git-credential-cache inner workings

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



During debugging of a nasty recurring GIT code 128 error in our CI/CD
environment, we've found some design choices that have raised some
questions about the inner workings of the credential cache in GIT.
First, a little sketch of the situation.

We are using GitHub Enterprise Cloud on Jenkins using the Github
Branch Source Plugin.
This plugin uses "GitHub Apps" (Service Accounts if you will), which
use Application (Installation) Tokens to authenticate with GitHub. The
tokens are used as regular passwords in this case.

When a Jenkins job starts, it checks out the code from GitHub using
the GIT command line, passing it a token with a lifetime between 45
and 60 minutes remaining (tokens have a max lifetime of 60m). This
token is passed via the GIT_ASKPASS variable to give the commandline
CI/CD job the ability to use the token for subsequent GIT actions
locally during the job.

We are seeing GIT code 128's in rare cases when jobs follow each other
up at a fairly high tempo. The reason is:
https://github.com/git/git/blob/master/http.c#L1637 . This line
'approves' a credential that gives a successful result. This means
that Tokens that have been cached in the git-credential-cache-daemon
will have it's timeout refreshed even though they might expire
shortly.
The credential cache timeout is a user-input timeout, and not a token
timeout, and this structure collides with the functional lifetime of a
token.

There are several solutions to circumvent this issue:
1) We could ask the Plugin that manages the tokens to support managing
the Credential Cache as well. This makes it possible for the plugin to
actively manage tokens and revoke tokens from the cache that have
expired. Downside is that making plugins aware of the cache in git,
might not be a good idea, and there might even be cases where caching
is disabled completely, which would still require the ASKPASS method.
2) We could add an option to the GIT client that has the same
functionality as the ASKPASS variable, but one that takes precedence
before the cache. This way, one can preseed the GIT client with
credentials that will *always* be used, even if there is a cache that
has a credential for the given URL.
3) We could alter the cache daemon (or build a new one) that has more
elaborate options regarding it's timeout. Perhaps a daemon option like
"--keep-timeout-on-approve".
This would mean that if a credential is approved for a second time the
timeout is not refreshed.
Currently the daemon just removes any old credentials from it's cache
and adds the new one without questioning the intention of the user. We
could add a check that tests if the incoming credential is equal to
the currently cached credential, and skip updating the expiration date
if they are the same. (With an exception when receiving a new
password, then we should forcefully update). This means that the
--timeout option from the daemon will become a 'hard' timeout, instead
of a user-action timeout. Of course this should be done with a command
line option on the daemon to not change the default behaviour.

My C is a bit rusty, but I can help with adding one of the features, I
would just like to know some of your thoughts on this issue.

Thanks a lot,

- Thijs



[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux