`
consider setting up an alternate registry in Cargo's configuration
as described by https://doc.rust-lang.org/cargo/reference/registries.html
[registries]
my-registry = {{ index = "{}" }}
"#,
self.reason,
self.sid.display_registry_name(),
self.sid.url()
)
} else {
write!(
f,
r#"{} for `{}`"#,
self.reason,
self.sid.display_registry_name(),
)
}
}
}
pub fn cache_token_from_commandline(config: &Config, sid: &SourceId, token: Secret<&str>) {
let url = sid.canonical_url();
config.credential_cache().insert(
url.clone(),
CredentialCacheValue {
token_value: token.to_owned(),
expiration: None,
operation_independent: true,
},
);
}
static BUILT_IN_PROVIDERS: &[&'static str] = &[
"cargo:token",
"cargo:paseto",
"cargo:token-from-stdout",
"cargo:wincred",
"cargo:macos-keychain",
"cargo:libsecret",
];
fn credential_action(
config: &Config,
sid: &SourceId,
action: Action<'_>,
headers: Vec<String>,
args: &[&str],
require_cred_provider_config: bool,
) -> CargoResult<CredentialResponse> {
let name = sid.alt_registry_key();
let registry = RegistryInfo {
index_url: sid.url().as_str(),
name,
headers,
};
let providers = credential_provider(config, sid, require_cred_provider_config, true)?;
let mut any_not_found = false;
for provider in providers {
let args: Vec<&str> = provider
.iter()
.map(String::as_str)
.chain(args.iter().copied())
.collect();
let process = args[0];
tracing::debug!("attempting credential provider: {args:?}");
let provider: Box<dyn Credential> = match process {
"cargo:token" => Box::new(TokenCredential::new(config)),
"cargo:paseto" if config.cli_unstable().asymmetric_token => {
Box::new(PasetoCredential::new(config))
}
"cargo:paseto" => bail!("cargo:paseto requires -Zasymmetric-token"),
"cargo:token-from-stdout" => Box::new(BasicProcessCredential {}),
"cargo:wincred" => Box::new(cargo_credential_wincred::WindowsCredential {}),
"cargo:macos-keychain" => Box::new(cargo_credential_macos_keychain::MacKeychain {}),
"cargo:libsecret" => Box::new(cargo_credential_libsecret::LibSecretCredential {}),
process => Box::new(CredentialProcessCredential::new(process)),
};
config.shell().verbose(|c| {
c.status(
"Credential",
format!(
"{} {action} {}",
args.join(" "),
sid.display_registry_name()
),
)
})?;
match provider.perform(®istry, &action, &args[1..]) {
Ok(response) => return Ok(response),
Err(cargo_credential::Error::UrlNotSupported) => {}
Err(cargo_credential::Error::NotFound) => any_not_found = true,
e => {
return e.with_context(|| {
format!(
"credential provider `{}` failed action `{action}`",
args.join(" ")
)
})
}
}
}
if any_not_found {
Err(cargo_credential::Error::NotFound.into())
} else {
anyhow::bail!("no credential providers could handle the request")
}
}
pub fn auth_token(
config: &Config,
sid: &SourceId,
login_url: Option<&Url>,
operation: Operation<'_>,
headers: Vec<String>,
require_cred_provider_config: bool,
) -> CargoResult<String> {
match auth_token_optional(
config,
sid,
operation,
headers,
require_cred_provider_config,
)? {
Some(token) => Ok(token.expose()),
None => Err(AuthorizationError::new(
config,
*sid,
login_url.cloned(),
AuthorizationErrorReason::TokenMissing,
)?
.into()),
}
}
fn auth_token_optional(
config: &Config,
sid: &SourceId,
operation: Operation<'_>,
headers: Vec<String>,
require_cred_provider_config: bool,
) -> CargoResult<Option<Secret<String>>> {
tracing::trace!("token requested for {}", sid.display_registry_name());
let mut cache = config.credential_cache();
let url = sid.canonical_url();
if let Some(cached_token) = cache.get(url) {
if cached_token
.expiration
.map(|exp| OffsetDateTime::now_utc() + Duration::minutes(1) < exp)
.unwrap_or(true)
{
if cached_token.operation_independent || matches!(operation, Operation::Read) {
tracing::trace!("using token from in-memory cache");
return Ok(Some(cached_token.token_value.clone()));
}
} else {
cache.remove(url);
}
}
let credential_response = credential_action(
config,
sid,
Action::Get(operation),
headers,
&[],
require_cred_provider_config,
);
if let Some(e) = credential_response.as_ref().err() {
if let Some(e) = e.downcast_ref::<cargo_credential::Error>() {
if matches!(e, cargo_credential::Error::NotFound) {
return Ok(None);
}
}
}
let credential_response = credential_response?;
let CredentialResponse::Get {
token,
cache: cache_control,
operation_independent,
} = credential_response
else {
bail!("credential provider produced unexpected response for `get` request: {credential_response:?}")
};
let token = Secret::from(token);
tracing::trace!("found token");
let expiration = match cache_control {
CacheControl::Expires { expiration } => Some(expiration),
CacheControl::Session => None,
CacheControl::Never | _ => return Ok(Some(token)),
};
cache.insert(
url.clone(),
CredentialCacheValue {
token_value: token.clone(),
expiration,
operation_independent,
},
);
Ok(Some(token))
}
pub fn logout(config: &Config, sid: &SourceId) -> CargoResult<()> {
let credential_response = credential_action(config, sid, Action::Logout, vec![], &[], false);
if let Some(e) = credential_response.as_ref().err() {
if let Some(e) = e.downcast_ref::<cargo_credential::Error>() {
if matches!(e, cargo_credential::Error::NotFound) {
config.shell().status(
"Logout",
format!(
"not currently logged in to `{}`",
sid.display_registry_name()
),
)?;
return Ok(());
}
}
}
let credential_response = credential_response?;
let CredentialResponse::Logout = credential_response else {
bail!("credential provider produced unexpected response for `logout` request: {credential_response:?}")
};
Ok(())
}
pub fn login(
config: &Config,
sid: &SourceId,
options: LoginOptions<'_>,
args: &[&str],
) -> CargoResult<()> {
let credential_response =
credential_action(config, sid, Action::Login(options), vec![], args, false)?;
let CredentialResponse::Login = credential_response else {
bail!("credential provider produced unexpected response for `login` request: {credential_response:?}")
};
Ok(())
}