@@ -1936,26 +1936,23 @@ mktempdir() do dir
19361936 function gen_ex (; username= " git" )
19371937 quote
19381938 include ($ LIBGIT2_HELPER_PATH)
1939- credential_loop ($ valid_cred, $ url, Nullable {String} ($ username), use_ssh_agent= true )
1939+ payload = CredentialPayload (allow_ssh_agent= true , allow_prompt= false )
1940+ credential_loop ($ valid_cred, $ url, Nullable {String} ($ username), payload)
19401941 end
19411942 end
19421943
1943- challenges = [
1944- " Username for 'github.com':" => " \x 04" ,
1945- ]
1946-
19471944 # An empty string username_ptr
19481945 ex = gen_ex (username= " " )
1949- err, auth_attempts = challenge_prompt (ex, challenges )
1950- @test err == abort_prompt # TODO : ` eauth_error` when we can disable prompting
1946+ err, auth_attempts = challenge_prompt (ex, [] )
1947+ @test err == eauth_error
19511948 @test auth_attempts == 2
19521949
19531950 # A null username_ptr passed into `git_cred_ssh_key_from_agent` can cause a
19541951 # segfault.
19551952 ex = gen_ex (username= nothing )
1956- err, auth_attempts = challenge_prompt (ex, challenges )
1957- @test err == abort_prompt # TODO : ` eauth_error` when we can disable prompting
1958- @test auth_attempts == 1
1953+ err, auth_attempts = challenge_prompt (ex, [] )
1954+ @test err == eauth_error
1955+ @test auth_attempts == 2
19591956 end
19601957
19611958 @testset " SSH explicit credentials" begin
@@ -1969,22 +1966,22 @@ mktempdir() do dir
19691966 invalid_key = joinpath (KEY_DIR, " invalid" )
19701967 invalid_cred = LibGit2. SSHCredentials (username, " " , invalid_key, invalid_key * " .pub" )
19711968
1972- function gen_ex (cred)
1969+ function gen_ex (cred; allow_prompt = true )
19731970 quote
19741971 include ($ LIBGIT2_HELPER_PATH)
1975- payload = CredentialPayload ($ cred)
1976- credential_loop ($ valid_cred, $ url, $ username, payload, use_ssh_agent = false )
1972+ payload = CredentialPayload ($ cred, allow_ssh_agent = false , allow_prompt = $ allow_prompt )
1973+ credential_loop ($ valid_cred, $ url, $ username, payload)
19771974 end
19781975 end
19791976
19801977 # Explicitly provided credential is correct
1981- ex = gen_ex (valid_cred)
1978+ ex = gen_ex (valid_cred, allow_prompt = true )
19821979 err, auth_attempts = challenge_prompt (ex, [])
19831980 @test err == git_ok
19841981 @test auth_attempts == 1
19851982
19861983 # Explicitly provided credential is incorrect
1987- ex = gen_ex (invalid_cred)
1984+ ex = gen_ex (invalid_cred, allow_prompt = false )
19881985 err, auth_attempts = challenge_prompt (ex, [])
19891986 @test err == eauth_error
19901987 @test auth_attempts == 2
@@ -1996,22 +1993,22 @@ mktempdir() do dir
19961993 valid_cred = LibGit2. UserPasswordCredentials (" julia" , randstring (16 ))
19971994 invalid_cred = LibGit2. UserPasswordCredentials (" alice" , randstring (15 ))
19981995
1999- function gen_ex (cred)
1996+ function gen_ex (cred; allow_prompt = true )
20001997 quote
20011998 include ($ LIBGIT2_HELPER_PATH)
2002- payload = CredentialPayload ($ cred)
1999+ payload = CredentialPayload ($ cred, allow_prompt = $ allow_prompt )
20032000 credential_loop ($ valid_cred, $ url, " " , payload)
20042001 end
20052002 end
20062003
20072004 # Explicitly provided credential is correct
2008- ex = gen_ex (valid_cred)
2005+ ex = gen_ex (valid_cred, allow_prompt = true )
20092006 err, auth_attempts = challenge_prompt (ex, [])
20102007 @test err == git_ok
20112008 @test auth_attempts == 1
20122009
20132010 # Explicitly provided credential is incorrect
2014- ex = gen_ex (invalid_cred)
2011+ ex = gen_ex (invalid_cred, allow_prompt = false )
20152012 err, auth_attempts = challenge_prompt (ex, [])
20162013 @test err == eauth_error
20172014 @test auth_attempts == 2
@@ -2023,11 +2020,11 @@ mktempdir() do dir
20232020
20242021 valid_username = " julia"
20252022 valid_password = randstring (16 )
2026- valid_cred = LibGit2. UserPasswordCredentials (valid_username, valid_password, true )
2023+ valid_cred = LibGit2. UserPasswordCredentials (valid_username, valid_password)
20272024
20282025 invalid_username = " alice"
20292026 invalid_password = randstring (15 )
2030- invalid_cred = LibGit2. UserPasswordCredentials (invalid_username, invalid_password, true )
2027+ invalid_cred = LibGit2. UserPasswordCredentials (invalid_username, invalid_password)
20312028
20322029 function gen_ex (; cached_cred= nothing )
20332030 quote
@@ -2076,7 +2073,7 @@ mktempdir() do dir
20762073 expect_ssh_ex = quote
20772074 include ($ LIBGIT2_HELPER_PATH)
20782075 valid_cred = LibGit2. UserPasswordCredentials (" foo" , " bar" )
2079- payload = CredentialPayload (valid_cred)
2076+ payload = CredentialPayload (valid_cred, allow_ssh_agent = false )
20802077 credential_loop (valid_cred, " ssh://github.com/repo" , Nullable (" " ),
20812078 Cuint (LibGit2. Consts. CREDTYPE_SSH_KEY), payload)
20822079 end
@@ -2089,7 +2086,7 @@ mktempdir() do dir
20892086 expect_https_ex = quote
20902087 include ($ LIBGIT2_HELPER_PATH)
20912088 valid_cred = LibGit2. SSHCredentials (" foo" , " " , " " , " " )
2092- payload = CredentialPayload (valid_cred)
2089+ payload = CredentialPayload (valid_cred, allow_ssh_agent = false )
20932090 credential_loop (valid_cred, " https://github.com/repo" , Nullable (" " ),
20942091 Cuint (LibGit2. Consts. CREDTYPE_USERPASS_PLAINTEXT), payload)
20952092 end
@@ -2109,7 +2106,7 @@ mktempdir() do dir
21092106 ex = quote
21102107 include ($ LIBGIT2_HELPER_PATH)
21112108 valid_cred = LibGit2. UserPasswordCredentials (" foo" , " bar" )
2112- payload = CredentialPayload (valid_cred)
2109+ payload = CredentialPayload (valid_cred, allow_ssh_agent = false )
21132110 credential_loop (valid_cred, " foo://github.com/repo" , Nullable (" " ),
21142111 $ allowed_types, payload)
21152112 end
0 commit comments