Skip to content

Commit 7f64702

Browse files
committed
Fix managed http/https transports
For http transport, perviously, an initial request without any credentials was being sent and upon unauthorized response, credentials were fetched and the request was retried with the obtained credentials. This appeared to have resulted in the remote server closing the connection, resulting in clone failure error: ``` unable to clone: Post "http://test-user:***@127.0.0.1:40463/bar/test-reponame/git-upload-pack": io: read/write on closed pipe ``` Querying the credentials at the very beginning and not failing fixes the closed pipe issue. For https transport, since the go transport doesn't have access to the certificate, it results in the following failure: ``` unable to clone: Get "https://127.0.0.1:44185/bar/test-reponame/info/refs?service=git-upload-pack": x509: certificate signed by unknown authority ``` Since the go smart transport is private, there seems to be no way to pass the certificates to it. Unlike the credentials, there's no method to fetch the certificate from libgit2. Some past discussions in libgit2 talks about keeping the data outside of libgit2 when using an external transport. With the current structure of the code, it's hard to pass the certificate to the go transport. This change introduces a global CA certs pool that can be populated by the users of git2go and the smart transport can lookup for the presence of any certificate in the global pool before making any https requests. This solves the cloning issue due to cert signing.
1 parent 6cea7a7 commit 7f64702

File tree

2 files changed

+72
-20
lines changed

2 files changed

+72
-20
lines changed

http.go

+41-20
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
package git
22

33
import (
4+
"crypto/tls"
5+
"crypto/x509"
46
"errors"
57
"fmt"
68
"io"
@@ -190,8 +192,19 @@ func (self *httpSmartSubtransportStream) sendRequest() error {
190192

191193
var resp *http.Response
192194
var err error
193-
var userName string
194-
var password string
195+
196+
// Obtain the credentials and use them.
197+
cred, err := self.owner.transport.SmartCredentials("", CredentialTypeUserpassPlaintext)
198+
if err != nil {
199+
return err
200+
}
201+
defer cred.Free()
202+
203+
userName, password, err := cred.GetUserpassPlaintext()
204+
if err != nil {
205+
return err
206+
}
207+
195208
for {
196209
req := &http.Request{
197210
Method: self.req.Method,
@@ -204,30 +217,38 @@ func (self *httpSmartSubtransportStream) sendRequest() error {
204217
}
205218

206219
req.SetBasicAuth(userName, password)
207-
resp, err = http.DefaultClient.Do(req)
208-
if err != nil {
209-
return err
210-
}
211220

212-
if resp.StatusCode == http.StatusOK {
213-
break
214-
}
221+
c := http.Client{}
215222

216-
if resp.StatusCode == http.StatusUnauthorized {
217-
resp.Body.Close()
223+
cap := x509.NewCertPool()
218224

219-
cred, err := self.owner.transport.SmartCredentials("", CredentialTypeUserpassPlaintext)
220-
if err != nil {
221-
return err
222-
}
223-
defer cred.Free()
225+
// NOTE: self.req.URL.Host returns only host without port. To be
226+
// able to fetch the correct certs from the global certs, parse again
227+
// and get host+port with url.Host.
228+
u, err := url.Parse(self.req.URL.String())
229+
if err != nil {
230+
return fmt.Errorf("failed to parse URL: %v", err)
231+
}
224232

225-
userName, password, err = cred.GetUserpassPlaintext()
226-
if err != nil {
227-
return err
233+
// Use CA cert if found.
234+
if cert, found := globalCACertPool.certPool[u.Host]; found {
235+
if ok := cap.AppendCertsFromPEM(cert); !ok {
236+
return fmt.Errorf("failed to parse CA cert")
228237
}
238+
c.Transport = &http.Transport{
239+
TLSClientConfig: &tls.Config{
240+
RootCAs: cap,
241+
},
242+
}
243+
}
229244

230-
continue
245+
resp, err = c.Do(req)
246+
if err != nil {
247+
return err
248+
}
249+
250+
if resp.StatusCode == http.StatusOK {
251+
break
231252
}
232253

233254
// Any other error we treat as a hard error and punt back to the caller

transport.go

+31
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ import "C"
2424
import (
2525
"fmt"
2626
"io"
27+
"net/url"
2728
"reflect"
2829
"runtime"
2930
"sync"
@@ -39,8 +40,38 @@ var (
3940
}{
4041
transports: make(map[string]*RegisteredSmartTransport),
4142
}
43+
// globalCACertPool is a mapping of global CA certs used by git2go-managed
44+
// transports. The map's key is hostname+port and the value is a
45+
// corresponding CA cert.
46+
// Since the git2go-managed transports aren't public, this can be used to
47+
// provide certs to the subtransports that can be looked up for a given
48+
// host.
49+
globalCACertPool = struct {
50+
sync.Mutex
51+
certPool map[string][]byte
52+
}{
53+
certPool: make(map[string][]byte),
54+
}
4255
)
4356

57+
// RegisterCACerts registers CA cert associated with an address in the
58+
// globalCACertPool.
59+
func RegisterCACerts(address string, caBundle []byte) error {
60+
globalCACertPool.Lock()
61+
defer globalCACertPool.Unlock()
62+
// Ignore empty CA bundles.
63+
if len(caBundle) == 0 {
64+
return nil
65+
}
66+
u, err := url.Parse(address)
67+
if err != nil {
68+
return err
69+
}
70+
// Store the certificate based on host+port, e.g.: 127.0.0.1:42107.
71+
globalCACertPool.certPool[u.Host] = caBundle
72+
return nil
73+
}
74+
4475
// unregisterManagedTransports unregisters all git2go-managed transports.
4576
func unregisterManagedTransports() error {
4677
globalRegisteredSmartTransports.Lock()

0 commit comments

Comments
 (0)