]>
Commit | Line | Data |
---|---|---|
731043fd | 1 | #include "git-compat-util.h" |
f7192598 | 2 | #include "cache.h" |
41cb7488 | 3 | #include "pkt-line.h" |
b10d0ec7 | 4 | #include "quote.h" |
6abf5c0c | 5 | #include "refs.h" |
15a1c012 | 6 | #include "run-command.h" |
6b62816c | 7 | #include "remote.h" |
47a59185 | 8 | #include "connect.h" |
9d2e9420 | 9 | #include "url.h" |
a45b5f05 | 10 | #include "string-list.h" |
13eb4626 | 11 | #include "sha1-array.h" |
a5adaced | 12 | #include "transport.h" |
f7192598 | 13 | |
96f1e58f | 14 | static char *server_capabilities; |
5d54cffc | 15 | static const char *parse_feature_value(const char *, const char *, int *); |
211b5f9e | 16 | |
be0b3f82 | 17 | static int check_ref(const char *name, unsigned int flags) |
2718ff09 LT |
18 | { |
19 | if (!flags) | |
20 | return 1; | |
21 | ||
be0b3f82 | 22 | if (!skip_prefix(name, "refs/", &name)) |
2718ff09 LT |
23 | return 0; |
24 | ||
2718ff09 | 25 | /* REF_NORMAL means that we don't want the magic fake tag refs */ |
8d9c5010 | 26 | if ((flags & REF_NORMAL) && check_refname_format(name, 0)) |
2718ff09 LT |
27 | return 0; |
28 | ||
29 | /* REF_HEADS means that we want regular branch heads */ | |
be0b3f82 | 30 | if ((flags & REF_HEADS) && starts_with(name, "heads/")) |
2718ff09 LT |
31 | return 1; |
32 | ||
33 | /* REF_TAGS means that we want tags */ | |
be0b3f82 | 34 | if ((flags & REF_TAGS) && starts_with(name, "tags/")) |
2718ff09 LT |
35 | return 1; |
36 | ||
37 | /* All type bits clear means that we are ok with anything */ | |
38 | return !(flags & ~REF_NORMAL); | |
39 | } | |
40 | ||
4577370e DB |
41 | int check_ref_type(const struct ref *ref, int flags) |
42 | { | |
be0b3f82 | 43 | return check_ref(ref->name, flags); |
4577370e DB |
44 | } |
45 | ||
55e4f936 | 46 | static void die_initial_contact(int unexpected) |
46284dd1 | 47 | { |
55e4f936 | 48 | if (unexpected) |
f2b93b38 | 49 | die(_("The remote end hung up upon initial contact")); |
46284dd1 | 50 | else |
f2b93b38 VA |
51 | die(_("Could not read from remote repository.\n\n" |
52 | "Please make sure you have the correct access rights\n" | |
53 | "and the repository exists.")); | |
46284dd1 HV |
54 | } |
55 | ||
a45b5f05 JH |
56 | static void parse_one_symref_info(struct string_list *symref, const char *val, int len) |
57 | { | |
58 | char *sym, *target; | |
59 | struct string_list_item *item; | |
60 | ||
61 | if (!len) | |
62 | return; /* just "symref" */ | |
63 | /* e.g. "symref=HEAD:refs/heads/master" */ | |
5c0b13f8 | 64 | sym = xmemdupz(val, len); |
a45b5f05 JH |
65 | target = strchr(sym, ':'); |
66 | if (!target) | |
67 | /* just "symref=something" */ | |
68 | goto reject; | |
69 | *(target++) = '\0'; | |
70 | if (check_refname_format(sym, REFNAME_ALLOW_ONELEVEL) || | |
71 | check_refname_format(target, REFNAME_ALLOW_ONELEVEL)) | |
72 | /* "symref=bogus:pair */ | |
73 | goto reject; | |
74 | item = string_list_append(symref, sym); | |
75 | item->util = target; | |
76 | return; | |
77 | reject: | |
78 | free(sym); | |
79 | return; | |
80 | } | |
81 | ||
82 | static void annotate_refs_with_symref_info(struct ref *ref) | |
83 | { | |
84 | struct string_list symref = STRING_LIST_INIT_DUP; | |
85 | const char *feature_list = server_capabilities; | |
86 | ||
87 | while (feature_list) { | |
88 | int len; | |
89 | const char *val; | |
90 | ||
91 | val = parse_feature_value(feature_list, "symref", &len); | |
92 | if (!val) | |
93 | break; | |
94 | parse_one_symref_info(&symref, val, len); | |
95 | feature_list = val + 1; | |
96 | } | |
3383e199 | 97 | string_list_sort(&symref); |
a45b5f05 JH |
98 | |
99 | for (; ref; ref = ref->next) { | |
100 | struct string_list_item *item; | |
101 | item = string_list_lookup(&symref, ref->name); | |
102 | if (!item) | |
103 | continue; | |
104 | ref->symref = xstrdup((char *)item->util); | |
105 | } | |
106 | string_list_clear(&symref, 0); | |
107 | } | |
108 | ||
d1c133f5 LT |
109 | /* |
110 | * Read all the refs from the other end | |
111 | */ | |
85edf4f5 JK |
112 | struct ref **get_remote_heads(int in, char *src_buf, size_t src_len, |
113 | struct ref **list, unsigned int flags, | |
b06dcd7d NTND |
114 | struct sha1_array *extra_have, |
115 | struct sha1_array *shallow_points) | |
d1c133f5 | 116 | { |
a45b5f05 | 117 | struct ref **orig_list = list; |
55e4f936 JN |
118 | |
119 | /* | |
120 | * A hang-up after seeing some response from the other end | |
121 | * means that it is unexpected, as we know the other end is | |
122 | * willing to talk to us. A hang-up before seeing any | |
123 | * response does not necessarily mean an ACL problem, though. | |
124 | */ | |
125 | int saw_response; | |
eb398797 | 126 | int got_dummy_ref_with_capabilities_declaration = 0; |
46284dd1 | 127 | |
d1c133f5 | 128 | *list = NULL; |
55e4f936 | 129 | for (saw_response = 0; ; saw_response = 1) { |
d1c133f5 | 130 | struct ref *ref; |
e96b16cc | 131 | struct object_id old_oid; |
d1c133f5 | 132 | char *name; |
211b5f9e | 133 | int len, name_len; |
74543a04 | 134 | char *buffer = packet_buffer; |
ae021d87 | 135 | const char *arg; |
d1c133f5 | 136 | |
85edf4f5 | 137 | len = packet_read(in, &src_buf, &src_len, |
4981fe75 | 138 | packet_buffer, sizeof(packet_buffer), |
819b929d JK |
139 | PACKET_READ_GENTLE_ON_EOF | |
140 | PACKET_READ_CHOMP_NEWLINE); | |
46284dd1 | 141 | if (len < 0) |
55e4f936 | 142 | die_initial_contact(saw_response); |
46284dd1 | 143 | |
d1c133f5 LT |
144 | if (!len) |
145 | break; | |
d1c133f5 | 146 | |
ae021d87 JK |
147 | if (len > 4 && skip_prefix(buffer, "ERR ", &arg)) |
148 | die("remote error: %s", arg); | |
a8073289 | 149 | |
e96b16cc | 150 | if (len == GIT_SHA1_HEXSZ + strlen("shallow ") && |
151 | skip_prefix(buffer, "shallow ", &arg)) { | |
152 | if (get_oid_hex(arg, &old_oid)) | |
ae021d87 | 153 | die("protocol error: expected shallow sha-1, got '%s'", arg); |
b06dcd7d NTND |
154 | if (!shallow_points) |
155 | die("repository on the other end cannot be shallow"); | |
e96b16cc | 156 | sha1_array_append(shallow_points, old_oid.hash); |
b06dcd7d NTND |
157 | continue; |
158 | } | |
159 | ||
e96b16cc | 160 | if (len < GIT_SHA1_HEXSZ + 2 || get_oid_hex(buffer, &old_oid) || |
161 | buffer[GIT_SHA1_HEXSZ] != ' ') | |
d1c133f5 | 162 | die("protocol error: expected sha/ref, got '%s'", buffer); |
e96b16cc | 163 | name = buffer + GIT_SHA1_HEXSZ + 1; |
1a7141ff | 164 | |
211b5f9e | 165 | name_len = strlen(name); |
e96b16cc | 166 | if (len != name_len + GIT_SHA1_HEXSZ + 1) { |
8e0f7003 | 167 | free(server_capabilities); |
9befac47 | 168 | server_capabilities = xstrdup(name + name_len + 1); |
211b5f9e JS |
169 | } |
170 | ||
2ae7f90f | 171 | if (extra_have && !strcmp(name, ".have")) { |
e96b16cc | 172 | sha1_array_append(extra_have, old_oid.hash); |
40c155ff JH |
173 | continue; |
174 | } | |
175 | ||
eb398797 JT |
176 | if (!strcmp(name, "capabilities^{}")) { |
177 | if (saw_response) | |
178 | die("protocol error: unexpected capabilities^{}"); | |
179 | if (got_dummy_ref_with_capabilities_declaration) | |
180 | die("protocol error: multiple capabilities^{}"); | |
181 | got_dummy_ref_with_capabilities_declaration = 1; | |
182 | continue; | |
183 | } | |
184 | ||
be0b3f82 | 185 | if (!check_ref(name, flags)) |
cfee10a7 | 186 | continue; |
eb398797 JT |
187 | |
188 | if (got_dummy_ref_with_capabilities_declaration) | |
189 | die("protocol error: unexpected ref after capabilities^{}"); | |
190 | ||
e96b16cc | 191 | ref = alloc_ref(buffer + GIT_SHA1_HEXSZ + 1); |
192 | oidcpy(&ref->old_oid, &old_oid); | |
d1c133f5 LT |
193 | *list = ref; |
194 | list = &ref->next; | |
195 | } | |
a45b5f05 JH |
196 | |
197 | annotate_refs_with_symref_info(*orig_list); | |
198 | ||
d1c133f5 LT |
199 | return list; |
200 | } | |
201 | ||
5d54cffc | 202 | static const char *parse_feature_value(const char *feature_list, const char *feature, int *lenp) |
f47182c8 JH |
203 | { |
204 | int len; | |
205 | ||
206 | if (!feature_list) | |
207 | return NULL; | |
208 | ||
209 | len = strlen(feature); | |
210 | while (*feature_list) { | |
211 | const char *found = strstr(feature_list, feature); | |
212 | if (!found) | |
213 | return NULL; | |
94427108 JK |
214 | if (feature_list == found || isspace(found[-1])) { |
215 | const char *value = found + len; | |
216 | /* feature with no value (e.g., "thin-pack") */ | |
217 | if (!*value || isspace(*value)) { | |
218 | if (lenp) | |
219 | *lenp = 0; | |
220 | return value; | |
221 | } | |
222 | /* feature with a value (e.g., "agent=git/1.2.3") */ | |
223 | else if (*value == '=') { | |
224 | value++; | |
225 | if (lenp) | |
226 | *lenp = strcspn(value, " \t\n"); | |
227 | return value; | |
228 | } | |
229 | /* | |
230 | * otherwise we matched a substring of another feature; | |
231 | * keep looking | |
232 | */ | |
233 | } | |
f47182c8 JH |
234 | feature_list = found + 1; |
235 | } | |
236 | return NULL; | |
211b5f9e JS |
237 | } |
238 | ||
94427108 JK |
239 | int parse_feature_request(const char *feature_list, const char *feature) |
240 | { | |
241 | return !!parse_feature_value(feature_list, feature, NULL); | |
242 | } | |
243 | ||
244 | const char *server_feature_value(const char *feature, int *len) | |
245 | { | |
246 | return parse_feature_value(server_capabilities, feature, len); | |
247 | } | |
248 | ||
249 | int server_supports(const char *feature) | |
250 | { | |
251 | return !!server_feature_value(feature, NULL); | |
252 | } | |
253 | ||
2386d658 LT |
254 | enum protocol { |
255 | PROTO_LOCAL = 1, | |
c59ab2e5 | 256 | PROTO_FILE, |
2386d658 | 257 | PROTO_SSH, |
4b05548f | 258 | PROTO_GIT |
2386d658 LT |
259 | }; |
260 | ||
c59ab2e5 TB |
261 | int url_is_local_not_ssh(const char *url) |
262 | { | |
263 | const char *colon = strchr(url, ':'); | |
264 | const char *slash = strchr(url, '/'); | |
265 | return !colon || (slash && slash < colon) || | |
266 | has_dos_drive_prefix(url); | |
267 | } | |
268 | ||
5610b7c0 TB |
269 | static const char *prot_name(enum protocol protocol) |
270 | { | |
271 | switch (protocol) { | |
272 | case PROTO_LOCAL: | |
c59ab2e5 | 273 | case PROTO_FILE: |
5610b7c0 TB |
274 | return "file"; |
275 | case PROTO_SSH: | |
276 | return "ssh"; | |
277 | case PROTO_GIT: | |
278 | return "git"; | |
279 | default: | |
83e6bda3 | 280 | return "unknown protocol"; |
5610b7c0 TB |
281 | } |
282 | } | |
283 | ||
2386d658 LT |
284 | static enum protocol get_protocol(const char *name) |
285 | { | |
286 | if (!strcmp(name, "ssh")) | |
287 | return PROTO_SSH; | |
288 | if (!strcmp(name, "git")) | |
289 | return PROTO_GIT; | |
07c7782c | 290 | if (!strcmp(name, "git+ssh")) /* deprecated - do not use */ |
c05186cc | 291 | return PROTO_SSH; |
07c7782c | 292 | if (!strcmp(name, "ssh+git")) /* deprecated - do not use */ |
c05186cc | 293 | return PROTO_SSH; |
72a4f4b6 | 294 | if (!strcmp(name, "file")) |
c59ab2e5 | 295 | return PROTO_FILE; |
2386d658 LT |
296 | die("I don't handle protocol '%s'", name); |
297 | } | |
298 | ||
86ceb337 TB |
299 | static char *host_end(char **hoststart, int removebrackets) |
300 | { | |
301 | char *host = *hoststart; | |
302 | char *end; | |
303 | char *start = strstr(host, "@["); | |
304 | if (start) | |
305 | start++; /* Jump over '@' */ | |
306 | else | |
307 | start = host; | |
308 | if (start[0] == '[') { | |
309 | end = strchr(start + 1, ']'); | |
310 | if (end) { | |
311 | if (removebrackets) { | |
312 | *end = 0; | |
313 | memmove(start, start + 1, end - start); | |
314 | end++; | |
315 | } | |
316 | } else | |
317 | end = host; | |
318 | } else | |
319 | end = host; | |
320 | return end; | |
321 | } | |
322 | ||
5ba88448 YH |
323 | #define STR_(s) # s |
324 | #define STR(s) STR_(s) | |
2386d658 | 325 | |
72a534da ML |
326 | static void get_host_and_port(char **host, const char **port) |
327 | { | |
328 | char *colon, *end; | |
86ceb337 | 329 | end = host_end(host, 1); |
72a534da | 330 | colon = strchr(end, ':'); |
72a534da | 331 | if (colon) { |
86ceb337 TB |
332 | long portnr = strtol(colon + 1, &end, 10); |
333 | if (end != colon + 1 && *end == '\0' && 0 <= portnr && portnr < 65536) { | |
334 | *colon = 0; | |
335 | *port = colon + 1; | |
6b6c5f7a TB |
336 | } else if (!colon[1]) { |
337 | *colon = 0; | |
86ceb337 | 338 | } |
72a534da ML |
339 | } |
340 | } | |
341 | ||
e47a8583 EW |
342 | static void enable_keepalive(int sockfd) |
343 | { | |
344 | int ka = 1; | |
345 | ||
346 | if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, &ka, sizeof(ka)) < 0) | |
347 | fprintf(stderr, "unable to set SO_KEEPALIVE on socket: %s\n", | |
348 | strerror(errno)); | |
349 | } | |
350 | ||
49744d63 | 351 | #ifndef NO_IPV6 |
4c505f71 | 352 | |
ba505322 AR |
353 | static const char *ai_name(const struct addrinfo *ai) |
354 | { | |
785a9857 BK |
355 | static char addr[NI_MAXHOST]; |
356 | if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0, | |
357 | NI_NUMERICHOST) != 0) | |
5096d490 | 358 | xsnprintf(addr, sizeof(addr), "(unknown)"); |
785a9857 | 359 | |
ba505322 AR |
360 | return addr; |
361 | } | |
362 | ||
5ad312be JL |
363 | /* |
364 | * Returns a connected socket() fd, or else die()s. | |
365 | */ | |
7841ce79 | 366 | static int git_tcp_connect_sock(char *host, int flags) |
2386d658 | 367 | { |
63a995b6 DZ |
368 | struct strbuf error_message = STRBUF_INIT; |
369 | int sockfd = -1; | |
554fe20d | 370 | const char *port = STR(DEFAULT_GIT_PORT); |
5ba88448 YH |
371 | struct addrinfo hints, *ai0, *ai; |
372 | int gai; | |
ba505322 | 373 | int cnt = 0; |
5ba88448 | 374 | |
72a534da ML |
375 | get_host_and_port(&host, &port); |
376 | if (!*port) | |
377 | port = "<none>"; | |
5ba88448 YH |
378 | |
379 | memset(&hints, 0, sizeof(hints)); | |
c915f11e EW |
380 | if (flags & CONNECT_IPV4) |
381 | hints.ai_family = AF_INET; | |
382 | else if (flags & CONNECT_IPV6) | |
383 | hints.ai_family = AF_INET6; | |
5ba88448 YH |
384 | hints.ai_socktype = SOCK_STREAM; |
385 | hints.ai_protocol = IPPROTO_TCP; | |
386 | ||
7841ce79 MT |
387 | if (flags & CONNECT_VERBOSE) |
388 | fprintf(stderr, "Looking up %s ... ", host); | |
389 | ||
5ba88448 YH |
390 | gai = getaddrinfo(host, port, &hints, &ai); |
391 | if (gai) | |
608d48b2 | 392 | die("Unable to look up %s (port %s) (%s)", host, port, gai_strerror(gai)); |
5ba88448 | 393 | |
7841ce79 MT |
394 | if (flags & CONNECT_VERBOSE) |
395 | fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port); | |
396 | ||
e08afecd | 397 | for (ai0 = ai; ai; ai = ai->ai_next, cnt++) { |
5ad312be JL |
398 | sockfd = socket(ai->ai_family, |
399 | ai->ai_socktype, ai->ai_protocol); | |
63a995b6 DZ |
400 | if ((sockfd < 0) || |
401 | (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0)) { | |
402 | strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n", | |
403 | host, cnt, ai_name(ai), strerror(errno)); | |
404 | if (0 <= sockfd) | |
405 | close(sockfd); | |
5ba88448 YH |
406 | sockfd = -1; |
407 | continue; | |
2386d658 | 408 | } |
ba505322 AR |
409 | if (flags & CONNECT_VERBOSE) |
410 | fprintf(stderr, "%s ", ai_name(ai)); | |
5ba88448 | 411 | break; |
2386d658 LT |
412 | } |
413 | ||
5ba88448 | 414 | freeaddrinfo(ai0); |
2386d658 | 415 | |
2386d658 | 416 | if (sockfd < 0) |
63a995b6 | 417 | die("unable to connect to %s:\n%s", host, error_message.buf); |
5ba88448 | 418 | |
e47a8583 EW |
419 | enable_keepalive(sockfd); |
420 | ||
7841ce79 MT |
421 | if (flags & CONNECT_VERBOSE) |
422 | fprintf(stderr, "done.\n"); | |
423 | ||
63a995b6 DZ |
424 | strbuf_release(&error_message); |
425 | ||
5ad312be | 426 | return sockfd; |
2386d658 LT |
427 | } |
428 | ||
49744d63 | 429 | #else /* NO_IPV6 */ |
4c505f71 | 430 | |
5ad312be JL |
431 | /* |
432 | * Returns a connected socket() fd, or else die()s. | |
433 | */ | |
7841ce79 | 434 | static int git_tcp_connect_sock(char *host, int flags) |
4c505f71 | 435 | { |
7203a2d1 EFL |
436 | struct strbuf error_message = STRBUF_INIT; |
437 | int sockfd = -1; | |
72a534da ML |
438 | const char *port = STR(DEFAULT_GIT_PORT); |
439 | char *ep; | |
4c505f71 PA |
440 | struct hostent *he; |
441 | struct sockaddr_in sa; | |
442 | char **ap; | |
443 | unsigned int nport; | |
ba505322 | 444 | int cnt; |
4c505f71 | 445 | |
72a534da | 446 | get_host_and_port(&host, &port); |
4c505f71 | 447 | |
7841ce79 MT |
448 | if (flags & CONNECT_VERBOSE) |
449 | fprintf(stderr, "Looking up %s ... ", host); | |
450 | ||
4c505f71 PA |
451 | he = gethostbyname(host); |
452 | if (!he) | |
453 | die("Unable to look up %s (%s)", host, hstrerror(h_errno)); | |
454 | nport = strtoul(port, &ep, 10); | |
455 | if ( ep == port || *ep ) { | |
456 | /* Not numeric */ | |
457 | struct servent *se = getservbyname(port,"tcp"); | |
458 | if ( !se ) | |
d7530708 | 459 | die("Unknown port %s", port); |
4c505f71 PA |
460 | nport = se->s_port; |
461 | } | |
462 | ||
7841ce79 MT |
463 | if (flags & CONNECT_VERBOSE) |
464 | fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port); | |
465 | ||
ba505322 | 466 | for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) { |
4c505f71 PA |
467 | memset(&sa, 0, sizeof sa); |
468 | sa.sin_family = he->h_addrtype; | |
6573faff | 469 | sa.sin_port = htons(nport); |
c6164218 | 470 | memcpy(&sa.sin_addr, *ap, he->h_length); |
4c505f71 | 471 | |
7203a2d1 EFL |
472 | sockfd = socket(he->h_addrtype, SOCK_STREAM, 0); |
473 | if ((sockfd < 0) || | |
474 | connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) { | |
475 | strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n", | |
ba505322 AR |
476 | host, |
477 | cnt, | |
478 | inet_ntoa(*(struct in_addr *)&sa.sin_addr), | |
7203a2d1 EFL |
479 | strerror(errno)); |
480 | if (0 <= sockfd) | |
481 | close(sockfd); | |
4c505f71 PA |
482 | sockfd = -1; |
483 | continue; | |
484 | } | |
ba505322 AR |
485 | if (flags & CONNECT_VERBOSE) |
486 | fprintf(stderr, "%s ", | |
487 | inet_ntoa(*(struct in_addr *)&sa.sin_addr)); | |
4c505f71 PA |
488 | break; |
489 | } | |
490 | ||
491 | if (sockfd < 0) | |
7203a2d1 | 492 | die("unable to connect to %s:\n%s", host, error_message.buf); |
4c505f71 | 493 | |
e47a8583 EW |
494 | enable_keepalive(sockfd); |
495 | ||
7841ce79 MT |
496 | if (flags & CONNECT_VERBOSE) |
497 | fprintf(stderr, "done.\n"); | |
498 | ||
5ad312be JL |
499 | return sockfd; |
500 | } | |
501 | ||
502 | #endif /* NO_IPV6 */ | |
503 | ||
504 | ||
7841ce79 | 505 | static void git_tcp_connect(int fd[2], char *host, int flags) |
5ad312be | 506 | { |
7841ce79 | 507 | int sockfd = git_tcp_connect_sock(host, flags); |
5ad312be | 508 | |
4c505f71 | 509 | fd[0] = sockfd; |
ec587fde | 510 | fd[1] = dup(sockfd); |
4c505f71 PA |
511 | } |
512 | ||
4c505f71 | 513 | |
96f1e58f | 514 | static char *git_proxy_command; |
f8014776 | 515 | |
ef90d6d4 JS |
516 | static int git_proxy_command_options(const char *var, const char *value, |
517 | void *cb) | |
f8014776 | 518 | { |
e814bc4d | 519 | if (!strcmp(var, "core.gitproxy")) { |
c3df8568 YH |
520 | const char *for_pos; |
521 | int matchlen = -1; | |
522 | int hostlen; | |
15112c95 EFL |
523 | const char *rhost_name = cb; |
524 | int rhost_len = strlen(rhost_name); | |
c3df8568 | 525 | |
e814bc4d | 526 | if (git_proxy_command) |
f8014776 | 527 | return 0; |
c64b9ad0 JH |
528 | if (!value) |
529 | return config_error_nonbool(var); | |
e814bc4d JH |
530 | /* [core] |
531 | * ;# matches www.kernel.org as well | |
532 | * gitproxy = netcatter-1 for kernel.org | |
533 | * gitproxy = netcatter-2 for sample.xz | |
534 | * gitproxy = netcatter-default | |
535 | */ | |
c3df8568 | 536 | for_pos = strstr(value, " for "); |
e814bc4d JH |
537 | if (!for_pos) |
538 | /* matches everybody */ | |
539 | matchlen = strlen(value); | |
540 | else { | |
541 | hostlen = strlen(for_pos + 5); | |
542 | if (rhost_len < hostlen) | |
543 | matchlen = -1; | |
544 | else if (!strncmp(for_pos + 5, | |
545 | rhost_name + rhost_len - hostlen, | |
546 | hostlen) && | |
547 | ((rhost_len == hostlen) || | |
548 | rhost_name[rhost_len - hostlen -1] == '.')) | |
549 | matchlen = for_pos - value; | |
550 | else | |
551 | matchlen = -1; | |
552 | } | |
553 | if (0 <= matchlen) { | |
554 | /* core.gitproxy = none for kernel.org */ | |
a6080a0a | 555 | if (matchlen == 4 && |
e814bc4d JH |
556 | !memcmp(value, "none", 4)) |
557 | matchlen = 0; | |
182af834 | 558 | git_proxy_command = xmemdupz(value, matchlen); |
f8014776 | 559 | } |
e814bc4d | 560 | return 0; |
f8014776 PC |
561 | } |
562 | ||
ef90d6d4 | 563 | return git_default_config(var, value, cb); |
f8014776 PC |
564 | } |
565 | ||
e814bc4d | 566 | static int git_use_proxy(const char *host) |
f8014776 PC |
567 | { |
568 | git_proxy_command = getenv("GIT_PROXY_COMMAND"); | |
15112c95 | 569 | git_config(git_proxy_command_options, (void*)host); |
e814bc4d | 570 | return (git_proxy_command && *git_proxy_command); |
f8014776 PC |
571 | } |
572 | ||
5cbf8246 | 573 | static struct child_process *git_proxy_connect(int fd[2], char *host) |
f8014776 | 574 | { |
554fe20d | 575 | const char *port = STR(DEFAULT_GIT_PORT); |
5cbf8246 | 576 | struct child_process *proxy; |
f8014776 | 577 | |
72a534da | 578 | get_host_and_port(&host, &port); |
f8014776 | 579 | |
483bbd4e RS |
580 | proxy = xmalloc(sizeof(*proxy)); |
581 | child_process_init(proxy); | |
1823bea1 JK |
582 | argv_array_push(&proxy->args, git_proxy_command); |
583 | argv_array_push(&proxy->args, host); | |
584 | argv_array_push(&proxy->args, port); | |
5cbf8246 JK |
585 | proxy->in = -1; |
586 | proxy->out = -1; | |
587 | if (start_command(proxy)) | |
1823bea1 | 588 | die("cannot start proxy %s", git_proxy_command); |
5cbf8246 JK |
589 | fd[0] = proxy->out; /* read from proxy stdout */ |
590 | fd[1] = proxy->in; /* write to proxy stdin */ | |
591 | return proxy; | |
f8014776 PC |
592 | } |
593 | ||
86ceb337 | 594 | static char *get_port(char *host) |
2e776665 LT |
595 | { |
596 | char *end; | |
86ceb337 TB |
597 | char *p = strchr(host, ':'); |
598 | ||
2e776665 | 599 | if (p) { |
8f148253 RS |
600 | long port = strtol(p + 1, &end, 10); |
601 | if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) { | |
86ceb337 TB |
602 | *p = '\0'; |
603 | return p+1; | |
2e776665 LT |
604 | } |
605 | } | |
606 | ||
607 | return NULL; | |
608 | } | |
609 | ||
f7192598 | 610 | /* |
cabc3c12 JS |
611 | * Extract protocol and relevant parts from the specified connection URL. |
612 | * The caller must free() the returned strings. | |
f7192598 | 613 | */ |
cabc3c12 | 614 | static enum protocol parse_connect_url(const char *url_orig, char **ret_host, |
83b05875 | 615 | char **ret_path) |
f7192598 | 616 | { |
9d2e9420 | 617 | char *url; |
8e76bf3f | 618 | char *host, *path; |
356bece0 | 619 | char *end; |
c59ab2e5 | 620 | int separator = '/'; |
faea9ccb | 621 | enum protocol protocol = PROTO_LOCAL; |
f0b7367c | 622 | |
9d2e9420 JK |
623 | if (is_url(url_orig)) |
624 | url = url_decode(url_orig); | |
625 | else | |
626 | url = xstrdup(url_orig); | |
627 | ||
faea9ccb | 628 | host = strstr(url, "://"); |
eeefa7c9 | 629 | if (host) { |
faea9ccb AE |
630 | *host = '\0'; |
631 | protocol = get_protocol(url); | |
632 | host += 3; | |
356bece0 | 633 | } else { |
f7192598 | 634 | host = url; |
c59ab2e5 TB |
635 | if (!url_is_local_not_ssh(url)) { |
636 | protocol = PROTO_SSH; | |
637 | separator = ':'; | |
638 | } | |
356bece0 YH |
639 | } |
640 | ||
9aa5053d | 641 | /* |
83b05875 TB |
642 | * Don't do destructive transforms as protocol code does |
643 | * '[]' unwrapping in get_host_and_port() | |
9aa5053d | 644 | */ |
86ceb337 | 645 | end = host_end(&host, 0); |
356bece0 | 646 | |
c59ab2e5 | 647 | if (protocol == PROTO_LOCAL) |
72a4f4b6 | 648 | path = end; |
c59ab2e5 TB |
649 | else if (protocol == PROTO_FILE && has_dos_drive_prefix(end)) |
650 | path = end; /* "file://$(pwd)" may be "file://C:/projects/repo" */ | |
651 | else | |
652 | path = strchr(end, separator); | |
2386d658 | 653 | |
faea9ccb AE |
654 | if (!path || !*path) |
655 | die("No path specified. See 'man git-pull' for valid url syntax"); | |
656 | ||
657 | /* | |
658 | * null-terminate hostname and point path to ~ for URL's like this: | |
659 | * ssh://host.xz/~user/repo | |
660 | */ | |
c59ab2e5 TB |
661 | |
662 | end = path; /* Need to \0 terminate host here */ | |
663 | if (separator == ':') | |
664 | path++; /* path starts after ':' */ | |
665 | if (protocol == PROTO_GIT || protocol == PROTO_SSH) { | |
faea9ccb AE |
666 | if (path[1] == '~') |
667 | path++; | |
faea9ccb AE |
668 | } |
669 | ||
c59ab2e5 TB |
670 | path = xstrdup(path); |
671 | *end = '\0'; | |
672 | ||
cabc3c12 | 673 | *ret_host = xstrdup(host); |
c59ab2e5 | 674 | *ret_path = path; |
cabc3c12 JS |
675 | free(url); |
676 | return protocol; | |
677 | } | |
678 | ||
d3180279 | 679 | static struct child_process no_fork = CHILD_PROCESS_INIT; |
cabc3c12 | 680 | |
3c8ede3f NTND |
681 | static const char *get_ssh_command(void) |
682 | { | |
683 | const char *ssh; | |
684 | ||
685 | if ((ssh = getenv("GIT_SSH_COMMAND"))) | |
686 | return ssh; | |
687 | ||
688 | if (!git_config_get_string_const("core.sshcommand", &ssh)) | |
689 | return ssh; | |
690 | ||
691 | return NULL; | |
692 | } | |
693 | ||
cabc3c12 JS |
694 | /* |
695 | * This returns a dummy child_process if the transport protocol does not | |
696 | * need fork(2), or a struct child_process object if it does. Once done, | |
697 | * finish the connection with finish_connect() with the value returned from | |
698 | * this function (it is safe to call finish_connect() with NULL to support | |
699 | * the former case). | |
700 | * | |
701 | * If it returns, the connect is successful; it just dies on errors (this | |
702 | * will hopefully be changed in a libification effort, to return NULL when | |
703 | * the connection failed). | |
704 | */ | |
705 | struct child_process *git_connect(int fd[2], const char *url, | |
706 | const char *prog, int flags) | |
707 | { | |
a2036d7e | 708 | char *hostandport, *path; |
cabc3c12 JS |
709 | struct child_process *conn = &no_fork; |
710 | enum protocol protocol; | |
cabc3c12 JS |
711 | struct strbuf cmd = STRBUF_INIT; |
712 | ||
713 | /* Without this we cannot rely on waitpid() to tell | |
714 | * what happened to our children. | |
2e776665 | 715 | */ |
cabc3c12 | 716 | signal(SIGCHLD, SIG_DFL); |
2e776665 | 717 | |
a2036d7e | 718 | protocol = parse_connect_url(url, &hostandport, &path); |
3f55ccab | 719 | if ((flags & CONNECT_DIAG_URL) && (protocol != PROTO_SSH)) { |
5610b7c0 TB |
720 | printf("Diag: url=%s\n", url ? url : "NULL"); |
721 | printf("Diag: protocol=%s\n", prot_name(protocol)); | |
a2036d7e | 722 | printf("Diag: hostandport=%s\n", hostandport ? hostandport : "NULL"); |
5610b7c0 | 723 | printf("Diag: path=%s\n", path ? path : "NULL"); |
a2036d7e TB |
724 | conn = NULL; |
725 | } else if (protocol == PROTO_GIT) { | |
94bc83c5 JK |
726 | /* |
727 | * Set up virtual host information based on where we will | |
728 | * connect, unless the user has overridden us in | |
729 | * the environment. | |
730 | */ | |
731 | char *target_host = getenv("GIT_OVERRIDE_VIRTUAL_HOST"); | |
732 | if (target_host) | |
733 | target_host = xstrdup(target_host); | |
734 | else | |
735 | target_host = xstrdup(hostandport); | |
736 | ||
a5adaced JK |
737 | transport_check_allowed("git"); |
738 | ||
5ad312be JL |
739 | /* These underlying connection commands die() if they |
740 | * cannot connect. | |
741 | */ | |
a2036d7e TB |
742 | if (git_use_proxy(hostandport)) |
743 | conn = git_proxy_connect(fd, hostandport); | |
da2a95b2 | 744 | else |
a2036d7e | 745 | git_tcp_connect(fd, hostandport, flags); |
5ad312be JL |
746 | /* |
747 | * Separate original protocol components prog and path | |
73bb33a9 SP |
748 | * from extended host header with a NUL byte. |
749 | * | |
750 | * Note: Do not add any other headers here! Doing so | |
751 | * will cause older git-daemon servers to crash. | |
5ad312be | 752 | */ |
81c634e9 | 753 | packet_write_fmt(fd[1], |
5ad312be JL |
754 | "%s %s%chost=%s%c", |
755 | prog, path, 0, | |
756 | target_host, 0); | |
757 | free(target_host); | |
a2036d7e | 758 | } else { |
483bbd4e RS |
759 | conn = xmalloc(sizeof(*conn)); |
760 | child_process_init(conn); | |
a2036d7e TB |
761 | |
762 | strbuf_addstr(&cmd, prog); | |
763 | strbuf_addch(&cmd, ' '); | |
764 | sq_quote_buf(&cmd, path); | |
765 | ||
aab40438 JK |
766 | /* remove repo-local variables from the environment */ |
767 | conn->env = local_repo_env; | |
a48b409f | 768 | conn->use_shell = 1; |
a2036d7e | 769 | conn->in = conn->out = -1; |
a2036d7e | 770 | if (protocol == PROTO_SSH) { |
39942766 | 771 | const char *ssh; |
a48b409f | 772 | int putty = 0, tortoiseplink = 0; |
a2036d7e TB |
773 | char *ssh_host = hostandport; |
774 | const char *port = NULL; | |
a5adaced | 775 | transport_check_allowed("ssh"); |
a2036d7e | 776 | get_host_and_port(&ssh_host, &port); |
a2036d7e | 777 | |
86ceb337 TB |
778 | if (!port) |
779 | port = get_port(ssh_host); | |
42da4840 | 780 | |
3f55ccab TB |
781 | if (flags & CONNECT_DIAG_URL) { |
782 | printf("Diag: url=%s\n", url ? url : "NULL"); | |
783 | printf("Diag: protocol=%s\n", prot_name(protocol)); | |
784 | printf("Diag: userandhost=%s\n", ssh_host ? ssh_host : "NULL"); | |
785 | printf("Diag: port=%s\n", port ? port : "NONE"); | |
786 | printf("Diag: path=%s\n", path ? path : "NULL"); | |
a2036d7e | 787 | |
3f55ccab TB |
788 | free(hostandport); |
789 | free(path); | |
04f20c04 | 790 | free(conn); |
3f55ccab | 791 | return NULL; |
37ee646e | 792 | } |
793 | ||
3c8ede3f | 794 | ssh = get_ssh_command(); |
a48b409f | 795 | if (!ssh) { |
baaf2337 | 796 | const char *base; |
797 | char *ssh_dup; | |
798 | ||
a48b409f JK |
799 | /* |
800 | * GIT_SSH is the no-shell version of | |
801 | * GIT_SSH_COMMAND (and must remain so for | |
802 | * historical compatibility). | |
803 | */ | |
804 | conn->use_shell = 0; | |
805 | ||
37ee646e | 806 | ssh = getenv("GIT_SSH"); |
807 | if (!ssh) | |
808 | ssh = "ssh"; | |
baaf2337 | 809 | |
810 | ssh_dup = xstrdup(ssh); | |
811 | base = basename(ssh_dup); | |
812 | ||
813 | tortoiseplink = !strcasecmp(base, "tortoiseplink") || | |
814 | !strcasecmp(base, "tortoiseplink.exe"); | |
a48b409f JK |
815 | putty = tortoiseplink || |
816 | !strcasecmp(base, "plink") || | |
817 | !strcasecmp(base, "plink.exe"); | |
baaf2337 | 818 | |
819 | free(ssh_dup); | |
37ee646e | 820 | } |
821 | ||
822 | argv_array_push(&conn->args, ssh); | |
c915f11e EW |
823 | if (flags & CONNECT_IPV4) |
824 | argv_array_push(&conn->args, "-4"); | |
825 | else if (flags & CONNECT_IPV6) | |
826 | argv_array_push(&conn->args, "-6"); | |
baaf2337 | 827 | if (tortoiseplink) |
37ee646e | 828 | argv_array_push(&conn->args, "-batch"); |
829 | if (port) { | |
830 | /* P is for PuTTY, p is for OpenSSH */ | |
831 | argv_array_push(&conn->args, putty ? "-P" : "-p"); | |
832 | argv_array_push(&conn->args, port); | |
a2036d7e | 833 | } |
37ee646e | 834 | argv_array_push(&conn->args, ssh_host); |
c049b61d | 835 | } else { |
a5adaced | 836 | transport_check_allowed("file"); |
4852f723 | 837 | } |
1823bea1 | 838 | argv_array_push(&conn->args, cmd.buf); |
f364cb88 | 839 | |
a2036d7e TB |
840 | if (start_command(conn)) |
841 | die("unable to fork"); | |
f364cb88 | 842 | |
a2036d7e TB |
843 | fd[0] = conn->out; /* read from child's stdout */ |
844 | fd[1] = conn->in; /* write to child's stdin */ | |
845 | strbuf_release(&cmd); | |
846 | } | |
847 | free(hostandport); | |
cabc3c12 | 848 | free(path); |
98158e9c | 849 | return conn; |
f7192598 LT |
850 | } |
851 | ||
7ffe853b JK |
852 | int git_connection_is_socket(struct child_process *conn) |
853 | { | |
854 | return conn == &no_fork; | |
855 | } | |
856 | ||
98158e9c | 857 | int finish_connect(struct child_process *conn) |
f7192598 | 858 | { |
f364cb88 | 859 | int code; |
7ffe853b | 860 | if (!conn || git_connection_is_socket(conn)) |
f42a5c4e FBH |
861 | return 0; |
862 | ||
f364cb88 | 863 | code = finish_command(conn); |
98158e9c | 864 | free(conn); |
f364cb88 | 865 | return code; |
f7192598 | 866 | } |