]>
Commit | Line | Data |
---|---|---|
731043fd | 1 | #include "git-compat-util.h" |
f7192598 | 2 | #include "cache.h" |
41cb7488 | 3 | #include "pkt-line.h" |
b10d0ec7 | 4 | #include "quote.h" |
6abf5c0c | 5 | #include "refs.h" |
15a1c012 | 6 | #include "run-command.h" |
6b62816c | 7 | #include "remote.h" |
9d2e9420 | 8 | #include "url.h" |
f7192598 | 9 | |
96f1e58f | 10 | static char *server_capabilities; |
211b5f9e | 11 | |
2718ff09 LT |
12 | static int check_ref(const char *name, int len, unsigned int flags) |
13 | { | |
14 | if (!flags) | |
15 | return 1; | |
16 | ||
c41e20b3 | 17 | if (len < 5 || memcmp(name, "refs/", 5)) |
2718ff09 LT |
18 | return 0; |
19 | ||
20 | /* Skip the "refs/" part */ | |
21 | name += 5; | |
22 | len -= 5; | |
23 | ||
24 | /* REF_NORMAL means that we don't want the magic fake tag refs */ | |
25 | if ((flags & REF_NORMAL) && check_ref_format(name) < 0) | |
26 | return 0; | |
27 | ||
28 | /* REF_HEADS means that we want regular branch heads */ | |
29 | if ((flags & REF_HEADS) && !memcmp(name, "heads/", 6)) | |
30 | return 1; | |
31 | ||
32 | /* REF_TAGS means that we want tags */ | |
33 | if ((flags & REF_TAGS) && !memcmp(name, "tags/", 5)) | |
34 | return 1; | |
35 | ||
36 | /* All type bits clear means that we are ok with anything */ | |
37 | return !(flags & ~REF_NORMAL); | |
38 | } | |
39 | ||
4577370e DB |
40 | int check_ref_type(const struct ref *ref, int flags) |
41 | { | |
42 | return check_ref(ref->name, strlen(ref->name), flags); | |
43 | } | |
44 | ||
40c155ff JH |
45 | static void add_extra_have(struct extra_have_objects *extra, unsigned char *sha1) |
46 | { | |
47 | ALLOC_GROW(extra->array, extra->nr + 1, extra->alloc); | |
48 | hashcpy(&(extra->array[extra->nr][0]), sha1); | |
49 | extra->nr++; | |
50 | } | |
51 | ||
d1c133f5 LT |
52 | /* |
53 | * Read all the refs from the other end | |
54 | */ | |
1a7141ff | 55 | struct ref **get_remote_heads(int in, struct ref **list, |
2718ff09 | 56 | int nr_match, char **match, |
40c155ff JH |
57 | unsigned int flags, |
58 | struct extra_have_objects *extra_have) | |
d1c133f5 LT |
59 | { |
60 | *list = NULL; | |
61 | for (;;) { | |
62 | struct ref *ref; | |
63 | unsigned char old_sha1[20]; | |
64 | static char buffer[1000]; | |
65 | char *name; | |
211b5f9e | 66 | int len, name_len; |
d1c133f5 LT |
67 | |
68 | len = packet_read_line(in, buffer, sizeof(buffer)); | |
69 | if (!len) | |
70 | break; | |
71 | if (buffer[len-1] == '\n') | |
72 | buffer[--len] = 0; | |
73 | ||
a8073289 TPW |
74 | if (len > 4 && !prefixcmp(buffer, "ERR ")) |
75 | die("remote error: %s", buffer + 4); | |
76 | ||
d1c133f5 LT |
77 | if (len < 42 || get_sha1_hex(buffer, old_sha1) || buffer[40] != ' ') |
78 | die("protocol error: expected sha/ref, got '%s'", buffer); | |
79 | name = buffer + 41; | |
1a7141ff | 80 | |
211b5f9e JS |
81 | name_len = strlen(name); |
82 | if (len != name_len + 41) { | |
8e0f7003 | 83 | free(server_capabilities); |
9befac47 | 84 | server_capabilities = xstrdup(name + name_len + 1); |
211b5f9e JS |
85 | } |
86 | ||
40c155ff JH |
87 | if (extra_have && |
88 | name_len == 5 && !memcmp(".have", name, 5)) { | |
89 | add_extra_have(extra_have, old_sha1); | |
90 | continue; | |
91 | } | |
92 | ||
2718ff09 | 93 | if (!check_ref(name, name_len, flags)) |
cfee10a7 | 94 | continue; |
d1c133f5 LT |
95 | if (nr_match && !path_match(name, nr_match, match)) |
96 | continue; | |
59c69c0c | 97 | ref = alloc_ref(buffer + 41); |
e702496e | 98 | hashcpy(ref->old_sha1, old_sha1); |
d1c133f5 LT |
99 | *list = ref; |
100 | list = &ref->next; | |
101 | } | |
102 | return list; | |
103 | } | |
104 | ||
211b5f9e JS |
105 | int server_supports(const char *feature) |
106 | { | |
1f5881bb JS |
107 | return server_capabilities && |
108 | strstr(server_capabilities, feature) != NULL; | |
211b5f9e JS |
109 | } |
110 | ||
013e7c7f LT |
111 | int path_match(const char *path, int nr, char **match) |
112 | { | |
113 | int i; | |
114 | int pathlen = strlen(path); | |
115 | ||
116 | for (i = 0; i < nr; i++) { | |
117 | char *s = match[i]; | |
118 | int len = strlen(s); | |
119 | ||
120 | if (!len || len > pathlen) | |
121 | continue; | |
122 | if (memcmp(path + pathlen - len, s, len)) | |
123 | continue; | |
124 | if (pathlen > len && path[pathlen - len - 1] != '/') | |
125 | continue; | |
126 | *s = 0; | |
9546010b | 127 | return (i + 1); |
013e7c7f LT |
128 | } |
129 | return 0; | |
130 | } | |
131 | ||
2386d658 LT |
132 | enum protocol { |
133 | PROTO_LOCAL = 1, | |
134 | PROTO_SSH, | |
4b05548f | 135 | PROTO_GIT |
2386d658 LT |
136 | }; |
137 | ||
138 | static enum protocol get_protocol(const char *name) | |
139 | { | |
140 | if (!strcmp(name, "ssh")) | |
141 | return PROTO_SSH; | |
142 | if (!strcmp(name, "git")) | |
143 | return PROTO_GIT; | |
c05186cc LT |
144 | if (!strcmp(name, "git+ssh")) |
145 | return PROTO_SSH; | |
146 | if (!strcmp(name, "ssh+git")) | |
147 | return PROTO_SSH; | |
72a4f4b6 LT |
148 | if (!strcmp(name, "file")) |
149 | return PROTO_LOCAL; | |
2386d658 LT |
150 | die("I don't handle protocol '%s'", name); |
151 | } | |
152 | ||
5ba88448 YH |
153 | #define STR_(s) # s |
154 | #define STR(s) STR_(s) | |
2386d658 | 155 | |
72a534da ML |
156 | static void get_host_and_port(char **host, const char **port) |
157 | { | |
158 | char *colon, *end; | |
159 | ||
160 | if (*host[0] == '[') { | |
161 | end = strchr(*host + 1, ']'); | |
162 | if (end) { | |
163 | *end = 0; | |
164 | end++; | |
165 | (*host)++; | |
166 | } else | |
167 | end = *host; | |
168 | } else | |
169 | end = *host; | |
170 | colon = strchr(end, ':'); | |
171 | ||
172 | if (colon) { | |
173 | *colon = 0; | |
174 | *port = colon + 1; | |
175 | } | |
176 | } | |
177 | ||
49744d63 | 178 | #ifndef NO_IPV6 |
4c505f71 | 179 | |
ba505322 AR |
180 | static const char *ai_name(const struct addrinfo *ai) |
181 | { | |
785a9857 BK |
182 | static char addr[NI_MAXHOST]; |
183 | if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0, | |
184 | NI_NUMERICHOST) != 0) | |
ba505322 | 185 | strcpy(addr, "(unknown)"); |
785a9857 | 186 | |
ba505322 AR |
187 | return addr; |
188 | } | |
189 | ||
5ad312be JL |
190 | /* |
191 | * Returns a connected socket() fd, or else die()s. | |
192 | */ | |
7841ce79 | 193 | static int git_tcp_connect_sock(char *host, int flags) |
2386d658 | 194 | { |
ac3bc6c1 | 195 | int sockfd = -1, saved_errno = 0; |
554fe20d | 196 | const char *port = STR(DEFAULT_GIT_PORT); |
5ba88448 YH |
197 | struct addrinfo hints, *ai0, *ai; |
198 | int gai; | |
ba505322 | 199 | int cnt = 0; |
5ba88448 | 200 | |
72a534da ML |
201 | get_host_and_port(&host, &port); |
202 | if (!*port) | |
203 | port = "<none>"; | |
5ba88448 YH |
204 | |
205 | memset(&hints, 0, sizeof(hints)); | |
206 | hints.ai_socktype = SOCK_STREAM; | |
207 | hints.ai_protocol = IPPROTO_TCP; | |
208 | ||
7841ce79 MT |
209 | if (flags & CONNECT_VERBOSE) |
210 | fprintf(stderr, "Looking up %s ... ", host); | |
211 | ||
5ba88448 YH |
212 | gai = getaddrinfo(host, port, &hints, &ai); |
213 | if (gai) | |
608d48b2 | 214 | die("Unable to look up %s (port %s) (%s)", host, port, gai_strerror(gai)); |
5ba88448 | 215 | |
7841ce79 MT |
216 | if (flags & CONNECT_VERBOSE) |
217 | fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port); | |
218 | ||
5ba88448 | 219 | for (ai0 = ai; ai; ai = ai->ai_next) { |
5ad312be JL |
220 | sockfd = socket(ai->ai_family, |
221 | ai->ai_socktype, ai->ai_protocol); | |
ac3bc6c1 PB |
222 | if (sockfd < 0) { |
223 | saved_errno = errno; | |
5ba88448 | 224 | continue; |
ac3bc6c1 | 225 | } |
5ba88448 | 226 | if (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0) { |
ac3bc6c1 | 227 | saved_errno = errno; |
7cbf2f24 | 228 | fprintf(stderr, "%s[%d: %s]: errno=%s\n", |
ba505322 AR |
229 | host, |
230 | cnt, | |
231 | ai_name(ai), | |
ba505322 | 232 | strerror(saved_errno)); |
5ba88448 YH |
233 | close(sockfd); |
234 | sockfd = -1; | |
235 | continue; | |
2386d658 | 236 | } |
ba505322 AR |
237 | if (flags & CONNECT_VERBOSE) |
238 | fprintf(stderr, "%s ", ai_name(ai)); | |
5ba88448 | 239 | break; |
2386d658 LT |
240 | } |
241 | ||
5ba88448 | 242 | freeaddrinfo(ai0); |
2386d658 | 243 | |
2386d658 | 244 | if (sockfd < 0) |
ac3bc6c1 | 245 | die("unable to connect a socket (%s)", strerror(saved_errno)); |
5ba88448 | 246 | |
7841ce79 MT |
247 | if (flags & CONNECT_VERBOSE) |
248 | fprintf(stderr, "done.\n"); | |
249 | ||
5ad312be | 250 | return sockfd; |
2386d658 LT |
251 | } |
252 | ||
49744d63 | 253 | #else /* NO_IPV6 */ |
4c505f71 | 254 | |
5ad312be JL |
255 | /* |
256 | * Returns a connected socket() fd, or else die()s. | |
257 | */ | |
7841ce79 | 258 | static int git_tcp_connect_sock(char *host, int flags) |
4c505f71 | 259 | { |
ac3bc6c1 | 260 | int sockfd = -1, saved_errno = 0; |
72a534da ML |
261 | const char *port = STR(DEFAULT_GIT_PORT); |
262 | char *ep; | |
4c505f71 PA |
263 | struct hostent *he; |
264 | struct sockaddr_in sa; | |
265 | char **ap; | |
266 | unsigned int nport; | |
ba505322 | 267 | int cnt; |
4c505f71 | 268 | |
72a534da | 269 | get_host_and_port(&host, &port); |
4c505f71 | 270 | |
7841ce79 MT |
271 | if (flags & CONNECT_VERBOSE) |
272 | fprintf(stderr, "Looking up %s ... ", host); | |
273 | ||
4c505f71 PA |
274 | he = gethostbyname(host); |
275 | if (!he) | |
276 | die("Unable to look up %s (%s)", host, hstrerror(h_errno)); | |
277 | nport = strtoul(port, &ep, 10); | |
278 | if ( ep == port || *ep ) { | |
279 | /* Not numeric */ | |
280 | struct servent *se = getservbyname(port,"tcp"); | |
281 | if ( !se ) | |
d7530708 | 282 | die("Unknown port %s", port); |
4c505f71 PA |
283 | nport = se->s_port; |
284 | } | |
285 | ||
7841ce79 MT |
286 | if (flags & CONNECT_VERBOSE) |
287 | fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port); | |
288 | ||
ba505322 | 289 | for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) { |
4c505f71 | 290 | sockfd = socket(he->h_addrtype, SOCK_STREAM, 0); |
ac3bc6c1 PB |
291 | if (sockfd < 0) { |
292 | saved_errno = errno; | |
4c505f71 | 293 | continue; |
ac3bc6c1 | 294 | } |
4c505f71 PA |
295 | |
296 | memset(&sa, 0, sizeof sa); | |
297 | sa.sin_family = he->h_addrtype; | |
6573faff | 298 | sa.sin_port = htons(nport); |
c6164218 | 299 | memcpy(&sa.sin_addr, *ap, he->h_length); |
4c505f71 PA |
300 | |
301 | if (connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) { | |
ac3bc6c1 | 302 | saved_errno = errno; |
7cbf2f24 | 303 | fprintf(stderr, "%s[%d: %s]: errno=%s\n", |
ba505322 AR |
304 | host, |
305 | cnt, | |
306 | inet_ntoa(*(struct in_addr *)&sa.sin_addr), | |
ba505322 | 307 | strerror(saved_errno)); |
4c505f71 PA |
308 | close(sockfd); |
309 | sockfd = -1; | |
310 | continue; | |
311 | } | |
ba505322 AR |
312 | if (flags & CONNECT_VERBOSE) |
313 | fprintf(stderr, "%s ", | |
314 | inet_ntoa(*(struct in_addr *)&sa.sin_addr)); | |
4c505f71 PA |
315 | break; |
316 | } | |
317 | ||
318 | if (sockfd < 0) | |
ac3bc6c1 | 319 | die("unable to connect a socket (%s)", strerror(saved_errno)); |
4c505f71 | 320 | |
7841ce79 MT |
321 | if (flags & CONNECT_VERBOSE) |
322 | fprintf(stderr, "done.\n"); | |
323 | ||
5ad312be JL |
324 | return sockfd; |
325 | } | |
326 | ||
327 | #endif /* NO_IPV6 */ | |
328 | ||
329 | ||
7841ce79 | 330 | static void git_tcp_connect(int fd[2], char *host, int flags) |
5ad312be | 331 | { |
7841ce79 | 332 | int sockfd = git_tcp_connect_sock(host, flags); |
5ad312be | 333 | |
4c505f71 | 334 | fd[0] = sockfd; |
ec587fde | 335 | fd[1] = dup(sockfd); |
4c505f71 PA |
336 | } |
337 | ||
4c505f71 | 338 | |
96f1e58f | 339 | static char *git_proxy_command; |
f8014776 | 340 | |
ef90d6d4 JS |
341 | static int git_proxy_command_options(const char *var, const char *value, |
342 | void *cb) | |
f8014776 | 343 | { |
e814bc4d | 344 | if (!strcmp(var, "core.gitproxy")) { |
c3df8568 YH |
345 | const char *for_pos; |
346 | int matchlen = -1; | |
347 | int hostlen; | |
15112c95 EFL |
348 | const char *rhost_name = cb; |
349 | int rhost_len = strlen(rhost_name); | |
c3df8568 | 350 | |
e814bc4d | 351 | if (git_proxy_command) |
f8014776 | 352 | return 0; |
c64b9ad0 JH |
353 | if (!value) |
354 | return config_error_nonbool(var); | |
e814bc4d JH |
355 | /* [core] |
356 | * ;# matches www.kernel.org as well | |
357 | * gitproxy = netcatter-1 for kernel.org | |
358 | * gitproxy = netcatter-2 for sample.xz | |
359 | * gitproxy = netcatter-default | |
360 | */ | |
c3df8568 | 361 | for_pos = strstr(value, " for "); |
e814bc4d JH |
362 | if (!for_pos) |
363 | /* matches everybody */ | |
364 | matchlen = strlen(value); | |
365 | else { | |
366 | hostlen = strlen(for_pos + 5); | |
367 | if (rhost_len < hostlen) | |
368 | matchlen = -1; | |
369 | else if (!strncmp(for_pos + 5, | |
370 | rhost_name + rhost_len - hostlen, | |
371 | hostlen) && | |
372 | ((rhost_len == hostlen) || | |
373 | rhost_name[rhost_len - hostlen -1] == '.')) | |
374 | matchlen = for_pos - value; | |
375 | else | |
376 | matchlen = -1; | |
377 | } | |
378 | if (0 <= matchlen) { | |
379 | /* core.gitproxy = none for kernel.org */ | |
a6080a0a | 380 | if (matchlen == 4 && |
e814bc4d JH |
381 | !memcmp(value, "none", 4)) |
382 | matchlen = 0; | |
182af834 | 383 | git_proxy_command = xmemdupz(value, matchlen); |
f8014776 | 384 | } |
e814bc4d | 385 | return 0; |
f8014776 PC |
386 | } |
387 | ||
ef90d6d4 | 388 | return git_default_config(var, value, cb); |
f8014776 PC |
389 | } |
390 | ||
e814bc4d | 391 | static int git_use_proxy(const char *host) |
f8014776 PC |
392 | { |
393 | git_proxy_command = getenv("GIT_PROXY_COMMAND"); | |
15112c95 | 394 | git_config(git_proxy_command_options, (void*)host); |
e814bc4d | 395 | return (git_proxy_command && *git_proxy_command); |
f8014776 PC |
396 | } |
397 | ||
c78963d2 | 398 | static void git_proxy_connect(int fd[2], char *host) |
f8014776 | 399 | { |
554fe20d | 400 | const char *port = STR(DEFAULT_GIT_PORT); |
15a1c012 SP |
401 | const char *argv[4]; |
402 | struct child_process proxy; | |
f8014776 | 403 | |
72a534da | 404 | get_host_and_port(&host, &port); |
f8014776 | 405 | |
15a1c012 SP |
406 | argv[0] = git_proxy_command; |
407 | argv[1] = host; | |
408 | argv[2] = port; | |
409 | argv[3] = NULL; | |
410 | memset(&proxy, 0, sizeof(proxy)); | |
411 | proxy.argv = argv; | |
412 | proxy.in = -1; | |
413 | proxy.out = -1; | |
414 | if (start_command(&proxy)) | |
415 | die("cannot start proxy %s", argv[0]); | |
416 | fd[0] = proxy.out; /* read from proxy stdout */ | |
417 | fd[1] = proxy.in; /* write to proxy stdin */ | |
f8014776 PC |
418 | } |
419 | ||
0f503d77 CC |
420 | #define MAX_CMD_LEN 1024 |
421 | ||
2af202be | 422 | static char *get_port(char *host) |
2e776665 LT |
423 | { |
424 | char *end; | |
425 | char *p = strchr(host, ':'); | |
426 | ||
427 | if (p) { | |
8f148253 RS |
428 | long port = strtol(p + 1, &end, 10); |
429 | if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) { | |
2e776665 LT |
430 | *p = '\0'; |
431 | return p+1; | |
432 | } | |
433 | } | |
434 | ||
435 | return NULL; | |
436 | } | |
437 | ||
fb32c917 JS |
438 | static struct child_process no_fork; |
439 | ||
f7192598 | 440 | /* |
fb32c917 JS |
441 | * This returns a dummy child_process if the transport protocol does not |
442 | * need fork(2), or a struct child_process object if it does. Once done, | |
443 | * finish the connection with finish_connect() with the value returned from | |
444 | * this function (it is safe to call finish_connect() with NULL to support | |
445 | * the former case). | |
f42a5c4e | 446 | * |
fb32c917 JS |
447 | * If it returns, the connect is successful; it just dies on errors (this |
448 | * will hopefully be changed in a libification effort, to return NULL when | |
449 | * the connection failed). | |
f7192598 | 450 | */ |
4577370e | 451 | struct child_process *git_connect(int fd[2], const char *url_orig, |
98158e9c | 452 | const char *prog, int flags) |
f7192598 | 453 | { |
9d2e9420 | 454 | char *url; |
8e76bf3f | 455 | char *host, *path; |
356bece0 YH |
456 | char *end; |
457 | int c; | |
98158e9c | 458 | struct child_process *conn; |
faea9ccb | 459 | enum protocol protocol = PROTO_LOCAL; |
da2a95b2 | 460 | int free_path = 0; |
2e776665 | 461 | char *port = NULL; |
f364cb88 JS |
462 | const char **arg; |
463 | struct strbuf cmd; | |
faea9ccb | 464 | |
f0b7367c JH |
465 | /* Without this we cannot rely on waitpid() to tell |
466 | * what happened to our children. | |
467 | */ | |
468 | signal(SIGCHLD, SIG_DFL); | |
469 | ||
9d2e9420 JK |
470 | if (is_url(url_orig)) |
471 | url = url_decode(url_orig); | |
472 | else | |
473 | url = xstrdup(url_orig); | |
474 | ||
faea9ccb | 475 | host = strstr(url, "://"); |
eeefa7c9 | 476 | if (host) { |
faea9ccb AE |
477 | *host = '\0'; |
478 | protocol = get_protocol(url); | |
479 | host += 3; | |
356bece0 YH |
480 | c = '/'; |
481 | } else { | |
f7192598 | 482 | host = url; |
356bece0 YH |
483 | c = ':'; |
484 | } | |
485 | ||
9aa5053d IL |
486 | /* |
487 | * Don't do destructive transforms with git:// as that | |
9517e6b8 | 488 | * protocol code does '[]' unwrapping of its own. |
9aa5053d | 489 | */ |
356bece0 YH |
490 | if (host[0] == '[') { |
491 | end = strchr(host + 1, ']'); | |
492 | if (end) { | |
9aa5053d IL |
493 | if (protocol != PROTO_GIT) { |
494 | *end = 0; | |
495 | host++; | |
496 | } | |
356bece0 | 497 | end++; |
356bece0 YH |
498 | } else |
499 | end = host; | |
500 | } else | |
501 | end = host; | |
502 | ||
503 | path = strchr(end, c); | |
be501813 | 504 | if (path && !has_dos_drive_prefix(end)) { |
72a4f4b6 | 505 | if (c == ':') { |
faea9ccb | 506 | protocol = PROTO_SSH; |
356bece0 | 507 | *path++ = '\0'; |
72a4f4b6 LT |
508 | } |
509 | } else | |
510 | path = end; | |
2386d658 | 511 | |
faea9ccb AE |
512 | if (!path || !*path) |
513 | die("No path specified. See 'man git-pull' for valid url syntax"); | |
514 | ||
515 | /* | |
516 | * null-terminate hostname and point path to ~ for URL's like this: | |
517 | * ssh://host.xz/~user/repo | |
518 | */ | |
519 | if (protocol != PROTO_LOCAL && host != url) { | |
520 | char *ptr = path; | |
521 | if (path[1] == '~') | |
522 | path++; | |
da2a95b2 | 523 | else { |
9befac47 | 524 | path = xstrdup(ptr); |
da2a95b2 SH |
525 | free_path = 1; |
526 | } | |
faea9ccb AE |
527 | |
528 | *ptr = '\0'; | |
529 | } | |
530 | ||
2e776665 LT |
531 | /* |
532 | * Add support for ssh port: ssh://host.xy:<port>/... | |
533 | */ | |
534 | if (protocol == PROTO_SSH && host != url) | |
535 | port = get_port(host); | |
536 | ||
f8014776 | 537 | if (protocol == PROTO_GIT) { |
5ad312be JL |
538 | /* These underlying connection commands die() if they |
539 | * cannot connect. | |
540 | */ | |
9befac47 | 541 | char *target_host = xstrdup(host); |
e814bc4d | 542 | if (git_use_proxy(host)) |
c78963d2 | 543 | git_proxy_connect(fd, host); |
da2a95b2 | 544 | else |
7841ce79 | 545 | git_tcp_connect(fd, host, flags); |
5ad312be JL |
546 | /* |
547 | * Separate original protocol components prog and path | |
73bb33a9 SP |
548 | * from extended host header with a NUL byte. |
549 | * | |
550 | * Note: Do not add any other headers here! Doing so | |
551 | * will cause older git-daemon servers to crash. | |
5ad312be JL |
552 | */ |
553 | packet_write(fd[1], | |
554 | "%s %s%chost=%s%c", | |
555 | prog, path, 0, | |
556 | target_host, 0); | |
557 | free(target_host); | |
4577370e | 558 | free(url); |
da2a95b2 SH |
559 | if (free_path) |
560 | free(path); | |
fb32c917 | 561 | return &no_fork; |
f8014776 | 562 | } |
2386d658 | 563 | |
98158e9c | 564 | conn = xcalloc(1, sizeof(*conn)); |
2e776665 | 565 | |
f364cb88 JS |
566 | strbuf_init(&cmd, MAX_CMD_LEN); |
567 | strbuf_addstr(&cmd, prog); | |
568 | strbuf_addch(&cmd, ' '); | |
569 | sq_quote_buf(&cmd, path); | |
570 | if (cmd.len >= MAX_CMD_LEN) | |
571 | die("command line too long"); | |
572 | ||
573 | conn->in = conn->out = -1; | |
36ad53ff | 574 | conn->argv = arg = xcalloc(7, sizeof(*arg)); |
f364cb88 JS |
575 | if (protocol == PROTO_SSH) { |
576 | const char *ssh = getenv("GIT_SSH"); | |
36ad53ff | 577 | int putty = ssh && strcasestr(ssh, "plink"); |
f364cb88 JS |
578 | if (!ssh) ssh = "ssh"; |
579 | ||
580 | *arg++ = ssh; | |
36ad53ff EY |
581 | if (putty && !strcasestr(ssh, "tortoiseplink")) |
582 | *arg++ = "-batch"; | |
f364cb88 | 583 | if (port) { |
36ad53ff EY |
584 | /* P is for PuTTY, p is for OpenSSH */ |
585 | *arg++ = putty ? "-P" : "-p"; | |
f364cb88 | 586 | *arg++ = port; |
4852f723 | 587 | } |
f364cb88 JS |
588 | *arg++ = host; |
589 | } | |
590 | else { | |
48a7c1c4 GB |
591 | /* remove repo-local variables from the environment */ |
592 | conn->env = local_repo_env; | |
4cfb2a44 | 593 | conn->use_shell = 1; |
016fb48b | 594 | } |
f364cb88 JS |
595 | *arg++ = cmd.buf; |
596 | *arg = NULL; | |
597 | ||
598 | if (start_command(conn)) | |
599 | die("unable to fork"); | |
600 | ||
601 | fd[0] = conn->out; /* read from child's stdout */ | |
602 | fd[1] = conn->in; /* write to child's stdin */ | |
603 | strbuf_release(&cmd); | |
4577370e | 604 | free(url); |
da2a95b2 SH |
605 | if (free_path) |
606 | free(path); | |
98158e9c | 607 | return conn; |
f7192598 LT |
608 | } |
609 | ||
98158e9c | 610 | int finish_connect(struct child_process *conn) |
f7192598 | 611 | { |
f364cb88 | 612 | int code; |
fb32c917 | 613 | if (!conn || conn == &no_fork) |
f42a5c4e FBH |
614 | return 0; |
615 | ||
f364cb88 JS |
616 | code = finish_command(conn); |
617 | free(conn->argv); | |
98158e9c | 618 | free(conn); |
f364cb88 | 619 | return code; |
f7192598 | 620 | } |
f206063b FL |
621 | |
622 | char *git_getpass(const char *prompt) | |
623 | { | |
d3e7da89 | 624 | const char *askpass; |
f206063b FL |
625 | struct child_process pass; |
626 | const char *args[3]; | |
627 | static struct strbuf buffer = STRBUF_INIT; | |
628 | ||
629 | askpass = getenv("GIT_ASKPASS"); | |
d3e7da89 AK |
630 | if (!askpass) |
631 | askpass = askpass_program; | |
90e87b01 KF |
632 | if (!askpass) |
633 | askpass = getenv("SSH_ASKPASS"); | |
8713feb1 JS |
634 | if (!askpass || !(*askpass)) { |
635 | char *result = getpass(prompt); | |
636 | if (!result) | |
637 | die_errno("Could not read password"); | |
638 | return result; | |
639 | } | |
f206063b FL |
640 | |
641 | args[0] = askpass; | |
642 | args[1] = prompt; | |
643 | args[2] = NULL; | |
644 | ||
645 | memset(&pass, 0, sizeof(pass)); | |
646 | pass.argv = args; | |
647 | pass.out = -1; | |
648 | ||
649 | if (start_command(&pass)) | |
650 | exit(1); | |
651 | ||
652 | strbuf_reset(&buffer); | |
653 | if (strbuf_read(&buffer, pass.out, 20) < 0) | |
654 | die("failed to read password from %s\n", askpass); | |
655 | ||
656 | close(pass.out); | |
657 | ||
658 | if (finish_command(&pass)) | |
659 | exit(1); | |
660 | ||
661 | strbuf_setlen(&buffer, strcspn(buffer.buf, "\r\n")); | |
662 | ||
663 | return buffer.buf; | |
664 | } |