Documentation / technical / api-credentials.txton commit api-credentials.txt: add "see also" section (04ab6ae)
   1credentials API
   2===============
   3
   4The credentials API provides an abstracted way of gathering username and
   5password credentials from the user (even though credentials in the wider
   6world can take many forms, in this document the word "credential" always
   7refers to a username and password pair).
   8
   9This document describes two interfaces: the C API that the credential
  10subsystem provides to the rest of git, and the protocol that git uses to
  11communicate with system-specific "credential helpers". If you are
  12writing git code that wants to look up or prompt for credentials, see
  13the section "C API" below. If you want to write your own helper, see
  14the section on "Credential Helpers" below.
  15
  16Typical setup
  17-------------
  18
  19------------
  20+-----------------------+
  21| git code (C)          |--- to server requiring --->
  22|                       |        authentication
  23|.......................|
  24| C credential API      |--- prompt ---> User
  25+-----------------------+
  26        ^      |
  27        | pipe |
  28        |      v
  29+-----------------------+
  30| git credential helper |
  31+-----------------------+
  32------------
  33
  34The git code (typically a remote-helper) will call the C API to obtain
  35credential data like a login/password pair (credential_fill). The
  36API will itself call a remote helper (e.g. "git credential-cache" or
  37"git credential-store") that may retrieve credential data from a
  38store. If the credential helper cannot find the information, the C API
  39will prompt the user. Then, the caller of the API takes care of
  40contacting the server, and does the actual authentication.
  41
  42C API
  43-----
  44
  45The credential C API is meant to be called by git code which needs to
  46acquire or store a credential. It is centered around an object
  47representing a single credential and provides three basic operations:
  48fill (acquire credentials by calling helpers and/or prompting the user),
  49approve (mark a credential as successfully used so that it can be stored
  50for later use), and reject (mark a credential as unsuccessful so that it
  51can be erased from any persistent storage).
  52
  53Data Structures
  54~~~~~~~~~~~~~~~
  55
  56`struct credential`::
  57
  58        This struct represents a single username/password combination
  59        along with any associated context. All string fields should be
  60        heap-allocated (or NULL if they are not known or not applicable).
  61        The meaning of the individual context fields is the same as
  62        their counterparts in the helper protocol; see the section below
  63        for a description of each field.
  64+
  65The `helpers` member of the struct is a `string_list` of helpers.  Each
  66string specifies an external helper which will be run, in order, to
  67either acquire or store credentials. See the section on credential
  68helpers below.
  69+
  70This struct should always be initialized with `CREDENTIAL_INIT` or
  71`credential_init`.
  72
  73
  74Functions
  75~~~~~~~~~
  76
  77`credential_init`::
  78
  79        Initialize a credential structure, setting all fields to empty.
  80
  81`credential_clear`::
  82
  83        Free any resources associated with the credential structure,
  84        returning it to a pristine initialized state.
  85
  86`credential_fill`::
  87
  88        Instruct the credential subsystem to fill the username and
  89        password fields of the passed credential struct by first
  90        consulting helpers, then asking the user. After this function
  91        returns, the username and password fields of the credential are
  92        guaranteed to be non-NULL. If an error occurs, the function will
  93        die().
  94
  95`credential_reject`::
  96
  97        Inform the credential subsystem that the provided credentials
  98        have been rejected. This will cause the credential subsystem to
  99        notify any helpers of the rejection (which allows them, for
 100        example, to purge the invalid credentials from storage).  It
 101        will also free() the username and password fields of the
 102        credential and set them to NULL (readying the credential for
 103        another call to `credential_fill`). Any errors from helpers are
 104        ignored.
 105
 106`credential_approve`::
 107
 108        Inform the credential subsystem that the provided credentials
 109        were successfully used for authentication.  This will cause the
 110        credential subsystem to notify any helpers of the approval, so
 111        that they may store the result to be used again.  Any errors
 112        from helpers are ignored.
 113
 114`credential_from_url`::
 115
 116        Parse a URL into broken-down credential fields.
 117
 118Example
 119~~~~~~~
 120
 121The example below shows how the functions of the credential API could be
 122used to login to a fictitious "foo" service on a remote host:
 123
 124-----------------------------------------------------------------------
 125int foo_login(struct foo_connection *f)
 126{
 127        int status;
 128        /*
 129         * Create a credential with some context; we don't yet know the
 130         * username or password.
 131         */
 132
 133        struct credential c = CREDENTIAL_INIT;
 134        c.protocol = xstrdup("foo");
 135        c.host = xstrdup(f->hostname);
 136
 137        /*
 138         * Fill in the username and password fields by contacting
 139         * helpers and/or asking the user. The function will die if it
 140         * fails.
 141         */
 142        credential_fill(&c);
 143
 144        /*
 145         * Otherwise, we have a username and password. Try to use it.
 146         */
 147        status = send_foo_login(f, c.username, c.password);
 148        switch (status) {
 149        case FOO_OK:
 150                /* It worked. Store the credential for later use. */
 151                credential_accept(&c);
 152                break;
 153        case FOO_BAD_LOGIN:
 154                /* Erase the credential from storage so we don't try it
 155                 * again. */
 156                credential_reject(&c);
 157                break;
 158        default:
 159                /*
 160                 * Some other error occured. We don't know if the
 161                 * credential is good or bad, so report nothing to the
 162                 * credential subsystem.
 163                 */
 164        }
 165
 166        /* Free any associated resources. */
 167        credential_clear(&c);
 168
 169        return status;
 170}
 171-----------------------------------------------------------------------
 172
 173
 174Credential Helpers
 175------------------
 176
 177Credential helpers are programs executed by git to fetch or save
 178credentials from and to long-term storage (where "long-term" is simply
 179longer than a single git process; e.g., credentials may be stored
 180in-memory for a few minutes, or indefinitely on disk).
 181
 182Each helper is specified by a single string in the configuration
 183variable `credential.helper` (and others, see linkgit:../git-config[1]).
 184The string is transformed by git into a command to be executed using
 185these rules:
 186
 187  1. If the helper string begins with "!", it is considered a shell
 188     snippet, and everything after the "!" becomes the command.
 189
 190  2. Otherwise, if the helper string begins with an absolute path, the
 191     verbatim helper string becomes the command.
 192
 193  3. Otherwise, the string "git credential-" is prepended to the helper
 194     string, and the result becomes the command.
 195
 196The resulting command then has an "operation" argument appended to it
 197(see below for details), and the result is executed by the shell.
 198
 199Here are some example specifications:
 200
 201----------------------------------------------------
 202# run "git credential-foo"
 203foo
 204
 205# same as above, but pass an argument to the helper
 206foo --bar=baz
 207
 208# the arguments are parsed by the shell, so use shell
 209# quoting if necessary
 210foo --bar="whitespace arg"
 211
 212# you can also use an absolute path, which will not use the git wrapper
 213/path/to/my/helper --with-arguments
 214
 215# or you can specify your own shell snippet
 216!f() { echo "password=`cat $HOME/.secret`"; }; f
 217----------------------------------------------------
 218
 219Generally speaking, rule (3) above is the simplest for users to specify.
 220Authors of credential helpers should make an effort to assist their
 221users by naming their program "git-credential-$NAME", and putting it in
 222the $PATH or $GIT_EXEC_PATH during installation, which will allow a user
 223to enable it with `git config credential.helper $NAME`.
 224
 225When a helper is executed, it will have one "operation" argument
 226appended to its command line, which is one of:
 227
 228`get`::
 229
 230        Return a matching credential, if any exists.
 231
 232`store`::
 233
 234        Store the credential, if applicable to the helper.
 235
 236`erase`::
 237
 238        Remove a matching credential, if any, from the helper's storage.
 239
 240The details of the credential will be provided on the helper's stdin
 241stream. The credential is split into a set of named attributes.
 242Attributes are provided to the helper, one per line. Each attribute is
 243specified by a key-value pair, separated by an `=` (equals) sign,
 244followed by a newline. The key may contain any bytes except `=`,
 245newline, or NUL. The value may contain any bytes except newline or NUL.
 246In both cases, all bytes are treated as-is (i.e., there is no quoting,
 247and one cannot transmit a value with newline or NUL in it). The list of
 248attributes is terminated by a blank line or end-of-file.
 249
 250Git will send the following attributes (but may not send all of
 251them for a given credential; for example, a `host` attribute makes no
 252sense when dealing with a non-network protocol):
 253
 254`protocol`::
 255
 256        The protocol over which the credential will be used (e.g.,
 257        `https`).
 258
 259`host`::
 260
 261        The remote hostname for a network credential.
 262
 263`path`::
 264
 265        The path with which the credential will be used. E.g., for
 266        accessing a remote https repository, this will be the
 267        repository's path on the server.
 268
 269`username`::
 270
 271        The credential's username, if we already have one (e.g., from a
 272        URL, from the user, or from a previously run helper).
 273
 274`password`::
 275
 276        The credential's password, if we are asking it to be stored.
 277
 278For a `get` operation, the helper should produce a list of attributes
 279on stdout in the same format. A helper is free to produce a subset, or
 280even no values at all if it has nothing useful to provide. Any provided
 281attributes will overwrite those already known about by git.
 282
 283For a `store` or `erase` operation, the helper's output is ignored.
 284If it fails to perform the requested operation, it may complain to
 285stderr to inform the user. If it does not support the requested
 286operation (e.g., a read-only store), it should silently ignore the
 287request.
 288
 289If a helper receives any other operation, it should silently ignore the
 290request. This leaves room for future operations to be added (older
 291helpers will just ignore the new requests).
 292
 293See also
 294--------
 295
 296linkgit:../gitcredentials[7]
 297
 298linkgit:../git-config[5] (See configuration variables `credential.*`)