Skip to content

Commit a66f123

Browse files
committed
Auto merge of #11600 - Akida31:issue-11571-bad-token, r=Eh2406
Error on invalid alphanumeric token for crates.io ref #11571 When using `cargo login` and calling an api which requires authentification there will be an error if the given token is not a valid alphanumerical string. This check is only enabled for crates.io because only for that registry we can be certain, that the generated token should have been alphanumeric, see [the code here](https://github.com/rust-lang/crates.io/blob/7ea41e9d345f05566ee776b7cbb62e46ccf6b393/src/util/token.rs#L15). So if I'm not mistaken, this should not be a breaking change, since crates.io only generates fitting tokens. (Should I add a comment to the crates.io code that modifying this logic can break cargo?) I'm not sure if the fix works and is enough to close the issue, please say if you have any corrections or improvements! I don't know if the check should also be enabled for other registries and it would be really bad if the check is too strict. In the linked issue it was recommended to encode invalid characters, but I don't know in which encoding. I saw in [this http rfc](https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4) that only the ISO-8859-1 charset is allowed and everything else must be [encoded](https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4) but this seems somewhat complex and hard to implement. There is a crate `rust-encoding` which should be capable doing this (from a first look), but I don't know if a new dependency only for this is justified. There seems to be `percent encoding` already in the dependency tree but I have no idea if it would be correct and work. If you have any idea about this encoding, please say so. r? `@Eh2406` (since you suggested the encoding part)
2 parents 2f84e1a + 8502fa8 commit a66f123

File tree

3 files changed

+71
-3
lines changed

3 files changed

+71
-3
lines changed

crates/crates-io/lib.rs

+25
Original file line numberDiff line numberDiff line change
@@ -394,6 +394,7 @@ impl Registry {
394394
Some(s) => s,
395395
None => bail!("no upload token found, please run `cargo login`"),
396396
};
397+
check_token(token)?;
397398
headers.append(&format!("Authorization: {}", token))?;
398399
}
399400
self.handle.http_headers(headers)?;
@@ -510,3 +511,27 @@ pub fn is_url_crates_io(url: &str) -> bool {
510511
.map(|u| u.host_str() == Some("crates.io"))
511512
.unwrap_or(false)
512513
}
514+
515+
/// Checks if a token is valid or malformed.
516+
///
517+
/// This check is necessary to prevent sending tokens which create an invalid HTTP request.
518+
/// It would be easier to check just for alphanumeric tokens, but we can't be sure that all
519+
/// registries only create tokens in that format so that is as less restricted as possible.
520+
pub fn check_token(token: &str) -> Result<()> {
521+
if token.is_empty() {
522+
bail!("please provide a non-empty token");
523+
}
524+
if token.bytes().all(|b| {
525+
b >= 32 // undefined in ISO-8859-1, in ASCII/ UTF-8 not-printable character
526+
&& b < 128 // utf-8: the first bit signals a multi-byte character
527+
&& b != 127 // 127 is a control character in ascii and not in ISO 8859-1
528+
|| b == b't' // tab is also allowed (even when < 32)
529+
}) {
530+
Ok(())
531+
} else {
532+
Err(anyhow::anyhow!(
533+
"token contains invalid characters.\nOnly printable ISO-8859-1 characters \
534+
are allowed as it is sent in a HTTPS header."
535+
))
536+
}
537+
}

src/cargo/ops/registry.rs

+1-3
Original file line numberDiff line numberDiff line change
@@ -898,9 +898,7 @@ pub fn registry_login(
898898
});
899899

900900
if let Some(tok) = new_token.as_token() {
901-
if tok.is_empty() {
902-
bail!("please provide a non-empty token");
903-
}
901+
crates_io::check_token(tok.as_ref().expose())?;
904902
}
905903
}
906904
if &reg_cfg == &new_token {

tests/testsuite/login.rs

+45
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,51 @@ fn empty_login_token() {
126126
.run();
127127
}
128128

129+
#[cargo_test]
130+
fn invalid_login_token() {
131+
let registry = RegistryBuilder::new()
132+
.no_configure_registry()
133+
.no_configure_token()
134+
.build();
135+
setup_new_credentials();
136+
137+
let check = |stdin: &str, stderr: &str| {
138+
cargo_process("login")
139+
.replace_crates_io(registry.index_url())
140+
.with_stdout("please paste the token found on [..]/me below")
141+
.with_stdin(stdin)
142+
.with_stderr(stderr)
143+
.with_status(101)
144+
.run();
145+
};
146+
147+
check(
148+
"😄",
149+
"\
150+
[UPDATING] crates.io index
151+
[ERROR] token contains invalid characters.
152+
Only printable ISO-8859-1 characters are allowed as it is sent in a HTTPS header.",
153+
);
154+
check(
155+
"\u{0016}",
156+
"\
157+
[ERROR] token contains invalid characters.
158+
Only printable ISO-8859-1 characters are allowed as it is sent in a HTTPS header.",
159+
);
160+
check(
161+
"\u{0000}",
162+
"\
163+
[ERROR] token contains invalid characters.
164+
Only printable ISO-8859-1 characters are allowed as it is sent in a HTTPS header.",
165+
);
166+
check(
167+
"你好",
168+
"\
169+
[ERROR] token contains invalid characters.
170+
Only printable ISO-8859-1 characters are allowed as it is sent in a HTTPS header.",
171+
);
172+
}
173+
129174
#[cargo_test]
130175
fn bad_asymmetric_token_args() {
131176
// These cases are kept brief as the implementation is covered by clap, so this is only smoke testing that we have clap configured correctly.

0 commit comments

Comments
 (0)