]>
Commit | Line | Data |
---|---|---|
731043fd | 1 | #include "git-compat-util.h" |
f7192598 | 2 | #include "cache.h" |
41cb7488 | 3 | #include "pkt-line.h" |
b10d0ec7 | 4 | #include "quote.h" |
6abf5c0c | 5 | #include "refs.h" |
15a1c012 | 6 | #include "run-command.h" |
6b62816c | 7 | #include "remote.h" |
9d2e9420 | 8 | #include "url.h" |
f7192598 | 9 | |
96f1e58f | 10 | static char *server_capabilities; |
211b5f9e | 11 | |
2718ff09 LT |
12 | static int check_ref(const char *name, int len, unsigned int flags) |
13 | { | |
14 | if (!flags) | |
15 | return 1; | |
16 | ||
c41e20b3 | 17 | if (len < 5 || memcmp(name, "refs/", 5)) |
2718ff09 LT |
18 | return 0; |
19 | ||
20 | /* Skip the "refs/" part */ | |
21 | name += 5; | |
22 | len -= 5; | |
23 | ||
24 | /* REF_NORMAL means that we don't want the magic fake tag refs */ | |
25 | if ((flags & REF_NORMAL) && check_ref_format(name) < 0) | |
26 | return 0; | |
27 | ||
28 | /* REF_HEADS means that we want regular branch heads */ | |
29 | if ((flags & REF_HEADS) && !memcmp(name, "heads/", 6)) | |
30 | return 1; | |
31 | ||
32 | /* REF_TAGS means that we want tags */ | |
33 | if ((flags & REF_TAGS) && !memcmp(name, "tags/", 5)) | |
34 | return 1; | |
35 | ||
36 | /* All type bits clear means that we are ok with anything */ | |
37 | return !(flags & ~REF_NORMAL); | |
38 | } | |
39 | ||
4577370e DB |
40 | int check_ref_type(const struct ref *ref, int flags) |
41 | { | |
42 | return check_ref(ref->name, strlen(ref->name), flags); | |
43 | } | |
44 | ||
40c155ff JH |
45 | static void add_extra_have(struct extra_have_objects *extra, unsigned char *sha1) |
46 | { | |
47 | ALLOC_GROW(extra->array, extra->nr + 1, extra->alloc); | |
48 | hashcpy(&(extra->array[extra->nr][0]), sha1); | |
49 | extra->nr++; | |
50 | } | |
51 | ||
d1c133f5 LT |
52 | /* |
53 | * Read all the refs from the other end | |
54 | */ | |
1a7141ff | 55 | struct ref **get_remote_heads(int in, struct ref **list, |
2718ff09 | 56 | int nr_match, char **match, |
40c155ff JH |
57 | unsigned int flags, |
58 | struct extra_have_objects *extra_have) | |
d1c133f5 LT |
59 | { |
60 | *list = NULL; | |
61 | for (;;) { | |
62 | struct ref *ref; | |
63 | unsigned char old_sha1[20]; | |
64 | static char buffer[1000]; | |
65 | char *name; | |
211b5f9e | 66 | int len, name_len; |
d1c133f5 LT |
67 | |
68 | len = packet_read_line(in, buffer, sizeof(buffer)); | |
69 | if (!len) | |
70 | break; | |
71 | if (buffer[len-1] == '\n') | |
72 | buffer[--len] = 0; | |
73 | ||
a8073289 TPW |
74 | if (len > 4 && !prefixcmp(buffer, "ERR ")) |
75 | die("remote error: %s", buffer + 4); | |
76 | ||
d1c133f5 LT |
77 | if (len < 42 || get_sha1_hex(buffer, old_sha1) || buffer[40] != ' ') |
78 | die("protocol error: expected sha/ref, got '%s'", buffer); | |
79 | name = buffer + 41; | |
1a7141ff | 80 | |
211b5f9e JS |
81 | name_len = strlen(name); |
82 | if (len != name_len + 41) { | |
8e0f7003 | 83 | free(server_capabilities); |
9befac47 | 84 | server_capabilities = xstrdup(name + name_len + 1); |
211b5f9e JS |
85 | } |
86 | ||
40c155ff JH |
87 | if (extra_have && |
88 | name_len == 5 && !memcmp(".have", name, 5)) { | |
89 | add_extra_have(extra_have, old_sha1); | |
90 | continue; | |
91 | } | |
92 | ||
2718ff09 | 93 | if (!check_ref(name, name_len, flags)) |
cfee10a7 | 94 | continue; |
d1c133f5 LT |
95 | if (nr_match && !path_match(name, nr_match, match)) |
96 | continue; | |
59c69c0c | 97 | ref = alloc_ref(buffer + 41); |
e702496e | 98 | hashcpy(ref->old_sha1, old_sha1); |
d1c133f5 LT |
99 | *list = ref; |
100 | list = &ref->next; | |
101 | } | |
102 | return list; | |
103 | } | |
104 | ||
211b5f9e JS |
105 | int server_supports(const char *feature) |
106 | { | |
1f5881bb JS |
107 | return server_capabilities && |
108 | strstr(server_capabilities, feature) != NULL; | |
211b5f9e JS |
109 | } |
110 | ||
013e7c7f LT |
111 | int path_match(const char *path, int nr, char **match) |
112 | { | |
113 | int i; | |
114 | int pathlen = strlen(path); | |
115 | ||
116 | for (i = 0; i < nr; i++) { | |
117 | char *s = match[i]; | |
118 | int len = strlen(s); | |
119 | ||
120 | if (!len || len > pathlen) | |
121 | continue; | |
122 | if (memcmp(path + pathlen - len, s, len)) | |
123 | continue; | |
124 | if (pathlen > len && path[pathlen - len - 1] != '/') | |
125 | continue; | |
126 | *s = 0; | |
9546010b | 127 | return (i + 1); |
013e7c7f LT |
128 | } |
129 | return 0; | |
130 | } | |
131 | ||
2386d658 LT |
132 | enum protocol { |
133 | PROTO_LOCAL = 1, | |
134 | PROTO_SSH, | |
4b05548f | 135 | PROTO_GIT |
2386d658 LT |
136 | }; |
137 | ||
138 | static enum protocol get_protocol(const char *name) | |
139 | { | |
140 | if (!strcmp(name, "ssh")) | |
141 | return PROTO_SSH; | |
142 | if (!strcmp(name, "git")) | |
143 | return PROTO_GIT; | |
c05186cc LT |
144 | if (!strcmp(name, "git+ssh")) |
145 | return PROTO_SSH; | |
146 | if (!strcmp(name, "ssh+git")) | |
147 | return PROTO_SSH; | |
72a4f4b6 LT |
148 | if (!strcmp(name, "file")) |
149 | return PROTO_LOCAL; | |
2386d658 LT |
150 | die("I don't handle protocol '%s'", name); |
151 | } | |
152 | ||
5ba88448 YH |
153 | #define STR_(s) # s |
154 | #define STR(s) STR_(s) | |
2386d658 | 155 | |
72a534da ML |
156 | static void get_host_and_port(char **host, const char **port) |
157 | { | |
158 | char *colon, *end; | |
159 | ||
160 | if (*host[0] == '[') { | |
161 | end = strchr(*host + 1, ']'); | |
162 | if (end) { | |
163 | *end = 0; | |
164 | end++; | |
165 | (*host)++; | |
166 | } else | |
167 | end = *host; | |
168 | } else | |
169 | end = *host; | |
170 | colon = strchr(end, ':'); | |
171 | ||
172 | if (colon) { | |
173 | *colon = 0; | |
174 | *port = colon + 1; | |
175 | } | |
176 | } | |
177 | ||
49744d63 | 178 | #ifndef NO_IPV6 |
4c505f71 | 179 | |
ba505322 AR |
180 | static const char *ai_name(const struct addrinfo *ai) |
181 | { | |
785a9857 BK |
182 | static char addr[NI_MAXHOST]; |
183 | if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0, | |
184 | NI_NUMERICHOST) != 0) | |
ba505322 | 185 | strcpy(addr, "(unknown)"); |
785a9857 | 186 | |
ba505322 AR |
187 | return addr; |
188 | } | |
189 | ||
5ad312be JL |
190 | /* |
191 | * Returns a connected socket() fd, or else die()s. | |
192 | */ | |
7841ce79 | 193 | static int git_tcp_connect_sock(char *host, int flags) |
2386d658 | 194 | { |
63a995b6 DZ |
195 | struct strbuf error_message = STRBUF_INIT; |
196 | int sockfd = -1; | |
554fe20d | 197 | const char *port = STR(DEFAULT_GIT_PORT); |
5ba88448 YH |
198 | struct addrinfo hints, *ai0, *ai; |
199 | int gai; | |
ba505322 | 200 | int cnt = 0; |
5ba88448 | 201 | |
72a534da ML |
202 | get_host_and_port(&host, &port); |
203 | if (!*port) | |
204 | port = "<none>"; | |
5ba88448 YH |
205 | |
206 | memset(&hints, 0, sizeof(hints)); | |
207 | hints.ai_socktype = SOCK_STREAM; | |
208 | hints.ai_protocol = IPPROTO_TCP; | |
209 | ||
7841ce79 MT |
210 | if (flags & CONNECT_VERBOSE) |
211 | fprintf(stderr, "Looking up %s ... ", host); | |
212 | ||
5ba88448 YH |
213 | gai = getaddrinfo(host, port, &hints, &ai); |
214 | if (gai) | |
608d48b2 | 215 | die("Unable to look up %s (port %s) (%s)", host, port, gai_strerror(gai)); |
5ba88448 | 216 | |
7841ce79 MT |
217 | if (flags & CONNECT_VERBOSE) |
218 | fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port); | |
219 | ||
e08afecd | 220 | for (ai0 = ai; ai; ai = ai->ai_next, cnt++) { |
5ad312be JL |
221 | sockfd = socket(ai->ai_family, |
222 | ai->ai_socktype, ai->ai_protocol); | |
63a995b6 DZ |
223 | if ((sockfd < 0) || |
224 | (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0)) { | |
225 | strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n", | |
226 | host, cnt, ai_name(ai), strerror(errno)); | |
227 | if (0 <= sockfd) | |
228 | close(sockfd); | |
5ba88448 YH |
229 | sockfd = -1; |
230 | continue; | |
2386d658 | 231 | } |
ba505322 AR |
232 | if (flags & CONNECT_VERBOSE) |
233 | fprintf(stderr, "%s ", ai_name(ai)); | |
5ba88448 | 234 | break; |
2386d658 LT |
235 | } |
236 | ||
5ba88448 | 237 | freeaddrinfo(ai0); |
2386d658 | 238 | |
2386d658 | 239 | if (sockfd < 0) |
63a995b6 | 240 | die("unable to connect to %s:\n%s", host, error_message.buf); |
5ba88448 | 241 | |
7841ce79 MT |
242 | if (flags & CONNECT_VERBOSE) |
243 | fprintf(stderr, "done.\n"); | |
244 | ||
63a995b6 DZ |
245 | strbuf_release(&error_message); |
246 | ||
5ad312be | 247 | return sockfd; |
2386d658 LT |
248 | } |
249 | ||
49744d63 | 250 | #else /* NO_IPV6 */ |
4c505f71 | 251 | |
5ad312be JL |
252 | /* |
253 | * Returns a connected socket() fd, or else die()s. | |
254 | */ | |
7841ce79 | 255 | static int git_tcp_connect_sock(char *host, int flags) |
4c505f71 | 256 | { |
7203a2d1 EFL |
257 | struct strbuf error_message = STRBUF_INIT; |
258 | int sockfd = -1; | |
72a534da ML |
259 | const char *port = STR(DEFAULT_GIT_PORT); |
260 | char *ep; | |
4c505f71 PA |
261 | struct hostent *he; |
262 | struct sockaddr_in sa; | |
263 | char **ap; | |
264 | unsigned int nport; | |
ba505322 | 265 | int cnt; |
4c505f71 | 266 | |
72a534da | 267 | get_host_and_port(&host, &port); |
4c505f71 | 268 | |
7841ce79 MT |
269 | if (flags & CONNECT_VERBOSE) |
270 | fprintf(stderr, "Looking up %s ... ", host); | |
271 | ||
4c505f71 PA |
272 | he = gethostbyname(host); |
273 | if (!he) | |
274 | die("Unable to look up %s (%s)", host, hstrerror(h_errno)); | |
275 | nport = strtoul(port, &ep, 10); | |
276 | if ( ep == port || *ep ) { | |
277 | /* Not numeric */ | |
278 | struct servent *se = getservbyname(port,"tcp"); | |
279 | if ( !se ) | |
d7530708 | 280 | die("Unknown port %s", port); |
4c505f71 PA |
281 | nport = se->s_port; |
282 | } | |
283 | ||
7841ce79 MT |
284 | if (flags & CONNECT_VERBOSE) |
285 | fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port); | |
286 | ||
ba505322 | 287 | for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) { |
4c505f71 PA |
288 | memset(&sa, 0, sizeof sa); |
289 | sa.sin_family = he->h_addrtype; | |
6573faff | 290 | sa.sin_port = htons(nport); |
c6164218 | 291 | memcpy(&sa.sin_addr, *ap, he->h_length); |
4c505f71 | 292 | |
7203a2d1 EFL |
293 | sockfd = socket(he->h_addrtype, SOCK_STREAM, 0); |
294 | if ((sockfd < 0) || | |
295 | connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) { | |
296 | strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n", | |
ba505322 AR |
297 | host, |
298 | cnt, | |
299 | inet_ntoa(*(struct in_addr *)&sa.sin_addr), | |
7203a2d1 EFL |
300 | strerror(errno)); |
301 | if (0 <= sockfd) | |
302 | close(sockfd); | |
4c505f71 PA |
303 | sockfd = -1; |
304 | continue; | |
305 | } | |
ba505322 AR |
306 | if (flags & CONNECT_VERBOSE) |
307 | fprintf(stderr, "%s ", | |
308 | inet_ntoa(*(struct in_addr *)&sa.sin_addr)); | |
4c505f71 PA |
309 | break; |
310 | } | |
311 | ||
312 | if (sockfd < 0) | |
7203a2d1 | 313 | die("unable to connect to %s:\n%s", host, error_message.buf); |
4c505f71 | 314 | |
7841ce79 MT |
315 | if (flags & CONNECT_VERBOSE) |
316 | fprintf(stderr, "done.\n"); | |
317 | ||
5ad312be JL |
318 | return sockfd; |
319 | } | |
320 | ||
321 | #endif /* NO_IPV6 */ | |
322 | ||
323 | ||
7841ce79 | 324 | static void git_tcp_connect(int fd[2], char *host, int flags) |
5ad312be | 325 | { |
7841ce79 | 326 | int sockfd = git_tcp_connect_sock(host, flags); |
5ad312be | 327 | |
4c505f71 | 328 | fd[0] = sockfd; |
ec587fde | 329 | fd[1] = dup(sockfd); |
4c505f71 PA |
330 | } |
331 | ||
4c505f71 | 332 | |
96f1e58f | 333 | static char *git_proxy_command; |
f8014776 | 334 | |
ef90d6d4 JS |
335 | static int git_proxy_command_options(const char *var, const char *value, |
336 | void *cb) | |
f8014776 | 337 | { |
e814bc4d | 338 | if (!strcmp(var, "core.gitproxy")) { |
c3df8568 YH |
339 | const char *for_pos; |
340 | int matchlen = -1; | |
341 | int hostlen; | |
15112c95 EFL |
342 | const char *rhost_name = cb; |
343 | int rhost_len = strlen(rhost_name); | |
c3df8568 | 344 | |
e814bc4d | 345 | if (git_proxy_command) |
f8014776 | 346 | return 0; |
c64b9ad0 JH |
347 | if (!value) |
348 | return config_error_nonbool(var); | |
e814bc4d JH |
349 | /* [core] |
350 | * ;# matches www.kernel.org as well | |
351 | * gitproxy = netcatter-1 for kernel.org | |
352 | * gitproxy = netcatter-2 for sample.xz | |
353 | * gitproxy = netcatter-default | |
354 | */ | |
c3df8568 | 355 | for_pos = strstr(value, " for "); |
e814bc4d JH |
356 | if (!for_pos) |
357 | /* matches everybody */ | |
358 | matchlen = strlen(value); | |
359 | else { | |
360 | hostlen = strlen(for_pos + 5); | |
361 | if (rhost_len < hostlen) | |
362 | matchlen = -1; | |
363 | else if (!strncmp(for_pos + 5, | |
364 | rhost_name + rhost_len - hostlen, | |
365 | hostlen) && | |
366 | ((rhost_len == hostlen) || | |
367 | rhost_name[rhost_len - hostlen -1] == '.')) | |
368 | matchlen = for_pos - value; | |
369 | else | |
370 | matchlen = -1; | |
371 | } | |
372 | if (0 <= matchlen) { | |
373 | /* core.gitproxy = none for kernel.org */ | |
a6080a0a | 374 | if (matchlen == 4 && |
e814bc4d JH |
375 | !memcmp(value, "none", 4)) |
376 | matchlen = 0; | |
182af834 | 377 | git_proxy_command = xmemdupz(value, matchlen); |
f8014776 | 378 | } |
e814bc4d | 379 | return 0; |
f8014776 PC |
380 | } |
381 | ||
ef90d6d4 | 382 | return git_default_config(var, value, cb); |
f8014776 PC |
383 | } |
384 | ||
e814bc4d | 385 | static int git_use_proxy(const char *host) |
f8014776 PC |
386 | { |
387 | git_proxy_command = getenv("GIT_PROXY_COMMAND"); | |
15112c95 | 388 | git_config(git_proxy_command_options, (void*)host); |
e814bc4d | 389 | return (git_proxy_command && *git_proxy_command); |
f8014776 PC |
390 | } |
391 | ||
5cbf8246 | 392 | static struct child_process *git_proxy_connect(int fd[2], char *host) |
f8014776 | 393 | { |
554fe20d | 394 | const char *port = STR(DEFAULT_GIT_PORT); |
5cbf8246 JK |
395 | const char **argv; |
396 | struct child_process *proxy; | |
f8014776 | 397 | |
72a534da | 398 | get_host_and_port(&host, &port); |
f8014776 | 399 | |
5cbf8246 | 400 | argv = xmalloc(sizeof(*argv) * 4); |
15a1c012 SP |
401 | argv[0] = git_proxy_command; |
402 | argv[1] = host; | |
403 | argv[2] = port; | |
404 | argv[3] = NULL; | |
5cbf8246 JK |
405 | proxy = xcalloc(1, sizeof(*proxy)); |
406 | proxy->argv = argv; | |
407 | proxy->in = -1; | |
408 | proxy->out = -1; | |
409 | if (start_command(proxy)) | |
15a1c012 | 410 | die("cannot start proxy %s", argv[0]); |
5cbf8246 JK |
411 | fd[0] = proxy->out; /* read from proxy stdout */ |
412 | fd[1] = proxy->in; /* write to proxy stdin */ | |
413 | return proxy; | |
f8014776 PC |
414 | } |
415 | ||
0f503d77 CC |
416 | #define MAX_CMD_LEN 1024 |
417 | ||
2af202be | 418 | static char *get_port(char *host) |
2e776665 LT |
419 | { |
420 | char *end; | |
421 | char *p = strchr(host, ':'); | |
422 | ||
423 | if (p) { | |
8f148253 RS |
424 | long port = strtol(p + 1, &end, 10); |
425 | if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) { | |
2e776665 LT |
426 | *p = '\0'; |
427 | return p+1; | |
428 | } | |
429 | } | |
430 | ||
431 | return NULL; | |
432 | } | |
433 | ||
fb32c917 JS |
434 | static struct child_process no_fork; |
435 | ||
f7192598 | 436 | /* |
fb32c917 JS |
437 | * This returns a dummy child_process if the transport protocol does not |
438 | * need fork(2), or a struct child_process object if it does. Once done, | |
439 | * finish the connection with finish_connect() with the value returned from | |
440 | * this function (it is safe to call finish_connect() with NULL to support | |
441 | * the former case). | |
f42a5c4e | 442 | * |
fb32c917 JS |
443 | * If it returns, the connect is successful; it just dies on errors (this |
444 | * will hopefully be changed in a libification effort, to return NULL when | |
445 | * the connection failed). | |
f7192598 | 446 | */ |
4577370e | 447 | struct child_process *git_connect(int fd[2], const char *url_orig, |
98158e9c | 448 | const char *prog, int flags) |
f7192598 | 449 | { |
9d2e9420 | 450 | char *url; |
8e76bf3f | 451 | char *host, *path; |
356bece0 YH |
452 | char *end; |
453 | int c; | |
5cbf8246 | 454 | struct child_process *conn = &no_fork; |
faea9ccb | 455 | enum protocol protocol = PROTO_LOCAL; |
da2a95b2 | 456 | int free_path = 0; |
2e776665 | 457 | char *port = NULL; |
f364cb88 JS |
458 | const char **arg; |
459 | struct strbuf cmd; | |
faea9ccb | 460 | |
f0b7367c JH |
461 | /* Without this we cannot rely on waitpid() to tell |
462 | * what happened to our children. | |
463 | */ | |
464 | signal(SIGCHLD, SIG_DFL); | |
465 | ||
9d2e9420 JK |
466 | if (is_url(url_orig)) |
467 | url = url_decode(url_orig); | |
468 | else | |
469 | url = xstrdup(url_orig); | |
470 | ||
faea9ccb | 471 | host = strstr(url, "://"); |
eeefa7c9 | 472 | if (host) { |
faea9ccb AE |
473 | *host = '\0'; |
474 | protocol = get_protocol(url); | |
475 | host += 3; | |
356bece0 YH |
476 | c = '/'; |
477 | } else { | |
f7192598 | 478 | host = url; |
356bece0 YH |
479 | c = ':'; |
480 | } | |
481 | ||
9aa5053d IL |
482 | /* |
483 | * Don't do destructive transforms with git:// as that | |
9517e6b8 | 484 | * protocol code does '[]' unwrapping of its own. |
9aa5053d | 485 | */ |
356bece0 YH |
486 | if (host[0] == '[') { |
487 | end = strchr(host + 1, ']'); | |
488 | if (end) { | |
9aa5053d IL |
489 | if (protocol != PROTO_GIT) { |
490 | *end = 0; | |
491 | host++; | |
492 | } | |
356bece0 | 493 | end++; |
356bece0 YH |
494 | } else |
495 | end = host; | |
496 | } else | |
497 | end = host; | |
498 | ||
499 | path = strchr(end, c); | |
be501813 | 500 | if (path && !has_dos_drive_prefix(end)) { |
72a4f4b6 | 501 | if (c == ':') { |
faea9ccb | 502 | protocol = PROTO_SSH; |
356bece0 | 503 | *path++ = '\0'; |
72a4f4b6 LT |
504 | } |
505 | } else | |
506 | path = end; | |
2386d658 | 507 | |
faea9ccb AE |
508 | if (!path || !*path) |
509 | die("No path specified. See 'man git-pull' for valid url syntax"); | |
510 | ||
511 | /* | |
512 | * null-terminate hostname and point path to ~ for URL's like this: | |
513 | * ssh://host.xz/~user/repo | |
514 | */ | |
515 | if (protocol != PROTO_LOCAL && host != url) { | |
516 | char *ptr = path; | |
517 | if (path[1] == '~') | |
518 | path++; | |
da2a95b2 | 519 | else { |
9befac47 | 520 | path = xstrdup(ptr); |
da2a95b2 SH |
521 | free_path = 1; |
522 | } | |
faea9ccb AE |
523 | |
524 | *ptr = '\0'; | |
525 | } | |
526 | ||
2e776665 LT |
527 | /* |
528 | * Add support for ssh port: ssh://host.xy:<port>/... | |
529 | */ | |
530 | if (protocol == PROTO_SSH && host != url) | |
531 | port = get_port(host); | |
532 | ||
f8014776 | 533 | if (protocol == PROTO_GIT) { |
5ad312be JL |
534 | /* These underlying connection commands die() if they |
535 | * cannot connect. | |
536 | */ | |
9befac47 | 537 | char *target_host = xstrdup(host); |
e814bc4d | 538 | if (git_use_proxy(host)) |
5cbf8246 | 539 | conn = git_proxy_connect(fd, host); |
da2a95b2 | 540 | else |
7841ce79 | 541 | git_tcp_connect(fd, host, flags); |
5ad312be JL |
542 | /* |
543 | * Separate original protocol components prog and path | |
73bb33a9 SP |
544 | * from extended host header with a NUL byte. |
545 | * | |
546 | * Note: Do not add any other headers here! Doing so | |
547 | * will cause older git-daemon servers to crash. | |
5ad312be JL |
548 | */ |
549 | packet_write(fd[1], | |
550 | "%s %s%chost=%s%c", | |
551 | prog, path, 0, | |
552 | target_host, 0); | |
553 | free(target_host); | |
4577370e | 554 | free(url); |
da2a95b2 SH |
555 | if (free_path) |
556 | free(path); | |
5cbf8246 | 557 | return conn; |
f8014776 | 558 | } |
2386d658 | 559 | |
98158e9c | 560 | conn = xcalloc(1, sizeof(*conn)); |
2e776665 | 561 | |
f364cb88 JS |
562 | strbuf_init(&cmd, MAX_CMD_LEN); |
563 | strbuf_addstr(&cmd, prog); | |
564 | strbuf_addch(&cmd, ' '); | |
565 | sq_quote_buf(&cmd, path); | |
566 | if (cmd.len >= MAX_CMD_LEN) | |
567 | die("command line too long"); | |
568 | ||
569 | conn->in = conn->out = -1; | |
36ad53ff | 570 | conn->argv = arg = xcalloc(7, sizeof(*arg)); |
f364cb88 JS |
571 | if (protocol == PROTO_SSH) { |
572 | const char *ssh = getenv("GIT_SSH"); | |
36ad53ff | 573 | int putty = ssh && strcasestr(ssh, "plink"); |
f364cb88 JS |
574 | if (!ssh) ssh = "ssh"; |
575 | ||
576 | *arg++ = ssh; | |
36ad53ff EY |
577 | if (putty && !strcasestr(ssh, "tortoiseplink")) |
578 | *arg++ = "-batch"; | |
f364cb88 | 579 | if (port) { |
36ad53ff EY |
580 | /* P is for PuTTY, p is for OpenSSH */ |
581 | *arg++ = putty ? "-P" : "-p"; | |
f364cb88 | 582 | *arg++ = port; |
4852f723 | 583 | } |
f364cb88 JS |
584 | *arg++ = host; |
585 | } | |
586 | else { | |
48a7c1c4 GB |
587 | /* remove repo-local variables from the environment */ |
588 | conn->env = local_repo_env; | |
4cfb2a44 | 589 | conn->use_shell = 1; |
016fb48b | 590 | } |
f364cb88 JS |
591 | *arg++ = cmd.buf; |
592 | *arg = NULL; | |
593 | ||
594 | if (start_command(conn)) | |
595 | die("unable to fork"); | |
596 | ||
597 | fd[0] = conn->out; /* read from child's stdout */ | |
598 | fd[1] = conn->in; /* write to child's stdin */ | |
599 | strbuf_release(&cmd); | |
4577370e | 600 | free(url); |
da2a95b2 SH |
601 | if (free_path) |
602 | free(path); | |
98158e9c | 603 | return conn; |
f7192598 LT |
604 | } |
605 | ||
7ffe853b JK |
606 | int git_connection_is_socket(struct child_process *conn) |
607 | { | |
608 | return conn == &no_fork; | |
609 | } | |
610 | ||
98158e9c | 611 | int finish_connect(struct child_process *conn) |
f7192598 | 612 | { |
f364cb88 | 613 | int code; |
7ffe853b | 614 | if (!conn || git_connection_is_socket(conn)) |
f42a5c4e FBH |
615 | return 0; |
616 | ||
f364cb88 JS |
617 | code = finish_command(conn); |
618 | free(conn->argv); | |
98158e9c | 619 | free(conn); |
f364cb88 | 620 | return code; |
f7192598 | 621 | } |
f206063b FL |
622 | |
623 | char *git_getpass(const char *prompt) | |
624 | { | |
d3e7da89 | 625 | const char *askpass; |
f206063b FL |
626 | struct child_process pass; |
627 | const char *args[3]; | |
628 | static struct strbuf buffer = STRBUF_INIT; | |
629 | ||
630 | askpass = getenv("GIT_ASKPASS"); | |
d3e7da89 AK |
631 | if (!askpass) |
632 | askpass = askpass_program; | |
90e87b01 KF |
633 | if (!askpass) |
634 | askpass = getenv("SSH_ASKPASS"); | |
8713feb1 JS |
635 | if (!askpass || !(*askpass)) { |
636 | char *result = getpass(prompt); | |
637 | if (!result) | |
638 | die_errno("Could not read password"); | |
639 | return result; | |
640 | } | |
f206063b FL |
641 | |
642 | args[0] = askpass; | |
643 | args[1] = prompt; | |
644 | args[2] = NULL; | |
645 | ||
646 | memset(&pass, 0, sizeof(pass)); | |
647 | pass.argv = args; | |
648 | pass.out = -1; | |
649 | ||
650 | if (start_command(&pass)) | |
651 | exit(1); | |
652 | ||
653 | strbuf_reset(&buffer); | |
654 | if (strbuf_read(&buffer, pass.out, 20) < 0) | |
655 | die("failed to read password from %s\n", askpass); | |
656 | ||
657 | close(pass.out); | |
658 | ||
659 | if (finish_command(&pass)) | |
660 | exit(1); | |
661 | ||
662 | strbuf_setlen(&buffer, strcspn(buffer.buf, "\r\n")); | |
663 | ||
664 | return buffer.buf; | |
665 | } |