Skip to content

Commit 1716d0f

Browse files
committed
Auto merge of #3978 - dethoter:separated-credentials, r=alexcrichton
Move API token into the separate file. Fix of #3748. BTW, it's not clear what to do with old config. Should I add a check for old config and try to remove [repository.token] field from it every time user add a new token? Or should I just prefer to use a token field from a new config over the old one?
2 parents 70b423d + 1ccdc8b commit 1716d0f

File tree

4 files changed

+214
-57
lines changed

4 files changed

+214
-57
lines changed

src/cargo/ops/registry.rs

+7-12
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
1-
use std::collections::HashMap;
21
use std::env;
32
use std::fs::{self, File};
43
use std::iter::repeat;
5-
use std::path::PathBuf;
64
use std::time::Duration;
75

86
use curl::easy::{Easy, SslOpt};
@@ -19,10 +17,9 @@ use core::dependency::Kind;
1917
use core::manifest::ManifestMetadata;
2018
use ops;
2119
use sources::{RegistrySource};
22-
use util::config;
20+
use util::config::{self, Config};
2321
use util::paths;
2422
use util::ToUrl;
25-
use util::config::{Config, ConfigValue, Location};
2623
use util::errors::{CargoError, CargoResult, CargoResultExt};
2724
use util::important_paths::find_root_manifest_for_wd;
2825

@@ -285,16 +282,14 @@ pub fn http_timeout(config: &Config) -> CargoResult<Option<i64>> {
285282
}
286283

287284
pub fn registry_login(config: &Config, token: String) -> CargoResult<()> {
288-
let RegistryConfig { index, token: _ } = registry_configuration(config)?;
289-
let mut map = HashMap::new();
290-
let p = config.cwd().to_path_buf();
291-
if let Some(index) = index {
292-
map.insert("index".to_string(), ConfigValue::String(index, p.clone()));
285+
let RegistryConfig { index: _, token: old_token } = registry_configuration(config)?;
286+
if let Some(old_token) = old_token {
287+
if old_token == token {
288+
return Ok(());
289+
}
293290
}
294-
map.insert("token".to_string(), ConfigValue::String(token, p));
295291

296-
config::set_config(config, Location::Global, "registry",
297-
ConfigValue::Table(map, PathBuf::from(".")))
292+
config::save_credentials(config, token)
298293
}
299294

300295
pub struct OwnersOptions {

src/cargo/util/config.rs

+93-44
Original file line numberDiff line numberDiff line change
@@ -428,11 +428,12 @@ impl Config {
428428
pub fn load_values(&self) -> CargoResult<HashMap<String, ConfigValue>> {
429429
let mut cfg = CV::Table(HashMap::new(), PathBuf::from("."));
430430

431-
walk_tree(&self.cwd, |mut file, path| {
431+
walk_tree(&self.cwd, |path| {
432432
let mut contents = String::new();
433+
let mut file = File::open(&path)?;
433434
file.read_to_string(&mut contents).chain_err(|| {
434435
format!("failed to read configuration file `{}`",
435-
path.display())
436+
path.display())
436437
})?;
437438
let toml = cargo_toml::parse(&contents,
438439
&path,
@@ -450,13 +451,52 @@ impl Config {
450451
Ok(())
451452
}).chain_err(|| "Couldn't load Cargo configuration")?;
452453

453-
454+
self.load_credentials(&mut cfg)?;
454455
match cfg {
455456
CV::Table(map, _) => Ok(map),
456457
_ => unreachable!(),
457458
}
458459
}
459460

461+
fn load_credentials(&self, cfg: &mut ConfigValue) -> CargoResult<()> {
462+
let home_path = self.home_path.clone().into_path_unlocked();
463+
let credentials = home_path.join("credentials");
464+
if !fs::metadata(&credentials).is_ok() {
465+
return Ok(());
466+
}
467+
468+
let mut contents = String::new();
469+
let mut file = File::open(&credentials)?;
470+
file.read_to_string(&mut contents).chain_err(|| {
471+
format!("failed to read configuration file `{}`", credentials.display())
472+
})?;
473+
474+
let toml = cargo_toml::parse(&contents,
475+
&credentials,
476+
self).chain_err(|| {
477+
format!("could not parse TOML configuration in `{}`", credentials.display())
478+
})?;
479+
480+
let value = CV::from_toml(&credentials, toml).chain_err(|| {
481+
format!("failed to load TOML configuration from `{}`", credentials.display())
482+
})?;
483+
484+
let mut cfg = match *cfg {
485+
CV::Table(ref mut map, _) => map,
486+
_ => unreachable!(),
487+
};
488+
489+
let mut registry = cfg.entry("registry".into())
490+
.or_insert(CV::Table(HashMap::new(),
491+
PathBuf::from(".")));
492+
registry.merge(value).chain_err(|| {
493+
format!("failed to merge configuration at `{}`",
494+
credentials.display())
495+
})?;
496+
497+
Ok(())
498+
}
499+
460500
/// Look for a path for `tool` in an environment variable or config path, but return `None`
461501
/// if it's not present.
462502
fn maybe_get_tool(&self, tool: &str) -> CargoResult<Option<PathBuf>> {
@@ -575,6 +615,21 @@ impl ConfigValue {
575615
}
576616
}
577617

618+
fn into_toml(self) -> toml::Value {
619+
match self {
620+
CV::Boolean(s, _) => toml::Value::Boolean(s),
621+
CV::String(s, _) => toml::Value::String(s),
622+
CV::Integer(i, _) => toml::Value::Integer(i),
623+
CV::List(l, _) => toml::Value::Array(l
624+
.into_iter()
625+
.map(|(s, _)| toml::Value::String(s))
626+
.collect()),
627+
CV::Table(l, _) => toml::Value::Table(l.into_iter()
628+
.map(|(k, v)| (k, v.into_toml()))
629+
.collect()),
630+
}
631+
}
632+
578633
fn merge(&mut self, from: ConfigValue) -> CargoResult<()> {
579634
match (self, from) {
580635
(&mut CV::String(..), CV::String(..)) |
@@ -676,21 +731,6 @@ impl ConfigValue {
676731
wanted, self.desc(), key,
677732
self.definition_path().display()).into())
678733
}
679-
680-
fn into_toml(self) -> toml::Value {
681-
match self {
682-
CV::Boolean(s, _) => toml::Value::Boolean(s),
683-
CV::String(s, _) => toml::Value::String(s),
684-
CV::Integer(i, _) => toml::Value::Integer(i),
685-
CV::List(l, _) => toml::Value::Array(l
686-
.into_iter()
687-
.map(|(s, _)| toml::Value::String(s))
688-
.collect()),
689-
CV::Table(l, _) => toml::Value::Table(l.into_iter()
690-
.map(|(k, v)| (k, v.into_toml()))
691-
.collect()),
692-
}
693-
}
694734
}
695735

696736
impl Definition {
@@ -762,17 +802,14 @@ pub fn homedir(cwd: &Path) -> Option<PathBuf> {
762802
}
763803

764804
fn walk_tree<F>(pwd: &Path, mut walk: F) -> CargoResult<()>
765-
where F: FnMut(File, &Path) -> CargoResult<()>
805+
where F: FnMut(&Path) -> CargoResult<()>
766806
{
767807
let mut stash: HashSet<PathBuf> = HashSet::new();
768808

769809
for current in paths::ancestors(pwd) {
770810
let possible = current.join(".cargo").join("config");
771811
if fs::metadata(&possible).is_ok() {
772-
let file = File::open(&possible)?;
773-
774-
walk(file, &possible)?;
775-
812+
walk(&possible)?;
776813
stash.insert(possible);
777814
}
778815
}
@@ -786,40 +823,52 @@ fn walk_tree<F>(pwd: &Path, mut walk: F) -> CargoResult<()>
786823
})?;
787824
let config = home.join("config");
788825
if !stash.contains(&config) && fs::metadata(&config).is_ok() {
789-
let file = File::open(&config)?;
790-
walk(file, &config)?;
826+
walk(&config)?;
791827
}
792828

793829
Ok(())
794830
}
795831

796-
pub fn set_config(cfg: &Config,
797-
loc: Location,
798-
key: &str,
799-
value: ConfigValue) -> CargoResult<()> {
800-
// TODO: There are a number of drawbacks here
801-
//
802-
// 1. Project is unimplemented
803-
// 2. This blows away all comments in a file
804-
// 3. This blows away the previous ordering of a file.
805-
let mut file = match loc {
806-
Location::Global => {
807-
cfg.home_path.create_dir()?;
808-
cfg.home_path.open_rw(Path::new("config"), cfg,
809-
"the global config file")?
810-
}
811-
Location::Project => unimplemented!(),
832+
pub fn save_credentials(cfg: &Config,
833+
token: String) -> CargoResult<()> {
834+
let mut file = {
835+
cfg.home_path.create_dir()?;
836+
cfg.home_path.open_rw(Path::new("credentials"), cfg,
837+
"credentials' config file")?
812838
};
839+
813840
let mut contents = String::new();
814-
let _ = file.read_to_string(&mut contents);
841+
file.read_to_string(&mut contents).chain_err(|| {
842+
format!("failed to read configuration file `{}`",
843+
file.path().display())
844+
})?;
815845
let mut toml = cargo_toml::parse(&contents, file.path(), cfg)?;
816846
toml.as_table_mut()
817847
.unwrap()
818-
.insert(key.to_string(), value.into_toml());
848+
.insert("token".to_string(),
849+
ConfigValue::String(token, file.path().to_path_buf()).into_toml());
819850

820851
let contents = toml.to_string();
821852
file.seek(SeekFrom::Start(0))?;
822853
file.write_all(contents.as_bytes())?;
823854
file.file().set_len(contents.len() as u64)?;
824-
Ok(())
855+
set_permissions(file.file(), 0o600)?;
856+
857+
return Ok(());
858+
859+
#[cfg(unix)]
860+
fn set_permissions(file: & File, mode: u32) -> CargoResult<()> {
861+
use std::os::unix::fs::PermissionsExt;
862+
863+
let mut perms = file.metadata()?.permissions();
864+
perms.set_mode(mode);
865+
file.set_permissions(perms)?;
866+
Ok(())
867+
}
868+
869+
#[cfg(not(unix))]
870+
#[allow(unused)]
871+
fn set_permissions(file: & File, mode: u32) -> CargoResult<()> {
872+
Ok(())
873+
}
825874
}

src/doc/crates-io.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,8 @@ $ cargo login abcdefghijklmnopqrstuvwxyz012345
2121
```
2222

2323
This command will inform Cargo of your API token and store it locally in your
24-
`~/.cargo/config`. Note that this token is a **secret** and should not be shared
24+
`~/.cargo/credentials` (previously it was `~/.cargo/config`).
25+
Note that this token is a **secret** and should not be shared
2526
with anyone else. If it leaks for any reason, you should regenerate it
2627
immediately.
2728

tests/login.rs

+112
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,112 @@
1+
#[macro_use]
2+
extern crate cargotest;
3+
extern crate cargo;
4+
extern crate hamcrest;
5+
extern crate toml;
6+
7+
use std::io::prelude::*;
8+
use std::fs::{self, File};
9+
10+
use cargotest::cargo_process;
11+
use cargotest::support::execs;
12+
use cargotest::support::registry::registry;
13+
use cargotest::install::cargo_home;
14+
use hamcrest::{assert_that, existing_file, is_not};
15+
16+
const TOKEN: &str = "test-token";
17+
const CONFIG_FILE: &str = r#"
18+
[registry]
19+
token = "api-token"
20+
"#;
21+
22+
fn setup_old_credentials() {
23+
let config = cargo_home().join("config");
24+
t!(fs::create_dir_all(config.parent().unwrap()));
25+
t!(t!(File::create(&config)).write_all(&CONFIG_FILE.as_bytes()));
26+
}
27+
28+
fn setup_new_credentials() {
29+
let config = cargo_home().join("credentials");
30+
t!(fs::create_dir_all(config.parent().unwrap()));
31+
t!(t!(File::create(&config)).write_all(br#"
32+
token = "api-token"
33+
"#));
34+
}
35+
36+
fn check_host_token(toml: toml::Value) -> bool {
37+
match toml {
38+
toml::Value::Table(table) => match table.get("token") {
39+
Some(v) => match v {
40+
&toml::Value::String(ref token) => (token.as_str() == TOKEN),
41+
_ => false,
42+
},
43+
None => false,
44+
},
45+
_ => false,
46+
}
47+
}
48+
49+
#[test]
50+
fn login_with_old_credentials() {
51+
setup_old_credentials();
52+
53+
assert_that(cargo_process().arg("login")
54+
.arg("--host").arg(registry().to_string()).arg(TOKEN),
55+
execs().with_status(0));
56+
57+
let config = cargo_home().join("config");
58+
assert_that(&config, existing_file());
59+
60+
let mut contents = String::new();
61+
File::open(&config).unwrap().read_to_string(&mut contents).unwrap();
62+
assert!(CONFIG_FILE == &contents);
63+
64+
let credentials = cargo_home().join("credentials");
65+
assert_that(&credentials, existing_file());
66+
67+
contents.clear();
68+
File::open(&credentials).unwrap().read_to_string(&mut contents).unwrap();
69+
assert!(check_host_token(contents.parse().unwrap()));
70+
}
71+
72+
#[test]
73+
fn login_with_new_credentials() {
74+
setup_new_credentials();
75+
76+
assert_that(cargo_process().arg("login")
77+
.arg("--host").arg(registry().to_string()).arg(TOKEN),
78+
execs().with_status(0));
79+
80+
let config = cargo_home().join("config");
81+
assert_that(&config, is_not(existing_file()));
82+
83+
let credentials = cargo_home().join("credentials");
84+
assert_that(&credentials, existing_file());
85+
86+
let mut contents = String::new();
87+
File::open(&credentials).unwrap().read_to_string(&mut contents).unwrap();
88+
assert!(check_host_token(contents.parse().unwrap()));
89+
}
90+
91+
#[test]
92+
fn login_with_old_and_new_credentials() {
93+
setup_new_credentials();
94+
login_with_old_credentials();
95+
}
96+
97+
#[test]
98+
fn login_without_credentials() {
99+
assert_that(cargo_process().arg("login")
100+
.arg("--host").arg(registry().to_string()).arg(TOKEN),
101+
execs().with_status(0));
102+
103+
let config = cargo_home().join("config");
104+
assert_that(&config, is_not(existing_file()));
105+
106+
let credentials = cargo_home().join("credentials");
107+
assert_that(&credentials, existing_file());
108+
109+
let mut contents = String::new();
110+
File::open(&credentials).unwrap().read_to_string(&mut contents).unwrap();
111+
assert!(check_host_token(contents.parse().unwrap()));
112+
}

0 commit comments

Comments
 (0)