]> git.ipfire.org Git - thirdparty/git.git/blame - http-push.c
double free in builtin-update-index.c
[thirdparty/git.git] / http-push.c
CommitLineData
58e60dd2
NH
1#include "cache.h"
2#include "commit.h"
3#include "pack.h"
4#include "fetch.h"
5#include "tag.h"
6#include "blob.h"
29508e1e 7#include "http.h"
aa1dbc98 8#include "refs.h"
c4e05b1a 9#include "diff.h"
aa1dbc98 10#include "revision.h"
3dfaf7bc 11#include "exec_cmd.h"
6b62816c 12#include "remote.h"
29508e1e 13
bee8e79d 14#include <expat.h>
58e60dd2
NH
15
16static const char http_push_usage[] =
1a703cba 17"git-http-push [--all] [--force] [--verbose] <remote> [<head>...]\n";
58e60dd2 18
92e2eb9c
JS
19#ifndef XML_STATUS_OK
20enum XML_Status {
21 XML_STATUS_OK = 1,
22 XML_STATUS_ERROR = 0
23};
24#define XML_STATUS_OK 1
25#define XML_STATUS_ERROR 0
26#endif
27
197e8951 28#define PREV_BUF_SIZE 4096
58e60dd2
NH
29#define RANGE_HEADER_SIZE 30
30
acf59575 31/* DAV methods */
58e60dd2
NH
32#define DAV_LOCK "LOCK"
33#define DAV_MKCOL "MKCOL"
34#define DAV_MOVE "MOVE"
35#define DAV_PROPFIND "PROPFIND"
36#define DAV_PUT "PUT"
37#define DAV_UNLOCK "UNLOCK"
3dfaf7bc 38#define DAV_DELETE "DELETE"
acf59575
NH
39
40/* DAV lock flags */
41#define DAV_PROP_LOCKWR (1u << 0)
42#define DAV_PROP_LOCKEX (1u << 1)
43#define DAV_LOCK_OK (1u << 2)
44
45/* DAV XML properties */
46#define DAV_CTX_LOCKENTRY ".multistatus.response.propstat.prop.supportedlock.lockentry"
47#define DAV_CTX_LOCKTYPE_WRITE ".multistatus.response.propstat.prop.supportedlock.lockentry.locktype.write"
48#define DAV_CTX_LOCKTYPE_EXCLUSIVE ".multistatus.response.propstat.prop.supportedlock.lockentry.lockscope.exclusive"
49#define DAV_ACTIVELOCK_OWNER ".prop.lockdiscovery.activelock.owner.href"
50#define DAV_ACTIVELOCK_TIMEOUT ".prop.lockdiscovery.activelock.timeout"
51#define DAV_ACTIVELOCK_TOKEN ".prop.lockdiscovery.activelock.locktoken.href"
aa1dbc98
NH
52#define DAV_PROPFIND_RESP ".multistatus.response"
53#define DAV_PROPFIND_NAME ".multistatus.response.href"
54#define DAV_PROPFIND_COLLECTION ".multistatus.response.propstat.prop.resourcetype.collection"
acf59575
NH
55
56/* DAV request body templates */
aa1dbc98
NH
57#define PROPFIND_SUPPORTEDLOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:prop xmlns:R=\"%s\">\n<D:supportedlock/>\n</D:prop>\n</D:propfind>"
58#define PROPFIND_ALL_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:allprop/>\n</D:propfind>"
58e60dd2
NH
59#define LOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:lockinfo xmlns:D=\"DAV:\">\n<D:lockscope><D:exclusive/></D:lockscope>\n<D:locktype><D:write/></D:locktype>\n<D:owner>\n<D:href>mailto:%s</D:href>\n</D:owner>\n</D:lockinfo>"
60
75187c9d
NH
61#define LOCK_TIME 600
62#define LOCK_REFRESH 30
63
1b65a5aa 64/* bits #0-15 in revision.h */
aa1dbc98 65
1b65a5aa
JH
66#define LOCAL (1u<<16)
67#define REMOTE (1u<<17)
68#define FETCHING (1u<<18)
69#define PUSHING (1u<<19)
aa1dbc98 70
3dfaf7bc
NH
71/* We allow "recursive" symbolic refs. Only within reason, though */
72#define MAXDEPTH 5
73
96f1e58f
DR
74static int pushing;
75static int aborted;
a3c57c9a 76static signed char remote_dir_exists[256];
58e60dd2 77
58e60dd2
NH
78static struct curl_slist *no_pragma_header;
79static struct curl_slist *default_headers;
58e60dd2 80
96f1e58f
DR
81static int push_verbosely;
82static int push_all;
83static int force_all;
58e60dd2 84
96f1e58f 85static struct object_list *objects;
aa1dbc98 86
58e60dd2
NH
87struct repo
88{
89 char *url;
aa1dbc98 90 int path_len;
197e8951
NH
91 int has_info_refs;
92 int can_update_info_refs;
93 int has_info_packs;
58e60dd2 94 struct packed_git *packs;
512d632c 95 struct remote_lock *locks;
58e60dd2
NH
96};
97
96f1e58f 98static struct repo *remote;
58e60dd2
NH
99
100enum transfer_state {
197e8951
NH
101 NEED_FETCH,
102 RUN_FETCH_LOOSE,
103 RUN_FETCH_PACKED,
58e60dd2
NH
104 NEED_PUSH,
105 RUN_MKCOL,
106 RUN_PUT,
107 RUN_MOVE,
108 ABORTED,
109 COMPLETE,
110};
111
112struct transfer_request
113{
aa1dbc98 114 struct object *obj;
58e60dd2
NH
115 char *url;
116 char *dest;
aa1dbc98 117 struct remote_lock *lock;
58e60dd2
NH
118 struct curl_slist *headers;
119 struct buffer buffer;
120 char filename[PATH_MAX];
121 char tmpfile[PATH_MAX];
197e8951
NH
122 int local_fileno;
123 FILE *local_stream;
58e60dd2
NH
124 enum transfer_state state;
125 CURLcode curl_result;
126 char errorstr[CURL_ERROR_SIZE];
127 long http_code;
128 unsigned char real_sha1[20];
129 SHA_CTX c;
130 z_stream stream;
131 int zret;
132 int rename;
197e8951 133 void *userData;
58e60dd2
NH
134 struct active_request_slot *slot;
135 struct transfer_request *next;
136};
137
96f1e58f 138static struct transfer_request *request_queue_head;
58e60dd2 139
acf59575
NH
140struct xml_ctx
141{
142 char *name;
143 int len;
144 char *cdata;
145 void (*userFunc)(struct xml_ctx *ctx, int tag_closed);
146 void *userData;
147};
148
aa1dbc98 149struct remote_lock
26349b2e 150{
75187c9d 151 char *url;
26349b2e 152 char *owner;
75187c9d 153 char *token;
26349b2e
NH
154 time_t start_time;
155 long timeout;
75187c9d 156 int refreshing;
aa1dbc98
NH
157 struct remote_lock *next;
158};
159
3030baa7
NH
160/* Flags that control remote_ls processing */
161#define PROCESS_FILES (1u << 0)
162#define PROCESS_DIRS (1u << 1)
163#define RECURSIVE (1u << 2)
164
165/* Flags that remote_ls passes to callback functions */
166#define IS_DIR (1u << 0)
167
168struct remote_ls_ctx
aa1dbc98 169{
3030baa7
NH
170 char *path;
171 void (*userFunc)(struct remote_ls_ctx *ls);
172 void *userData;
173 int flags;
174 char *dentry_name;
175 int dentry_flags;
176 struct remote_ls_ctx *parent;
26349b2e
NH
177};
178
29508e1e 179static void finish_request(struct transfer_request *request);
197e8951 180static void release_request(struct transfer_request *request);
58e60dd2 181
29508e1e 182static void process_response(void *callback_data)
58e60dd2 183{
29508e1e
NH
184 struct transfer_request *request =
185 (struct transfer_request *)callback_data;
58e60dd2 186
29508e1e 187 finish_request(request);
58e60dd2
NH
188}
189
dd8239f9 190#ifdef USE_CURL_MULTI
197e8951
NH
191static size_t fwrite_sha1_file(void *ptr, size_t eltsize, size_t nmemb,
192 void *data)
193{
194 unsigned char expn[4096];
195 size_t size = eltsize * nmemb;
196 int posn = 0;
197 struct transfer_request *request = (struct transfer_request *)data;
198 do {
93822c22 199 ssize_t retval = xwrite(request->local_fileno,
1d7f171c 200 (char *) ptr + posn, size - posn);
197e8951
NH
201 if (retval < 0)
202 return posn;
203 posn += retval;
204 } while (posn < size);
205
206 request->stream.avail_in = size;
207 request->stream.next_in = ptr;
208 do {
209 request->stream.next_out = expn;
210 request->stream.avail_out = sizeof(expn);
211 request->zret = inflate(&request->stream, Z_SYNC_FLUSH);
212 SHA1_Update(&request->c, expn,
213 sizeof(expn) - request->stream.avail_out);
214 } while (request->stream.avail_in && request->zret == Z_OK);
215 data_received++;
216 return size;
217}
218
219static void start_fetch_loose(struct transfer_request *request)
220{
221 char *hex = sha1_to_hex(request->obj->sha1);
222 char *filename;
223 char prevfile[PATH_MAX];
224 char *url;
225 char *posn;
226 int prevlocal;
227 unsigned char prev_buf[PREV_BUF_SIZE];
228 ssize_t prev_read = 0;
229 long prev_posn = 0;
230 char range[RANGE_HEADER_SIZE];
231 struct curl_slist *range_header = NULL;
232 struct active_request_slot *slot;
233
234 filename = sha1_file_name(request->obj->sha1);
235 snprintf(request->filename, sizeof(request->filename), "%s", filename);
236 snprintf(request->tmpfile, sizeof(request->tmpfile),
237 "%s.temp", filename);
238
239 snprintf(prevfile, sizeof(prevfile), "%s.prev", request->filename);
240 unlink(prevfile);
241 rename(request->tmpfile, prevfile);
242 unlink(request->tmpfile);
243
244 if (request->local_fileno != -1)
245 error("fd leakage in start: %d", request->local_fileno);
246 request->local_fileno = open(request->tmpfile,
247 O_WRONLY | O_CREAT | O_EXCL, 0666);
248 /* This could have failed due to the "lazy directory creation";
249 * try to mkdir the last path component.
250 */
251 if (request->local_fileno < 0 && errno == ENOENT) {
252 char *dir = strrchr(request->tmpfile, '/');
253 if (dir) {
254 *dir = 0;
255 mkdir(request->tmpfile, 0777);
256 *dir = '/';
257 }
258 request->local_fileno = open(request->tmpfile,
259 O_WRONLY | O_CREAT | O_EXCL, 0666);
260 }
261
262 if (request->local_fileno < 0) {
263 request->state = ABORTED;
264 error("Couldn't create temporary file %s for %s: %s",
265 request->tmpfile, request->filename, strerror(errno));
266 return;
267 }
268
269 memset(&request->stream, 0, sizeof(request->stream));
270
271 inflateInit(&request->stream);
272
273 SHA1_Init(&request->c);
274
275 url = xmalloc(strlen(remote->url) + 50);
276 request->url = xmalloc(strlen(remote->url) + 50);
277 strcpy(url, remote->url);
278 posn = url + strlen(remote->url);
279 strcpy(posn, "objects/");
280 posn += 8;
281 memcpy(posn, hex, 2);
282 posn += 2;
283 *(posn++) = '/';
284 strcpy(posn, hex + 2);
285 strcpy(request->url, url);
286
287 /* If a previous temp file is present, process what was already
288 fetched. */
289 prevlocal = open(prevfile, O_RDONLY);
290 if (prevlocal != -1) {
291 do {
93d26e4c 292 prev_read = xread(prevlocal, prev_buf, PREV_BUF_SIZE);
197e8951
NH
293 if (prev_read>0) {
294 if (fwrite_sha1_file(prev_buf,
295 1,
296 prev_read,
297 request) == prev_read) {
298 prev_posn += prev_read;
299 } else {
300 prev_read = -1;
301 }
302 }
303 } while (prev_read > 0);
304 close(prevlocal);
305 }
306 unlink(prevfile);
307
308 /* Reset inflate/SHA1 if there was an error reading the previous temp
309 file; also rewind to the beginning of the local file. */
310 if (prev_read == -1) {
311 memset(&request->stream, 0, sizeof(request->stream));
312 inflateInit(&request->stream);
313 SHA1_Init(&request->c);
314 if (prev_posn>0) {
315 prev_posn = 0;
b5da2467 316 lseek(request->local_fileno, 0, SEEK_SET);
197e8951
NH
317 ftruncate(request->local_fileno, 0);
318 }
319 }
320
321 slot = get_active_slot();
322 slot->callback_func = process_response;
323 slot->callback_data = request;
324 request->slot = slot;
325
326 curl_easy_setopt(slot->curl, CURLOPT_FILE, request);
327 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_sha1_file);
328 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
329 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
330 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
331
332 /* If we have successfully processed data from a previous fetch
333 attempt, only fetch the data we don't already have. */
334 if (prev_posn>0) {
335 if (push_verbosely)
336 fprintf(stderr,
337 "Resuming fetch of object %s at byte %ld\n",
338 hex, prev_posn);
339 sprintf(range, "Range: bytes=%ld-", prev_posn);
340 range_header = curl_slist_append(range_header, range);
341 curl_easy_setopt(slot->curl,
342 CURLOPT_HTTPHEADER, range_header);
343 }
344
345 /* Try to get the request started, abort the request on error */
346 request->state = RUN_FETCH_LOOSE;
347 if (!start_active_slot(slot)) {
348 fprintf(stderr, "Unable to start GET request\n");
349 remote->can_update_info_refs = 0;
350 release_request(request);
351 }
352}
353
dd8239f9
JH
354static void start_mkcol(struct transfer_request *request)
355{
356 char *hex = sha1_to_hex(request->obj->sha1);
357 struct active_request_slot *slot;
358 char *posn;
359
360 request->url = xmalloc(strlen(remote->url) + 13);
361 strcpy(request->url, remote->url);
362 posn = request->url + strlen(remote->url);
363 strcpy(posn, "objects/");
364 posn += 8;
365 memcpy(posn, hex, 2);
366 posn += 2;
367 strcpy(posn, "/");
368
369 slot = get_active_slot();
370 slot->callback_func = process_response;
371 slot->callback_data = request;
372 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
373 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
374 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
375 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
376 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
377
378 if (start_active_slot(slot)) {
379 request->slot = slot;
380 request->state = RUN_MKCOL;
381 } else {
382 request->state = ABORTED;
383 free(request->url);
384 request->url = NULL;
385 }
386}
387#endif
388
197e8951
NH
389static void start_fetch_packed(struct transfer_request *request)
390{
391 char *url;
392 struct packed_git *target;
393 FILE *packfile;
394 char *filename;
395 long prev_posn = 0;
396 char range[RANGE_HEADER_SIZE];
397 struct curl_slist *range_header = NULL;
398
399 struct transfer_request *check_request = request_queue_head;
400 struct active_request_slot *slot;
401
402 target = find_sha1_pack(request->obj->sha1, remote->packs);
403 if (!target) {
404 fprintf(stderr, "Unable to fetch %s, will not be able to update server info refs\n", sha1_to_hex(request->obj->sha1));
405 remote->can_update_info_refs = 0;
406 release_request(request);
407 return;
408 }
409
410 fprintf(stderr, "Fetching pack %s\n", sha1_to_hex(target->sha1));
411 fprintf(stderr, " which contains %s\n", sha1_to_hex(request->obj->sha1));
412
413 filename = sha1_pack_name(target->sha1);
414 snprintf(request->filename, sizeof(request->filename), "%s", filename);
415 snprintf(request->tmpfile, sizeof(request->tmpfile),
416 "%s.temp", filename);
417
418 url = xmalloc(strlen(remote->url) + 64);
419 sprintf(url, "%sobjects/pack/pack-%s.pack",
420 remote->url, sha1_to_hex(target->sha1));
421
422 /* Make sure there isn't another open request for this pack */
423 while (check_request) {
424 if (check_request->state == RUN_FETCH_PACKED &&
425 !strcmp(check_request->url, url)) {
426 free(url);
427 release_request(request);
428 return;
429 }
430 check_request = check_request->next;
431 }
432
433 packfile = fopen(request->tmpfile, "a");
434 if (!packfile) {
435 fprintf(stderr, "Unable to open local file %s for pack",
436 filename);
437 remote->can_update_info_refs = 0;
438 free(url);
439 return;
440 }
441
442 slot = get_active_slot();
443 slot->callback_func = process_response;
444 slot->callback_data = request;
445 request->slot = slot;
446 request->local_stream = packfile;
447 request->userData = target;
448
449 request->url = url;
450 curl_easy_setopt(slot->curl, CURLOPT_FILE, packfile);
451 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
452 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
453 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
454 slot->local = packfile;
455
456 /* If there is data present from a previous transfer attempt,
457 resume where it left off */
458 prev_posn = ftell(packfile);
459 if (prev_posn>0) {
460 if (push_verbosely)
461 fprintf(stderr,
462 "Resuming fetch of pack %s at byte %ld\n",
463 sha1_to_hex(target->sha1), prev_posn);
464 sprintf(range, "Range: bytes=%ld-", prev_posn);
465 range_header = curl_slist_append(range_header, range);
466 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
467 }
468
469 /* Try to get the request started, abort the request on error */
470 request->state = RUN_FETCH_PACKED;
471 if (!start_active_slot(slot)) {
472 fprintf(stderr, "Unable to start GET request\n");
473 remote->can_update_info_refs = 0;
474 release_request(request);
475 }
476}
477
58e60dd2
NH
478static void start_put(struct transfer_request *request)
479{
aa1dbc98 480 char *hex = sha1_to_hex(request->obj->sha1);
58e60dd2
NH
481 struct active_request_slot *slot;
482 char *posn;
21666f1a 483 enum object_type type;
58e60dd2
NH
484 char hdr[50];
485 void *unpacked;
486 unsigned long len;
487 int hdrlen;
488 ssize_t size;
489 z_stream stream;
490
21666f1a
NP
491 unpacked = read_sha1_file(request->obj->sha1, &type, &len);
492 hdrlen = sprintf(hdr, "%s %lu", typename(type), len) + 1;
58e60dd2
NH
493
494 /* Set it up */
495 memset(&stream, 0, sizeof(stream));
12f6c308 496 deflateInit(&stream, zlib_compression_level);
58e60dd2
NH
497 size = deflateBound(&stream, len + hdrlen);
498 request->buffer.buffer = xmalloc(size);
499
500 /* Compress it */
501 stream.next_out = request->buffer.buffer;
502 stream.avail_out = size;
503
504 /* First header.. */
505 stream.next_in = (void *)hdr;
506 stream.avail_in = hdrlen;
507 while (deflate(&stream, 0) == Z_OK)
508 /* nothing */;
509
510 /* Then the data itself.. */
511 stream.next_in = unpacked;
512 stream.avail_in = len;
513 while (deflate(&stream, Z_FINISH) == Z_OK)
514 /* nothing */;
515 deflateEnd(&stream);
516 free(unpacked);
517
518 request->buffer.size = stream.total_out;
519 request->buffer.posn = 0;
520
a6080a0a 521 request->url = xmalloc(strlen(remote->url) +
26349b2e 522 strlen(request->lock->token) + 51);
58e60dd2
NH
523 strcpy(request->url, remote->url);
524 posn = request->url + strlen(remote->url);
525 strcpy(posn, "objects/");
526 posn += 8;
527 memcpy(posn, hex, 2);
528 posn += 2;
529 *(posn++) = '/';
530 strcpy(posn, hex + 2);
531 request->dest = xmalloc(strlen(request->url) + 14);
532 sprintf(request->dest, "Destination: %s", request->url);
533 posn += 38;
1e8d3045 534 *(posn++) = '_';
26349b2e 535 strcpy(posn, request->lock->token);
58e60dd2
NH
536
537 slot = get_active_slot();
29508e1e
NH
538 slot->callback_func = process_response;
539 slot->callback_data = request;
58e60dd2
NH
540 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &request->buffer);
541 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, request->buffer.size);
542 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
543 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
544 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
545 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
546 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
547 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
548 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
549
550 if (start_active_slot(slot)) {
551 request->slot = slot;
552 request->state = RUN_PUT;
553 } else {
554 request->state = ABORTED;
555 free(request->url);
7b899967 556 request->url = NULL;
58e60dd2
NH
557 }
558}
559
560static void start_move(struct transfer_request *request)
561{
562 struct active_request_slot *slot;
563 struct curl_slist *dav_headers = NULL;
564
565 slot = get_active_slot();
29508e1e
NH
566 slot->callback_func = process_response;
567 slot->callback_data = request;
58e60dd2
NH
568 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
569 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MOVE);
570 dav_headers = curl_slist_append(dav_headers, request->dest);
571 dav_headers = curl_slist_append(dav_headers, "Overwrite: T");
572 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
573 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
574 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
575
576 if (start_active_slot(slot)) {
577 request->slot = slot;
578 request->state = RUN_MOVE;
579 } else {
580 request->state = ABORTED;
581 free(request->url);
7b899967 582 request->url = NULL;
58e60dd2
NH
583 }
584}
585
512d632c 586static int refresh_lock(struct remote_lock *lock)
75187c9d
NH
587{
588 struct active_request_slot *slot;
baa7b67d 589 struct slot_results results;
75187c9d
NH
590 char *if_header;
591 char timeout_header[25];
592 struct curl_slist *dav_headers = NULL;
512d632c 593 int rc = 0;
75187c9d 594
512d632c 595 lock->refreshing = 1;
75187c9d 596
512d632c
NH
597 if_header = xmalloc(strlen(lock->token) + 25);
598 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
599 sprintf(timeout_header, "Timeout: Second-%ld", lock->timeout);
600 dav_headers = curl_slist_append(dav_headers, if_header);
601 dav_headers = curl_slist_append(dav_headers, timeout_header);
75187c9d 602
512d632c
NH
603 slot = get_active_slot();
604 slot->results = &results;
605 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
606 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
607 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
608 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
609 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
75187c9d 610
512d632c
NH
611 if (start_active_slot(slot)) {
612 run_active_slot(slot);
613 if (results.curl_result != CURLE_OK) {
614 fprintf(stderr, "LOCK HTTP error %ld\n",
615 results.http_code);
616 } else {
617 lock->start_time = time(NULL);
618 rc = 1;
619 }
620 }
aa1dbc98 621
512d632c
NH
622 lock->refreshing = 0;
623 curl_slist_free_all(dav_headers);
624 free(if_header);
aa1dbc98 625
512d632c
NH
626 return rc;
627}
628
ec26b4d6 629static void check_locks(void)
512d632c
NH
630{
631 struct remote_lock *lock = remote->locks;
632 time_t current_time = time(NULL);
633 int time_remaining;
634
635 while (lock) {
636 time_remaining = lock->start_time + lock->timeout -
637 current_time;
638 if (!lock->refreshing && time_remaining < LOCK_REFRESH) {
639 if (!refresh_lock(lock)) {
640 fprintf(stderr,
641 "Unable to refresh lock for %s\n",
642 lock->url);
643 aborted = 1;
644 return;
aa1dbc98 645 }
75187c9d 646 }
512d632c 647 lock = lock->next;
75187c9d 648 }
aa1dbc98 649}
75187c9d 650
aa1dbc98
NH
651static void release_request(struct transfer_request *request)
652{
653 struct transfer_request *entry = request_queue_head;
654
655 if (request == request_queue_head) {
656 request_queue_head = request->next;
657 } else {
658 while (entry->next != NULL && entry->next != request)
659 entry = entry->next;
660 if (entry->next == request)
661 entry->next = entry->next->next;
662 }
663
197e8951
NH
664 if (request->local_fileno != -1)
665 close(request->local_fileno);
666 if (request->local_stream)
667 fclose(request->local_stream);
aa1dbc98
NH
668 if (request->url != NULL)
669 free(request->url);
670 free(request);
75187c9d
NH
671}
672
58e60dd2
NH
673static void finish_request(struct transfer_request *request)
674{
197e8951
NH
675 struct stat st;
676 struct packed_git *target;
677 struct packed_git **lst;
678
679 request->curl_result = request->slot->curl_result;
58e60dd2
NH
680 request->http_code = request->slot->http_code;
681 request->slot = NULL;
75187c9d 682
aa1dbc98 683 /* Keep locks active */
512d632c 684 check_locks();
75187c9d 685
58e60dd2
NH
686 if (request->headers != NULL)
687 curl_slist_free_all(request->headers);
7b899967
NH
688
689 /* URL is reused for MOVE after PUT */
690 if (request->state != RUN_PUT) {
691 free(request->url);
692 request->url = NULL;
aa1dbc98 693 }
7b899967 694
aa1dbc98 695 if (request->state == RUN_MKCOL) {
58e60dd2
NH
696 if (request->curl_result == CURLE_OK ||
697 request->http_code == 405) {
aa1dbc98 698 remote_dir_exists[request->obj->sha1[0]] = 1;
58e60dd2
NH
699 start_put(request);
700 } else {
701 fprintf(stderr, "MKCOL %s failed, aborting (%d/%ld)\n",
aa1dbc98 702 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
703 request->curl_result, request->http_code);
704 request->state = ABORTED;
705 aborted = 1;
706 }
707 } else if (request->state == RUN_PUT) {
708 if (request->curl_result == CURLE_OK) {
709 start_move(request);
710 } else {
711 fprintf(stderr, "PUT %s failed, aborting (%d/%ld)\n",
aa1dbc98 712 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
713 request->curl_result, request->http_code);
714 request->state = ABORTED;
715 aborted = 1;
716 }
717 } else if (request->state == RUN_MOVE) {
718 if (request->curl_result == CURLE_OK) {
1a703cba
NH
719 if (push_verbosely)
720 fprintf(stderr, " sent %s\n",
721 sha1_to_hex(request->obj->sha1));
aa1dbc98
NH
722 request->obj->flags |= REMOTE;
723 release_request(request);
58e60dd2
NH
724 } else {
725 fprintf(stderr, "MOVE %s failed, aborting (%d/%ld)\n",
aa1dbc98 726 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
727 request->curl_result, request->http_code);
728 request->state = ABORTED;
729 aborted = 1;
730 }
197e8951
NH
731 } else if (request->state == RUN_FETCH_LOOSE) {
732 fchmod(request->local_fileno, 0444);
733 close(request->local_fileno); request->local_fileno = -1;
734
735 if (request->curl_result != CURLE_OK &&
736 request->http_code != 416) {
737 if (stat(request->tmpfile, &st) == 0) {
738 if (st.st_size == 0)
739 unlink(request->tmpfile);
740 }
741 } else {
742 if (request->http_code == 416)
743 fprintf(stderr, "Warning: requested range invalid; we may already have all the data.\n");
744
745 inflateEnd(&request->stream);
746 SHA1_Final(request->real_sha1, &request->c);
747 if (request->zret != Z_STREAM_END) {
748 unlink(request->tmpfile);
a89fccd2 749 } else if (hashcmp(request->obj->sha1, request->real_sha1)) {
197e8951
NH
750 unlink(request->tmpfile);
751 } else {
752 request->rename =
753 move_temp_to_file(
754 request->tmpfile,
755 request->filename);
756 if (request->rename == 0) {
757 request->obj->flags |= (LOCAL | REMOTE);
758 }
759 }
760 }
761
762 /* Try fetching packed if necessary */
763 if (request->obj->flags & LOCAL)
764 release_request(request);
765 else
766 start_fetch_packed(request);
767
768 } else if (request->state == RUN_FETCH_PACKED) {
769 if (request->curl_result != CURLE_OK) {
770 fprintf(stderr, "Unable to get pack file %s\n%s",
771 request->url, curl_errorstr);
772 remote->can_update_info_refs = 0;
773 } else {
1c23d794
SP
774 off_t pack_size = ftell(request->local_stream);
775
197e8951
NH
776 fclose(request->local_stream);
777 request->local_stream = NULL;
778 if (!move_temp_to_file(request->tmpfile,
779 request->filename)) {
780 target = (struct packed_git *)request->userData;
1c23d794 781 target->pack_size = pack_size;
197e8951
NH
782 lst = &remote->packs;
783 while (*lst != target)
784 lst = &((*lst)->next);
785 *lst = (*lst)->next;
786
787 if (!verify_pack(target, 0))
788 install_packed_git(target);
789 else
790 remote->can_update_info_refs = 0;
791 }
792 }
793 release_request(request);
58e60dd2
NH
794 }
795}
796
b3ca4e4e 797#ifdef USE_CURL_MULTI
29508e1e 798void fill_active_slots(void)
58e60dd2
NH
799{
800 struct transfer_request *request = request_queue_head;
197e8951 801 struct transfer_request *next;
58e60dd2
NH
802 struct active_request_slot *slot = active_queue_head;
803 int num_transfers;
804
805 if (aborted)
806 return;
807
808 while (active_requests < max_requests && request != NULL) {
197e8951
NH
809 next = request->next;
810 if (request->state == NEED_FETCH) {
811 start_fetch_loose(request);
812 } else if (pushing && request->state == NEED_PUSH) {
aa1dbc98 813 if (remote_dir_exists[request->obj->sha1[0]] == 1) {
0dd276b8 814 start_put(request);
aa1dbc98 815 } else {
0dd276b8 816 start_mkcol(request);
aa1dbc98 817 }
58e60dd2
NH
818 curl_multi_perform(curlm, &num_transfers);
819 }
197e8951 820 request = next;
58e60dd2
NH
821 }
822
823 while (slot != NULL) {
824 if (!slot->in_use && slot->curl != NULL) {
825 curl_easy_cleanup(slot->curl);
826 slot->curl = NULL;
827 }
828 slot = slot->next;
aa1dbc98 829 }
58e60dd2 830}
b3ca4e4e 831#endif
58e60dd2 832
aa1dbc98
NH
833static void get_remote_object_list(unsigned char parent);
834
197e8951
NH
835static void add_fetch_request(struct object *obj)
836{
837 struct transfer_request *request;
838
839 check_locks();
840
841 /*
842 * Don't fetch the object if it's known to exist locally
843 * or is already in the request queue
844 */
845 if (remote_dir_exists[obj->sha1[0]] == -1)
846 get_remote_object_list(obj->sha1[0]);
847 if (obj->flags & (LOCAL | FETCHING))
848 return;
849
850 obj->flags |= FETCHING;
851 request = xmalloc(sizeof(*request));
852 request->obj = obj;
853 request->url = NULL;
854 request->lock = NULL;
855 request->headers = NULL;
856 request->local_fileno = -1;
857 request->local_stream = NULL;
858 request->state = NEED_FETCH;
859 request->next = request_queue_head;
860 request_queue_head = request;
861
b3ca4e4e 862#ifdef USE_CURL_MULTI
197e8951
NH
863 fill_active_slots();
864 step_active_slots();
b3ca4e4e 865#endif
197e8951
NH
866}
867
1a703cba 868static int add_send_request(struct object *obj, struct remote_lock *lock)
58e60dd2
NH
869{
870 struct transfer_request *request = request_queue_head;
58e60dd2 871 struct packed_git *target;
58e60dd2 872
512d632c
NH
873 /* Keep locks active */
874 check_locks();
875
aa1dbc98
NH
876 /*
877 * Don't push the object if it's known to exist on the remote
878 * or is already in the request queue
879 */
880 if (remote_dir_exists[obj->sha1[0]] == -1)
881 get_remote_object_list(obj->sha1[0]);
882 if (obj->flags & (REMOTE | PUSHING))
1a703cba 883 return 0;
aa1dbc98
NH
884 target = find_sha1_pack(obj->sha1, remote->packs);
885 if (target) {
886 obj->flags |= REMOTE;
1a703cba 887 return 0;
aa1dbc98 888 }
58e60dd2 889
aa1dbc98 890 obj->flags |= PUSHING;
58e60dd2 891 request = xmalloc(sizeof(*request));
aa1dbc98 892 request->obj = obj;
58e60dd2 893 request->url = NULL;
26349b2e 894 request->lock = lock;
58e60dd2 895 request->headers = NULL;
197e8951
NH
896 request->local_fileno = -1;
897 request->local_stream = NULL;
aa1dbc98 898 request->state = NEED_PUSH;
c17fb6ee
NH
899 request->next = request_queue_head;
900 request_queue_head = request;
29508e1e 901
b3ca4e4e 902#ifdef USE_CURL_MULTI
29508e1e
NH
903 fill_active_slots();
904 step_active_slots();
b3ca4e4e 905#endif
1a703cba
NH
906
907 return 1;
58e60dd2
NH
908}
909
910static int fetch_index(unsigned char *sha1)
911{
912 char *hex = sha1_to_hex(sha1);
913 char *filename;
914 char *url;
915 char tmpfile[PATH_MAX];
916 long prev_posn = 0;
917 char range[RANGE_HEADER_SIZE];
918 struct curl_slist *range_header = NULL;
919
920 FILE *indexfile;
921 struct active_request_slot *slot;
baa7b67d 922 struct slot_results results;
58e60dd2 923
c17fb6ee 924 /* Don't use the index if the pack isn't there */
1a703cba
NH
925 url = xmalloc(strlen(remote->url) + 64);
926 sprintf(url, "%sobjects/pack/pack-%s.pack", remote->url, hex);
c17fb6ee 927 slot = get_active_slot();
baa7b67d 928 slot->results = &results;
c17fb6ee
NH
929 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
930 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
931 if (start_active_slot(slot)) {
932 run_active_slot(slot);
baa7b67d 933 if (results.curl_result != CURLE_OK) {
c17fb6ee
NH
934 free(url);
935 return error("Unable to verify pack %s is available",
936 hex);
937 }
938 } else {
939 return error("Unable to start request");
940 }
941
58e60dd2
NH
942 if (has_pack_index(sha1))
943 return 0;
944
945 if (push_verbosely)
946 fprintf(stderr, "Getting index for pack %s\n", hex);
1a703cba
NH
947
948 sprintf(url, "%sobjects/pack/pack-%s.idx", remote->url, hex);
949
58e60dd2
NH
950 filename = sha1_pack_index_name(sha1);
951 snprintf(tmpfile, sizeof(tmpfile), "%s.temp", filename);
952 indexfile = fopen(tmpfile, "a");
953 if (!indexfile)
954 return error("Unable to open local file %s for pack index",
955 filename);
956
957 slot = get_active_slot();
baa7b67d 958 slot->results = &results;
c17fb6ee
NH
959 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
960 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
58e60dd2
NH
961 curl_easy_setopt(slot->curl, CURLOPT_FILE, indexfile);
962 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
963 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
964 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
965 slot->local = indexfile;
966
967 /* If there is data present from a previous transfer attempt,
968 resume where it left off */
969 prev_posn = ftell(indexfile);
970 if (prev_posn>0) {
971 if (push_verbosely)
972 fprintf(stderr,
973 "Resuming fetch of index for pack %s at byte %ld\n",
974 hex, prev_posn);
975 sprintf(range, "Range: bytes=%ld-", prev_posn);
976 range_header = curl_slist_append(range_header, range);
977 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
978 }
979
980 if (start_active_slot(slot)) {
981 run_active_slot(slot);
baa7b67d 982 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
983 free(url);
984 fclose(indexfile);
985 return error("Unable to get pack index %s\n%s", url,
986 curl_errorstr);
987 }
988 } else {
989 free(url);
7b899967 990 fclose(indexfile);
58e60dd2
NH
991 return error("Unable to start request");
992 }
993
994 free(url);
995 fclose(indexfile);
996
997 return move_temp_to_file(tmpfile, filename);
998}
999
1000static int setup_index(unsigned char *sha1)
1001{
1002 struct packed_git *new_pack;
58e60dd2
NH
1003
1004 if (fetch_index(sha1))
1005 return -1;
1006
1007 new_pack = parse_pack_index(sha1);
1008 new_pack->next = remote->packs;
1009 remote->packs = new_pack;
1010 return 0;
1011}
1012
f4f440a0 1013static int fetch_indices(void)
58e60dd2
NH
1014{
1015 unsigned char sha1[20];
1016 char *url;
1017 struct buffer buffer;
1018 char *data;
1019 int i = 0;
1020
1021 struct active_request_slot *slot;
baa7b67d 1022 struct slot_results results;
58e60dd2 1023
90321c10 1024 data = xcalloc(1, 4096);
58e60dd2
NH
1025 buffer.size = 4096;
1026 buffer.posn = 0;
1027 buffer.buffer = data;
1028
1029 if (push_verbosely)
1030 fprintf(stderr, "Getting pack list\n");
1a703cba
NH
1031
1032 url = xmalloc(strlen(remote->url) + 20);
1033 sprintf(url, "%sobjects/info/packs", remote->url);
58e60dd2
NH
1034
1035 slot = get_active_slot();
baa7b67d 1036 slot->results = &results;
58e60dd2 1037 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
29508e1e 1038 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1039 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1040 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
1041 if (start_active_slot(slot)) {
1042 run_active_slot(slot);
baa7b67d 1043 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1044 free(buffer.buffer);
1045 free(url);
baa7b67d 1046 if (results.http_code == 404)
58e60dd2
NH
1047 return 0;
1048 else
1049 return error("%s", curl_errorstr);
1050 }
1051 } else {
1052 free(buffer.buffer);
1053 free(url);
1054 return error("Unable to start request");
1055 }
1056 free(url);
1057
1058 data = buffer.buffer;
1059 while (i < buffer.posn) {
1060 switch (data[i]) {
1061 case 'P':
1062 i++;
1063 if (i + 52 < buffer.posn &&
cc44c765 1064 !prefixcmp(data + i, " pack-") &&
1968d77d 1065 !prefixcmp(data + i + 46, ".pack\n")) {
58e60dd2
NH
1066 get_sha1_hex(data + i + 6, sha1);
1067 setup_index(sha1);
1068 i += 51;
1069 break;
1070 }
1071 default:
1072 while (data[i] != '\n')
1073 i++;
1074 }
1075 i++;
1076 }
1077
1078 free(buffer.buffer);
1079 return 0;
1080}
1081
1082static inline int needs_quote(int ch)
1083{
cfd432e6
FF
1084 if (((ch >= 'A') && (ch <= 'Z'))
1085 || ((ch >= 'a') && (ch <= 'z'))
1086 || ((ch >= '0') && (ch <= '9'))
1087 || (ch == '/')
1088 || (ch == '-')
1089 || (ch == '.'))
58e60dd2 1090 return 0;
cfd432e6 1091 return 1;
58e60dd2
NH
1092}
1093
1094static inline int hex(int v)
1095{
1096 if (v < 10) return '0' + v;
1097 else return 'A' + v - 10;
1098}
1099
1100static char *quote_ref_url(const char *base, const char *ref)
1101{
1102 const char *cp;
1103 char *dp, *qref;
1104 int len, baselen, ch;
1105
1106 baselen = strlen(base);
aa1dbc98 1107 len = baselen + 1;
58e60dd2
NH
1108 for (cp = ref; (ch = *cp) != 0; cp++, len++)
1109 if (needs_quote(ch))
1110 len += 2; /* extra two hex plus replacement % */
1111 qref = xmalloc(len);
1112 memcpy(qref, base, baselen);
aa1dbc98 1113 for (cp = ref, dp = qref + baselen; (ch = *cp) != 0; cp++) {
58e60dd2
NH
1114 if (needs_quote(ch)) {
1115 *dp++ = '%';
1116 *dp++ = hex((ch >> 4) & 0xF);
1117 *dp++ = hex(ch & 0xF);
1118 }
1119 else
1120 *dp++ = ch;
1121 }
1122 *dp = 0;
1123
1124 return qref;
1125}
1126
1127int fetch_ref(char *ref, unsigned char *sha1)
1128{
1129 char *url;
1130 char hex[42];
1131 struct buffer buffer;
1132 char *base = remote->url;
1133 struct active_request_slot *slot;
baa7b67d 1134 struct slot_results results;
58e60dd2
NH
1135 buffer.size = 41;
1136 buffer.posn = 0;
1137 buffer.buffer = hex;
1138 hex[41] = '\0';
baa7b67d 1139
58e60dd2
NH
1140 url = quote_ref_url(base, ref);
1141 slot = get_active_slot();
baa7b67d 1142 slot->results = &results;
58e60dd2 1143 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
29508e1e 1144 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1145 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
1146 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1147 if (start_active_slot(slot)) {
1148 run_active_slot(slot);
baa7b67d 1149 if (results.curl_result != CURLE_OK)
58e60dd2
NH
1150 return error("Couldn't get %s for %s\n%s",
1151 url, ref, curl_errorstr);
1152 } else {
1153 return error("Unable to start request");
1154 }
1155
1156 hex[40] = '\0';
1157 get_sha1_hex(hex, sha1);
1158 return 0;
1159}
1160
aa1dbc98
NH
1161static void one_remote_object(const char *hex)
1162{
1163 unsigned char sha1[20];
1164 struct object *obj;
1165
1166 if (get_sha1_hex(hex, sha1) != 0)
1167 return;
1168
1169 obj = lookup_object(sha1);
1170 if (!obj)
1171 obj = parse_object(sha1);
1172
1173 /* Ignore remote objects that don't exist locally */
1174 if (!obj)
1175 return;
1176
1177 obj->flags |= REMOTE;
1178 if (!object_list_contains(objects, obj))
1f1e895f 1179 object_list_insert(obj, &objects);
aa1dbc98
NH
1180}
1181
acf59575 1182static void handle_lockprop_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1183{
acf59575
NH
1184 int *lock_flags = (int *)ctx->userData;
1185
1186 if (tag_closed) {
1187 if (!strcmp(ctx->name, DAV_CTX_LOCKENTRY)) {
1188 if ((*lock_flags & DAV_PROP_LOCKEX) &&
1189 (*lock_flags & DAV_PROP_LOCKWR)) {
1190 *lock_flags |= DAV_LOCK_OK;
1191 }
1192 *lock_flags &= DAV_LOCK_OK;
1193 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_WRITE)) {
1194 *lock_flags |= DAV_PROP_LOCKWR;
1195 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_EXCLUSIVE)) {
1196 *lock_flags |= DAV_PROP_LOCKEX;
1197 }
1198 }
26349b2e
NH
1199}
1200
acf59575 1201static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1202{
aa1dbc98 1203 struct remote_lock *lock = (struct remote_lock *)ctx->userData;
acf59575
NH
1204
1205 if (tag_closed && ctx->cdata) {
1206 if (!strcmp(ctx->name, DAV_ACTIVELOCK_OWNER)) {
1207 lock->owner = xmalloc(strlen(ctx->cdata) + 1);
1208 strcpy(lock->owner, ctx->cdata);
1209 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TIMEOUT)) {
cc44c765 1210 if (!prefixcmp(ctx->cdata, "Second-"))
acf59575
NH
1211 lock->timeout =
1212 strtol(ctx->cdata + 7, NULL, 10);
1213 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
cc44c765 1214 if (!prefixcmp(ctx->cdata, "opaquelocktoken:")) {
3e2f62be 1215 lock->token = xmalloc(strlen(ctx->cdata) - 15);
acf59575
NH
1216 strcpy(lock->token, ctx->cdata + 16);
1217 }
1218 }
26349b2e
NH
1219 }
1220}
1221
aa1dbc98 1222static void one_remote_ref(char *refname);
aa1dbc98 1223
26349b2e 1224static void
acf59575 1225xml_start_tag(void *userData, const char *name, const char **atts)
26349b2e 1226{
acf59575 1227 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1228 const char *c = strchr(name, ':');
acf59575
NH
1229 int new_len;
1230
1231 if (c == NULL)
1232 c = name;
1233 else
1234 c++;
1235
1236 new_len = strlen(ctx->name) + strlen(c) + 2;
1237
1238 if (new_len > ctx->len) {
1239 ctx->name = xrealloc(ctx->name, new_len);
1240 ctx->len = new_len;
26349b2e 1241 }
acf59575
NH
1242 strcat(ctx->name, ".");
1243 strcat(ctx->name, c);
26349b2e 1244
4cac42b1
JH
1245 free(ctx->cdata);
1246 ctx->cdata = NULL;
acf59575
NH
1247
1248 ctx->userFunc(ctx, 0);
26349b2e
NH
1249}
1250
58e60dd2 1251static void
acf59575 1252xml_end_tag(void *userData, const char *name)
58e60dd2 1253{
acf59575 1254 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1255 const char *c = strchr(name, ':');
acf59575 1256 char *ep;
58e60dd2 1257
acf59575
NH
1258 ctx->userFunc(ctx, 1);
1259
1260 if (c == NULL)
1261 c = name;
1262 else
1263 c++;
1264
1265 ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
1266 *ep = 0;
58e60dd2
NH
1267}
1268
1269static void
acf59575 1270xml_cdata(void *userData, const XML_Char *s, int len)
58e60dd2 1271{
acf59575 1272 struct xml_ctx *ctx = (struct xml_ctx *)userData;
4cac42b1 1273 free(ctx->cdata);
182af834 1274 ctx->cdata = xmemdupz(s, len);
58e60dd2
NH
1275}
1276
554fe20d 1277static struct remote_lock *lock_remote(const char *path, long timeout)
58e60dd2
NH
1278{
1279 struct active_request_slot *slot;
baa7b67d 1280 struct slot_results results;
58e60dd2 1281 struct buffer out_buffer;
26349b2e 1282 struct buffer in_buffer;
58e60dd2 1283 char *out_data;
26349b2e 1284 char *in_data;
58e60dd2 1285 char *url;
0772b9a6 1286 char *ep;
58e60dd2 1287 char timeout_header[25];
512d632c 1288 struct remote_lock *lock = NULL;
26349b2e
NH
1289 XML_Parser parser = XML_ParserCreate(NULL);
1290 enum XML_Status result;
58e60dd2 1291 struct curl_slist *dav_headers = NULL;
acf59575 1292 struct xml_ctx ctx;
58e60dd2 1293
aa1dbc98
NH
1294 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
1295 sprintf(url, "%s%s", remote->url, path);
1296
0772b9a6 1297 /* Make sure leading directories exist for the remote ref */
2c46759d 1298 ep = strchr(url + strlen(remote->url) + 1, '/');
0772b9a6
NH
1299 while (ep) {
1300 *ep = 0;
1301 slot = get_active_slot();
baa7b67d 1302 slot->results = &results;
0772b9a6
NH
1303 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
1304 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1305 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
1306 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1307 if (start_active_slot(slot)) {
1308 run_active_slot(slot);
baa7b67d
NH
1309 if (results.curl_result != CURLE_OK &&
1310 results.http_code != 405) {
0772b9a6
NH
1311 fprintf(stderr,
1312 "Unable to create branch path %s\n",
1313 url);
1314 free(url);
1315 return NULL;
1316 }
1317 } else {
1a703cba 1318 fprintf(stderr, "Unable to start MKCOL request\n");
0772b9a6
NH
1319 free(url);
1320 return NULL;
1321 }
1322 *ep = '/';
1323 ep = strchr(ep + 1, '/');
1324 }
1325
58e60dd2
NH
1326 out_buffer.size = strlen(LOCK_REQUEST) + strlen(git_default_email) - 2;
1327 out_data = xmalloc(out_buffer.size + 1);
1328 snprintf(out_data, out_buffer.size + 1, LOCK_REQUEST, git_default_email);
1329 out_buffer.posn = 0;
1330 out_buffer.buffer = out_data;
1331
26349b2e
NH
1332 in_buffer.size = 4096;
1333 in_data = xmalloc(in_buffer.size);
1334 in_buffer.posn = 0;
1335 in_buffer.buffer = in_data;
1336
75187c9d 1337 sprintf(timeout_header, "Timeout: Second-%ld", timeout);
58e60dd2
NH
1338 dav_headers = curl_slist_append(dav_headers, timeout_header);
1339 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1340
1341 slot = get_active_slot();
baa7b67d 1342 slot->results = &results;
58e60dd2
NH
1343 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1344 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1345 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
26349b2e 1346 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1347 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1348 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1349 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1350 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
1351 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1352
aa1dbc98 1353 lock = xcalloc(1, sizeof(*lock));
aa1dbc98 1354 lock->timeout = -1;
acf59575 1355
58e60dd2
NH
1356 if (start_active_slot(slot)) {
1357 run_active_slot(slot);
baa7b67d 1358 if (results.curl_result == CURLE_OK) {
acf59575
NH
1359 ctx.name = xcalloc(10, 1);
1360 ctx.len = 0;
1361 ctx.cdata = NULL;
1362 ctx.userFunc = handle_new_lock_ctx;
aa1dbc98 1363 ctx.userData = lock;
acf59575
NH
1364 XML_SetUserData(parser, &ctx);
1365 XML_SetElementHandler(parser, xml_start_tag,
1366 xml_end_tag);
1367 XML_SetCharacterDataHandler(parser, xml_cdata);
1368 result = XML_Parse(parser, in_buffer.buffer,
1369 in_buffer.posn, 1);
1370 free(ctx.name);
1371 if (result != XML_STATUS_OK) {
1372 fprintf(stderr, "XML error: %s\n",
1373 XML_ErrorString(
1374 XML_GetErrorCode(parser)));
aa1dbc98 1375 lock->timeout = -1;
acf59575 1376 }
58e60dd2
NH
1377 }
1378 } else {
1a703cba 1379 fprintf(stderr, "Unable to start LOCK request\n");
58e60dd2
NH
1380 }
1381
acf59575 1382 curl_slist_free_all(dav_headers);
0772b9a6 1383 free(out_data);
26349b2e 1384 free(in_data);
26349b2e 1385
aa1dbc98
NH
1386 if (lock->token == NULL || lock->timeout <= 0) {
1387 if (lock->token != NULL)
1388 free(lock->token);
1389 if (lock->owner != NULL)
1390 free(lock->owner);
75187c9d 1391 free(url);
aa1dbc98
NH
1392 free(lock);
1393 lock = NULL;
acf59575 1394 } else {
aa1dbc98 1395 lock->url = url;
aa1dbc98 1396 lock->start_time = time(NULL);
512d632c
NH
1397 lock->next = remote->locks;
1398 remote->locks = lock;
26349b2e
NH
1399 }
1400
aa1dbc98 1401 return lock;
58e60dd2
NH
1402}
1403
aa1dbc98 1404static int unlock_remote(struct remote_lock *lock)
58e60dd2
NH
1405{
1406 struct active_request_slot *slot;
baa7b67d 1407 struct slot_results results;
512d632c 1408 struct remote_lock *prev = remote->locks;
58e60dd2
NH
1409 char *lock_token_header;
1410 struct curl_slist *dav_headers = NULL;
1411 int rc = 0;
1412
26349b2e 1413 lock_token_header = xmalloc(strlen(lock->token) + 31);
58e60dd2 1414 sprintf(lock_token_header, "Lock-Token: <opaquelocktoken:%s>",
26349b2e 1415 lock->token);
58e60dd2
NH
1416 dav_headers = curl_slist_append(dav_headers, lock_token_header);
1417
1418 slot = get_active_slot();
baa7b67d 1419 slot->results = &results;
58e60dd2 1420 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
75187c9d 1421 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1422 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_UNLOCK);
1423 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1424
1425 if (start_active_slot(slot)) {
1426 run_active_slot(slot);
baa7b67d 1427 if (results.curl_result == CURLE_OK)
58e60dd2
NH
1428 rc = 1;
1429 else
512d632c 1430 fprintf(stderr, "UNLOCK HTTP error %ld\n",
baa7b67d 1431 results.http_code);
58e60dd2 1432 } else {
512d632c 1433 fprintf(stderr, "Unable to start UNLOCK request\n");
58e60dd2
NH
1434 }
1435
1436 curl_slist_free_all(dav_headers);
1437 free(lock_token_header);
75187c9d 1438
512d632c
NH
1439 if (remote->locks == lock) {
1440 remote->locks = lock->next;
1441 } else {
1442 while (prev && prev->next != lock)
1443 prev = prev->next;
1444 if (prev)
1445 prev->next = prev->next->next;
1446 }
1447
1448 if (lock->owner != NULL)
1449 free(lock->owner);
1450 free(lock->url);
1451 free(lock->token);
1452 free(lock);
58e60dd2
NH
1453
1454 return rc;
1455}
1456
3030baa7
NH
1457static void remote_ls(const char *path, int flags,
1458 void (*userFunc)(struct remote_ls_ctx *ls),
1459 void *userData);
aa1dbc98 1460
3030baa7
NH
1461static void process_ls_object(struct remote_ls_ctx *ls)
1462{
1463 unsigned int *parent = (unsigned int *)ls->userData;
1464 char *path = ls->dentry_name;
1465 char *obj_hex;
aa1dbc98 1466
3030baa7
NH
1467 if (!strcmp(ls->path, ls->dentry_name) && (ls->flags & IS_DIR)) {
1468 remote_dir_exists[*parent] = 1;
1469 return;
1470 }
aa1dbc98 1471
3030baa7
NH
1472 if (strlen(path) != 49)
1473 return;
1474 path += 8;
1475 obj_hex = xmalloc(strlen(path));
eecc8367
ER
1476 /* NB: path is not null-terminated, can not use strlcpy here */
1477 memcpy(obj_hex, path, 2);
3030baa7
NH
1478 strcpy(obj_hex + 2, path + 3);
1479 one_remote_object(obj_hex);
1480 free(obj_hex);
1481}
aa1dbc98 1482
3030baa7
NH
1483static void process_ls_ref(struct remote_ls_ctx *ls)
1484{
1485 if (!strcmp(ls->path, ls->dentry_name) && (ls->dentry_flags & IS_DIR)) {
1486 fprintf(stderr, " %s\n", ls->dentry_name);
1487 return;
1488 }
aa1dbc98 1489
3030baa7
NH
1490 if (!(ls->dentry_flags & IS_DIR))
1491 one_remote_ref(ls->dentry_name);
1492}
aa1dbc98 1493
3030baa7
NH
1494static void handle_remote_ls_ctx(struct xml_ctx *ctx, int tag_closed)
1495{
1496 struct remote_ls_ctx *ls = (struct remote_ls_ctx *)ctx->userData;
aa1dbc98 1497
3030baa7
NH
1498 if (tag_closed) {
1499 if (!strcmp(ctx->name, DAV_PROPFIND_RESP) && ls->dentry_name) {
1500 if (ls->dentry_flags & IS_DIR) {
1501 if (ls->flags & PROCESS_DIRS) {
1502 ls->userFunc(ls);
1503 }
1504 if (strcmp(ls->dentry_name, ls->path) &&
1505 ls->flags & RECURSIVE) {
1506 remote_ls(ls->dentry_name,
1507 ls->flags,
1508 ls->userFunc,
1509 ls->userData);
1510 }
1511 } else if (ls->flags & PROCESS_FILES) {
1512 ls->userFunc(ls);
aa1dbc98 1513 }
3030baa7
NH
1514 } else if (!strcmp(ctx->name, DAV_PROPFIND_NAME) && ctx->cdata) {
1515 ls->dentry_name = xmalloc(strlen(ctx->cdata) -
1516 remote->path_len + 1);
1517 strcpy(ls->dentry_name, ctx->cdata + remote->path_len);
1518 } else if (!strcmp(ctx->name, DAV_PROPFIND_COLLECTION)) {
1519 ls->dentry_flags |= IS_DIR;
aa1dbc98 1520 }
3030baa7 1521 } else if (!strcmp(ctx->name, DAV_PROPFIND_RESP)) {
4cac42b1 1522 free(ls->dentry_name);
3030baa7
NH
1523 ls->dentry_name = NULL;
1524 ls->dentry_flags = 0;
aa1dbc98 1525 }
aa1dbc98
NH
1526}
1527
3030baa7
NH
1528static void remote_ls(const char *path, int flags,
1529 void (*userFunc)(struct remote_ls_ctx *ls),
1530 void *userData)
aa1dbc98 1531{
3030baa7 1532 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
aa1dbc98 1533 struct active_request_slot *slot;
baa7b67d 1534 struct slot_results results;
aa1dbc98
NH
1535 struct buffer in_buffer;
1536 struct buffer out_buffer;
1537 char *in_data;
1538 char *out_data;
1539 XML_Parser parser = XML_ParserCreate(NULL);
1540 enum XML_Status result;
1541 struct curl_slist *dav_headers = NULL;
1542 struct xml_ctx ctx;
3030baa7
NH
1543 struct remote_ls_ctx ls;
1544
1545 ls.flags = flags;
9befac47 1546 ls.path = xstrdup(path);
3030baa7
NH
1547 ls.dentry_name = NULL;
1548 ls.dentry_flags = 0;
1549 ls.userData = userData;
1550 ls.userFunc = userFunc;
aa1dbc98 1551
aa1dbc98
NH
1552 sprintf(url, "%s%s", remote->url, path);
1553
1554 out_buffer.size = strlen(PROPFIND_ALL_REQUEST);
1555 out_data = xmalloc(out_buffer.size + 1);
1556 snprintf(out_data, out_buffer.size + 1, PROPFIND_ALL_REQUEST);
1557 out_buffer.posn = 0;
1558 out_buffer.buffer = out_data;
1559
1560 in_buffer.size = 4096;
1561 in_data = xmalloc(in_buffer.size);
1562 in_buffer.posn = 0;
1563 in_buffer.buffer = in_data;
1564
1565 dav_headers = curl_slist_append(dav_headers, "Depth: 1");
1566 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1567
1568 slot = get_active_slot();
baa7b67d 1569 slot->results = &results;
aa1dbc98
NH
1570 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1571 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1572 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1573 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
1574 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
1575 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1576 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1577 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1578 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1579
1580 if (start_active_slot(slot)) {
1581 run_active_slot(slot);
baa7b67d 1582 if (results.curl_result == CURLE_OK) {
aa1dbc98
NH
1583 ctx.name = xcalloc(10, 1);
1584 ctx.len = 0;
1585 ctx.cdata = NULL;
3030baa7
NH
1586 ctx.userFunc = handle_remote_ls_ctx;
1587 ctx.userData = &ls;
aa1dbc98
NH
1588 XML_SetUserData(parser, &ctx);
1589 XML_SetElementHandler(parser, xml_start_tag,
1590 xml_end_tag);
1591 XML_SetCharacterDataHandler(parser, xml_cdata);
1592 result = XML_Parse(parser, in_buffer.buffer,
1593 in_buffer.posn, 1);
1594 free(ctx.name);
1595
1596 if (result != XML_STATUS_OK) {
1597 fprintf(stderr, "XML error: %s\n",
1598 XML_ErrorString(
1599 XML_GetErrorCode(parser)));
1600 }
aa1dbc98
NH
1601 }
1602 } else {
3030baa7 1603 fprintf(stderr, "Unable to start PROPFIND request\n");
aa1dbc98
NH
1604 }
1605
3030baa7 1606 free(ls.path);
aa1dbc98
NH
1607 free(url);
1608 free(out_data);
1609 free(in_buffer.buffer);
1610 curl_slist_free_all(dav_headers);
1611}
1612
3030baa7
NH
1613static void get_remote_object_list(unsigned char parent)
1614{
1615 char path[] = "objects/XX/";
1616 static const char hex[] = "0123456789abcdef";
1617 unsigned int val = parent;
1618
1619 path[8] = hex[val >> 4];
1620 path[9] = hex[val & 0xf];
1621 remote_dir_exists[val] = 0;
1622 remote_ls(path, (PROCESS_FILES | PROCESS_DIRS),
1623 process_ls_object, &val);
1624}
1625
acf59575 1626static int locking_available(void)
58e60dd2
NH
1627{
1628 struct active_request_slot *slot;
baa7b67d 1629 struct slot_results results;
58e60dd2
NH
1630 struct buffer in_buffer;
1631 struct buffer out_buffer;
1632 char *in_data;
1633 char *out_data;
1634 XML_Parser parser = XML_ParserCreate(NULL);
1635 enum XML_Status result;
58e60dd2 1636 struct curl_slist *dav_headers = NULL;
acf59575
NH
1637 struct xml_ctx ctx;
1638 int lock_flags = 0;
58e60dd2 1639
aa1dbc98
NH
1640 out_buffer.size =
1641 strlen(PROPFIND_SUPPORTEDLOCK_REQUEST) +
1642 strlen(remote->url) - 2;
58e60dd2 1643 out_data = xmalloc(out_buffer.size + 1);
aa1dbc98
NH
1644 snprintf(out_data, out_buffer.size + 1,
1645 PROPFIND_SUPPORTEDLOCK_REQUEST, remote->url);
58e60dd2
NH
1646 out_buffer.posn = 0;
1647 out_buffer.buffer = out_data;
1648
1649 in_buffer.size = 4096;
1650 in_data = xmalloc(in_buffer.size);
1651 in_buffer.posn = 0;
1652 in_buffer.buffer = in_data;
1653
1654 dav_headers = curl_slist_append(dav_headers, "Depth: 0");
1655 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
baa7b67d 1656
58e60dd2 1657 slot = get_active_slot();
baa7b67d 1658 slot->results = &results;
58e60dd2
NH
1659 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1660 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1661 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1662 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1663 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1664 curl_easy_setopt(slot->curl, CURLOPT_URL, remote->url);
1665 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1666 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1667 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1668
1669 if (start_active_slot(slot)) {
1670 run_active_slot(slot);
baa7b67d 1671 if (results.curl_result == CURLE_OK) {
acf59575
NH
1672 ctx.name = xcalloc(10, 1);
1673 ctx.len = 0;
1674 ctx.cdata = NULL;
1675 ctx.userFunc = handle_lockprop_ctx;
1676 ctx.userData = &lock_flags;
1677 XML_SetUserData(parser, &ctx);
1678 XML_SetElementHandler(parser, xml_start_tag,
1679 xml_end_tag);
1680 result = XML_Parse(parser, in_buffer.buffer,
1681 in_buffer.posn, 1);
1682 free(ctx.name);
1683
1684 if (result != XML_STATUS_OK) {
1685 fprintf(stderr, "XML error: %s\n",
1686 XML_ErrorString(
1687 XML_GetErrorCode(parser)));
1688 lock_flags = 0;
1689 }
58e60dd2 1690 }
58e60dd2 1691 } else {
1a703cba 1692 fprintf(stderr, "Unable to start PROPFIND request\n");
58e60dd2
NH
1693 }
1694
acf59575
NH
1695 free(out_data);
1696 free(in_buffer.buffer);
1697 curl_slist_free_all(dav_headers);
1698
1699 return lock_flags;
58e60dd2
NH
1700}
1701
b5bf7cd6 1702static struct object_list **add_one_object(struct object *obj, struct object_list **p)
1f1e895f
LT
1703{
1704 struct object_list *entry = xmalloc(sizeof(struct object_list));
1705 entry->item = obj;
1706 entry->next = *p;
1707 *p = entry;
1708 return &entry->next;
1709}
1710
aa1dbc98
NH
1711static struct object_list **process_blob(struct blob *blob,
1712 struct object_list **p,
1713 struct name_path *path,
1714 const char *name)
58e60dd2 1715{
aa1dbc98 1716 struct object *obj = &blob->object;
58e60dd2 1717
aa1dbc98
NH
1718 obj->flags |= LOCAL;
1719
1720 if (obj->flags & (UNINTERESTING | SEEN))
1721 return p;
1722
1723 obj->flags |= SEEN;
1f1e895f 1724 return add_one_object(obj, p);
aa1dbc98
NH
1725}
1726
1727static struct object_list **process_tree(struct tree *tree,
1728 struct object_list **p,
1729 struct name_path *path,
1730 const char *name)
1731{
1732 struct object *obj = &tree->object;
2d9c58c6 1733 struct tree_desc desc;
4c068a98 1734 struct name_entry entry;
aa1dbc98
NH
1735 struct name_path me;
1736
1737 obj->flags |= LOCAL;
1738
1739 if (obj->flags & (UNINTERESTING | SEEN))
1740 return p;
1741 if (parse_tree(tree) < 0)
1742 die("bad tree object %s", sha1_to_hex(obj->sha1));
1743
1744 obj->flags |= SEEN;
9befac47 1745 name = xstrdup(name);
1f1e895f 1746 p = add_one_object(obj, p);
aa1dbc98
NH
1747 me.up = path;
1748 me.elem = name;
1749 me.elem_len = strlen(name);
2d9c58c6 1750
6fda5e51 1751 init_tree_desc(&desc, tree->buffer, tree->size);
2d9c58c6 1752
4c068a98
LT
1753 while (tree_entry(&desc, &entry)) {
1754 if (S_ISDIR(entry.mode))
1755 p = process_tree(lookup_tree(entry.sha1), p, &me, name);
aa1dbc98 1756 else
4c068a98 1757 p = process_blob(lookup_blob(entry.sha1), p, &me, name);
58e60dd2 1758 }
2d9c58c6
LT
1759 free(tree->buffer);
1760 tree->buffer = NULL;
aa1dbc98 1761 return p;
58e60dd2
NH
1762}
1763
1a703cba 1764static int get_delta(struct rev_info *revs, struct remote_lock *lock)
58e60dd2 1765{
1f1e895f 1766 int i;
58e60dd2 1767 struct commit *commit;
1f1e895f 1768 struct object_list **p = &objects;
1a703cba 1769 int count = 0;
58e60dd2 1770
aa1dbc98
NH
1771 while ((commit = get_revision(revs)) != NULL) {
1772 p = process_tree(commit->tree, p, NULL, "");
1773 commit->object.flags |= LOCAL;
1774 if (!(commit->object.flags & UNINTERESTING))
1a703cba 1775 count += add_send_request(&commit->object, lock);
aa1dbc98 1776 }
58e60dd2 1777
1f1e895f
LT
1778 for (i = 0; i < revs->pending.nr; i++) {
1779 struct object_array_entry *entry = revs->pending.objects + i;
1780 struct object *obj = entry->item;
1781 const char *name = entry->name;
58e60dd2 1782
aa1dbc98
NH
1783 if (obj->flags & (UNINTERESTING | SEEN))
1784 continue;
1974632c 1785 if (obj->type == OBJ_TAG) {
aa1dbc98 1786 obj->flags |= SEEN;
1f1e895f 1787 p = add_one_object(obj, p);
aa1dbc98 1788 continue;
58e60dd2 1789 }
1974632c 1790 if (obj->type == OBJ_TREE) {
aa1dbc98
NH
1791 p = process_tree((struct tree *)obj, p, NULL, name);
1792 continue;
58e60dd2 1793 }
1974632c 1794 if (obj->type == OBJ_BLOB) {
aa1dbc98
NH
1795 p = process_blob((struct blob *)obj, p, NULL, name);
1796 continue;
58e60dd2 1797 }
aa1dbc98
NH
1798 die("unknown pending object %s (%s)", sha1_to_hex(obj->sha1), name);
1799 }
1800
1801 while (objects) {
1802 if (!(objects->item->flags & UNINTERESTING))
1a703cba 1803 count += add_send_request(objects->item, lock);
aa1dbc98 1804 objects = objects->next;
58e60dd2 1805 }
1a703cba
NH
1806
1807 return count;
58e60dd2
NH
1808}
1809
aa1dbc98 1810static int update_remote(unsigned char *sha1, struct remote_lock *lock)
58e60dd2
NH
1811{
1812 struct active_request_slot *slot;
baa7b67d 1813 struct slot_results results;
58e60dd2
NH
1814 char *out_data;
1815 char *if_header;
1816 struct buffer out_buffer;
1817 struct curl_slist *dav_headers = NULL;
1818 int i;
1819
26349b2e
NH
1820 if_header = xmalloc(strlen(lock->token) + 25);
1821 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
58e60dd2
NH
1822 dav_headers = curl_slist_append(dav_headers, if_header);
1823
1824 out_buffer.size = 41;
1825 out_data = xmalloc(out_buffer.size + 1);
1826 i = snprintf(out_data, out_buffer.size + 1, "%s\n", sha1_to_hex(sha1));
1827 if (i != out_buffer.size) {
1828 fprintf(stderr, "Unable to initialize PUT request body\n");
1829 return 0;
1830 }
1831 out_buffer.posn = 0;
1832 out_buffer.buffer = out_data;
1833
1834 slot = get_active_slot();
baa7b67d 1835 slot->results = &results;
58e60dd2
NH
1836 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1837 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1838 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1839 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1840 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1841 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1842 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1843 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
75187c9d 1844 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1845
1846 if (start_active_slot(slot)) {
1847 run_active_slot(slot);
1848 free(out_data);
1849 free(if_header);
baa7b67d 1850 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1851 fprintf(stderr,
1852 "PUT error: curl result=%d, HTTP code=%ld\n",
baa7b67d 1853 results.curl_result, results.http_code);
58e60dd2
NH
1854 /* We should attempt recovery? */
1855 return 0;
1856 }
1857 } else {
1858 free(out_data);
1859 free(if_header);
58e60dd2
NH
1860 fprintf(stderr, "Unable to start PUT request\n");
1861 return 0;
1862 }
1863
1864 return 1;
1865}
1866
aa1dbc98
NH
1867static struct ref *local_refs, **local_tail;
1868static struct ref *remote_refs, **remote_tail;
1869
8da19775 1870static int one_local_ref(const char *refname, const unsigned char *sha1, int flag, void *cb_data)
aa1dbc98
NH
1871{
1872 struct ref *ref;
1873 int len = strlen(refname) + 1;
1874 ref = xcalloc(1, sizeof(*ref) + len);
e702496e 1875 hashcpy(ref->new_sha1, sha1);
aa1dbc98
NH
1876 memcpy(ref->name, refname, len);
1877 *local_tail = ref;
1878 local_tail = &ref->next;
1879 return 0;
1880}
1881
1882static void one_remote_ref(char *refname)
1883{
1884 struct ref *ref;
1885 unsigned char remote_sha1[20];
197e8951 1886 struct object *obj;
8c9e7947 1887 int len = strlen(refname) + 1;
aa1dbc98
NH
1888
1889 if (fetch_ref(refname, remote_sha1) != 0) {
1890 fprintf(stderr,
1891 "Unable to fetch ref %s from %s\n",
1892 refname, remote->url);
1893 return;
1894 }
1895
197e8951
NH
1896 /*
1897 * Fetch a copy of the object if it doesn't exist locally - it
1898 * may be required for updating server info later.
1899 */
1900 if (remote->can_update_info_refs && !has_sha1_file(remote_sha1)) {
1901 obj = lookup_unknown_object(remote_sha1);
1902 if (obj) {
1903 fprintf(stderr, " fetch %s for %s\n",
1904 sha1_to_hex(remote_sha1), refname);
1905 add_fetch_request(obj);
1906 }
1907 }
1908
aa1dbc98 1909 ref = xcalloc(1, sizeof(*ref) + len);
e702496e 1910 hashcpy(ref->old_sha1, remote_sha1);
aa1dbc98
NH
1911 memcpy(ref->name, refname, len);
1912 *remote_tail = ref;
1913 remote_tail = &ref->next;
1914}
1915
1916static void get_local_heads(void)
1917{
1918 local_tail = &local_refs;
cb5d709f 1919 for_each_ref(one_local_ref, NULL);
aa1dbc98
NH
1920}
1921
1922static void get_dav_remote_heads(void)
1923{
1924 remote_tail = &remote_refs;
3030baa7 1925 remote_ls("refs/", (PROCESS_FILES | PROCESS_DIRS | RECURSIVE), process_ls_ref, NULL);
aa1dbc98
NH
1926}
1927
1928static int is_zero_sha1(const unsigned char *sha1)
1929{
1930 int i;
1931
1932 for (i = 0; i < 20; i++) {
1933 if (*sha1++)
1934 return 0;
1935 }
1936 return 1;
1937}
1938
1939static void unmark_and_free(struct commit_list *list, unsigned int mark)
1940{
1941 while (list) {
1942 struct commit_list *temp = list;
1943 temp->item->object.flags &= ~mark;
1944 list = temp->next;
1945 free(temp);
1946 }
1947}
1948
1949static int ref_newer(const unsigned char *new_sha1,
1950 const unsigned char *old_sha1)
1951{
1952 struct object *o;
1953 struct commit *old, *new;
1954 struct commit_list *list, *used;
1955 int found = 0;
1956
1957 /* Both new and old must be commit-ish and new is descendant of
1958 * old. Otherwise we require --force.
1959 */
1960 o = deref_tag(parse_object(old_sha1), NULL, 0);
1974632c 1961 if (!o || o->type != OBJ_COMMIT)
aa1dbc98
NH
1962 return 0;
1963 old = (struct commit *) o;
1964
1965 o = deref_tag(parse_object(new_sha1), NULL, 0);
1974632c 1966 if (!o || o->type != OBJ_COMMIT)
aa1dbc98
NH
1967 return 0;
1968 new = (struct commit *) o;
1969
1970 if (parse_commit(new) < 0)
1971 return 0;
1972
1973 used = list = NULL;
1974 commit_list_insert(new, &list);
1975 while (list) {
1976 new = pop_most_recent_commit(&list, TMP_MARK);
1977 commit_list_insert(new, &used);
1978 if (new == old) {
1979 found = 1;
1980 break;
1981 }
1982 }
1983 unmark_and_free(list, TMP_MARK);
1984 unmark_and_free(used, TMP_MARK);
1985 return found;
1986}
1987
1988static void mark_edge_parents_uninteresting(struct commit *commit)
1989{
1990 struct commit_list *parents;
1991
1992 for (parents = commit->parents; parents; parents = parents->next) {
1993 struct commit *parent = parents->item;
1994 if (!(parent->object.flags & UNINTERESTING))
1995 continue;
1996 mark_tree_uninteresting(parent->tree);
1997 }
1998}
1999
2000static void mark_edges_uninteresting(struct commit_list *list)
2001{
2002 for ( ; list; list = list->next) {
2003 struct commit *commit = list->item;
2004
2005 if (commit->object.flags & UNINTERESTING) {
2006 mark_tree_uninteresting(commit->tree);
2007 continue;
2008 }
2009 mark_edge_parents_uninteresting(commit);
2010 }
2011}
2012
197e8951
NH
2013static void add_remote_info_ref(struct remote_ls_ctx *ls)
2014{
2015 struct buffer *buf = (struct buffer *)ls->userData;
2016 unsigned char remote_sha1[20];
2017 struct object *o;
2018 int len;
2019 char *ref_info;
2020
2021 if (fetch_ref(ls->dentry_name, remote_sha1) != 0) {
2022 fprintf(stderr,
2023 "Unable to fetch ref %s from %s\n",
2024 ls->dentry_name, remote->url);
2025 aborted = 1;
2026 return;
2027 }
2028
2029 o = parse_object(remote_sha1);
2030 if (!o) {
2031 fprintf(stderr,
2032 "Unable to parse object %s for remote ref %s\n",
2033 sha1_to_hex(remote_sha1), ls->dentry_name);
2034 aborted = 1;
2035 return;
2036 }
2037
2038 len = strlen(ls->dentry_name) + 42;
2039 ref_info = xcalloc(len + 1, 1);
2040 sprintf(ref_info, "%s %s\n",
2041 sha1_to_hex(remote_sha1), ls->dentry_name);
2042 fwrite_buffer(ref_info, 1, len, buf);
2043 free(ref_info);
2044
1974632c 2045 if (o->type == OBJ_TAG) {
197e8951
NH
2046 o = deref_tag(o, ls->dentry_name, 0);
2047 if (o) {
2048 len = strlen(ls->dentry_name) + 45;
2049 ref_info = xcalloc(len + 1, 1);
2050 sprintf(ref_info, "%s %s^{}\n",
2051 sha1_to_hex(o->sha1), ls->dentry_name);
2052 fwrite_buffer(ref_info, 1, len, buf);
2053 free(ref_info);
2054 }
2055 }
2056}
2057
2058static void update_remote_info_refs(struct remote_lock *lock)
2059{
2060 struct buffer buffer;
2061 struct active_request_slot *slot;
2062 struct slot_results results;
2063 char *if_header;
2064 struct curl_slist *dav_headers = NULL;
2065
90321c10 2066 buffer.buffer = xcalloc(1, 4096);
197e8951
NH
2067 buffer.size = 4096;
2068 buffer.posn = 0;
2069 remote_ls("refs/", (PROCESS_FILES | RECURSIVE),
2070 add_remote_info_ref, &buffer);
2071 if (!aborted) {
2072 if_header = xmalloc(strlen(lock->token) + 25);
2073 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
2074 dav_headers = curl_slist_append(dav_headers, if_header);
2075
2076 slot = get_active_slot();
2077 slot->results = &results;
2078 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &buffer);
2079 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, buffer.posn);
2080 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
2081 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
2082 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
2083 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
2084 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
2085 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
2086 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
2087
2088 buffer.posn = 0;
2089
2090 if (start_active_slot(slot)) {
2091 run_active_slot(slot);
2092 if (results.curl_result != CURLE_OK) {
2093 fprintf(stderr,
2094 "PUT error: curl result=%d, HTTP code=%ld\n",
2095 results.curl_result, results.http_code);
2096 }
2097 }
2098 free(if_header);
2099 }
2100 free(buffer.buffer);
2101}
2102
2103static int remote_exists(const char *path)
2104{
2105 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
2106 struct active_request_slot *slot;
2107 struct slot_results results;
2108
2109 sprintf(url, "%s%s", remote->url, path);
2110
2111 slot = get_active_slot();
2112 slot->results = &results;
2113 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2114 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
2115
2116 if (start_active_slot(slot)) {
2117 run_active_slot(slot);
2118 if (results.http_code == 404)
2119 return 0;
2120 else if (results.curl_result == CURLE_OK)
2121 return 1;
2122 else
2123 fprintf(stderr, "HEAD HTTP error %ld\n", results.http_code);
2124 } else {
2125 fprintf(stderr, "Unable to start HEAD request\n");
2126 }
2127
2128 return -1;
2129}
2130
554fe20d 2131static void fetch_symref(const char *path, char **symref, unsigned char *sha1)
3dfaf7bc
NH
2132{
2133 char *url;
2134 struct buffer buffer;
2135 struct active_request_slot *slot;
2136 struct slot_results results;
2137
2138 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
2139 sprintf(url, "%s%s", remote->url, path);
2140
2141 buffer.size = 4096;
2142 buffer.posn = 0;
2143 buffer.buffer = xmalloc(buffer.size);
2144
2145 slot = get_active_slot();
2146 slot->results = &results;
2147 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
2148 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
2149 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
2150 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2151 if (start_active_slot(slot)) {
2152 run_active_slot(slot);
2153 if (results.curl_result != CURLE_OK) {
2154 die("Couldn't get %s for remote symref\n%s",
2155 url, curl_errorstr);
2156 }
2157 } else {
2158 die("Unable to start remote symref request");
2159 }
2160 free(url);
2161
2162 if (*symref != NULL)
2163 free(*symref);
2164 *symref = NULL;
a8e0d16d 2165 hashclr(sha1);
3dfaf7bc
NH
2166
2167 if (buffer.posn == 0)
2168 return;
2169
2170 /* If it's a symref, set the refname; otherwise try for a sha1 */
cc44c765 2171 if (!prefixcmp((char *)buffer.buffer, "ref: ")) {
182af834 2172 *symref = xmemdupz((char *)buffer.buffer + 5, buffer.posn - 6);
3dfaf7bc
NH
2173 } else {
2174 get_sha1_hex(buffer.buffer, sha1);
2175 }
2176
2177 free(buffer.buffer);
2178}
2179
2180static int verify_merge_base(unsigned char *head_sha1, unsigned char *branch_sha1)
2181{
61ffbcb9
JS
2182 struct commit *head = lookup_commit(head_sha1);
2183 struct commit *branch = lookup_commit(branch_sha1);
2184 struct commit_list *merge_bases = get_merge_bases(head, branch, 1);
3dfaf7bc 2185
0bc87ffb 2186 return (merge_bases && !merge_bases->next && merge_bases->item == branch);
3dfaf7bc
NH
2187}
2188
2189static int delete_remote_branch(char *pattern, int force)
2190{
2191 struct ref *refs = remote_refs;
2192 struct ref *remote_ref = NULL;
2193 unsigned char head_sha1[20];
2194 char *symref = NULL;
2195 int match;
2196 int patlen = strlen(pattern);
2197 int i;
2198 struct active_request_slot *slot;
2199 struct slot_results results;
2200 char *url;
2201
2202 /* Find the remote branch(es) matching the specified branch name */
2203 for (match = 0; refs; refs = refs->next) {
2204 char *name = refs->name;
2205 int namelen = strlen(name);
2206 if (namelen < patlen ||
2207 memcmp(name + namelen - patlen, pattern, patlen))
2208 continue;
2209 if (namelen != patlen && name[namelen - patlen - 1] != '/')
2210 continue;
2211 match++;
2212 remote_ref = refs;
2213 }
2214 if (match == 0)
2215 return error("No remote branch matches %s", pattern);
2216 if (match != 1)
2217 return error("More than one remote branch matches %s",
2218 pattern);
2219
2220 /*
2221 * Remote HEAD must be a symref (not exactly foolproof; a remote
2222 * symlink to a symref will look like a symref)
2223 */
2224 fetch_symref("HEAD", &symref, head_sha1);
2225 if (!symref)
2226 return error("Remote HEAD is not a symref");
2227
2228 /* Remote branch must not be the remote HEAD */
2229 for (i=0; symref && i<MAXDEPTH; i++) {
2230 if (!strcmp(remote_ref->name, symref))
2231 return error("Remote branch %s is the current HEAD",
2232 remote_ref->name);
2233 fetch_symref(symref, &symref, head_sha1);
2234 }
2235
2236 /* Run extra sanity checks if delete is not forced */
2237 if (!force) {
2238 /* Remote HEAD must resolve to a known object */
2239 if (symref)
2240 return error("Remote HEAD symrefs too deep");
2241 if (is_zero_sha1(head_sha1))
2242 return error("Unable to resolve remote HEAD");
2243 if (!has_sha1_file(head_sha1))
2244 return error("Remote HEAD resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", sha1_to_hex(head_sha1));
2245
2246 /* Remote branch must resolve to a known object */
2247 if (is_zero_sha1(remote_ref->old_sha1))
2248 return error("Unable to resolve remote branch %s",
2249 remote_ref->name);
2250 if (!has_sha1_file(remote_ref->old_sha1))
2251 return error("Remote branch %s resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", remote_ref->name, sha1_to_hex(remote_ref->old_sha1));
2252
2253 /* Remote branch must be an ancestor of remote HEAD */
2254 if (!verify_merge_base(head_sha1, remote_ref->old_sha1)) {
2255 return error("The branch '%s' is not a strict subset of your current HEAD.\nIf you are sure you want to delete it, run:\n\t'git http-push -D %s %s'", remote_ref->name, remote->url, pattern);
2256 }
2257 }
2258
2259 /* Send delete request */
2260 fprintf(stderr, "Removing remote branch '%s'\n", remote_ref->name);
2261 url = xmalloc(strlen(remote->url) + strlen(remote_ref->name) + 1);
2262 sprintf(url, "%s%s", remote->url, remote_ref->name);
2263 slot = get_active_slot();
2264 slot->results = &results;
2265 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
2266 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
2267 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2268 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_DELETE);
2269 if (start_active_slot(slot)) {
2270 run_active_slot(slot);
2271 free(url);
2272 if (results.curl_result != CURLE_OK)
2273 return error("DELETE request failed (%d/%ld)\n",
2274 results.curl_result, results.http_code);
2275 } else {
2276 free(url);
2277 return error("Unable to start DELETE request");
2278 }
2279
2280 return 0;
2281}
2282
58e60dd2
NH
2283int main(int argc, char **argv)
2284{
58e60dd2
NH
2285 struct transfer_request *request;
2286 struct transfer_request *next_request;
2287 int nr_refspec = 0;
2288 char **refspec = NULL;
512d632c 2289 struct remote_lock *ref_lock = NULL;
197e8951 2290 struct remote_lock *info_ref_lock = NULL;
aa1dbc98 2291 struct rev_info revs;
3dfaf7bc
NH
2292 int delete_branch = 0;
2293 int force_delete = 0;
1a703cba 2294 int objects_to_send;
58e60dd2
NH
2295 int rc = 0;
2296 int i;
8c9e7947
JH
2297 int new_refs;
2298 struct ref *ref;
58e60dd2 2299
5a327713 2300 setup_git_directory();
58e60dd2 2301
512d632c 2302 remote = xcalloc(sizeof(*remote), 1);
58e60dd2
NH
2303
2304 argv++;
2305 for (i = 1; i < argc; i++, argv++) {
2306 char *arg = *argv;
2307
2308 if (*arg == '-') {
aa1dbc98 2309 if (!strcmp(arg, "--all")) {
58e60dd2
NH
2310 push_all = 1;
2311 continue;
2312 }
2313 if (!strcmp(arg, "--force")) {
2314 force_all = 1;
2315 continue;
2316 }
2317 if (!strcmp(arg, "--verbose")) {
2318 push_verbosely = 1;
2319 continue;
2320 }
3dfaf7bc
NH
2321 if (!strcmp(arg, "-d")) {
2322 delete_branch = 1;
2323 continue;
2324 }
2325 if (!strcmp(arg, "-D")) {
2326 delete_branch = 1;
2327 force_delete = 1;
2328 continue;
2329 }
58e60dd2
NH
2330 }
2331 if (!remote->url) {
aa1dbc98 2332 char *path = strstr(arg, "//");
8c9e7947 2333 remote->url = arg;
aa1dbc98 2334 if (path) {
ef9e58c8 2335 path = strchr(path+2, '/');
aa1dbc98
NH
2336 if (path)
2337 remote->path_len = strlen(path);
2338 }
58e60dd2
NH
2339 continue;
2340 }
2341 refspec = argv;
2342 nr_refspec = argc - i;
2343 break;
2344 }
2345
3e9fabc8
NH
2346 if (!remote->url)
2347 usage(http_push_usage);
2348
3dfaf7bc
NH
2349 if (delete_branch && nr_refspec != 1)
2350 die("You must specify only one branch name when deleting a remote branch");
2351
aa1dbc98 2352 memset(remote_dir_exists, -1, 256);
0dd276b8 2353
29508e1e 2354 http_init();
58e60dd2
NH
2355
2356 no_pragma_header = curl_slist_append(no_pragma_header, "Pragma:");
2357 default_headers = curl_slist_append(default_headers, "Range:");
2358 default_headers = curl_slist_append(default_headers, "Destination:");
2359 default_headers = curl_slist_append(default_headers, "If:");
2360 default_headers = curl_slist_append(default_headers,
2361 "Pragma: no-cache");
2362
58e60dd2 2363 /* Verify DAV compliance/lock support */
acf59575 2364 if (!locking_available()) {
58e60dd2
NH
2365 fprintf(stderr, "Error: no DAV locking support on remote repo %s\n", remote->url);
2366 rc = 1;
2367 goto cleanup;
2368 }
2369
197e8951
NH
2370 /* Check whether the remote has server info files */
2371 remote->can_update_info_refs = 0;
2372 remote->has_info_refs = remote_exists("info/refs");
2373 remote->has_info_packs = remote_exists("objects/info/packs");
2374 if (remote->has_info_refs) {
2375 info_ref_lock = lock_remote("info/refs", LOCK_TIME);
2376 if (info_ref_lock)
2377 remote->can_update_info_refs = 1;
2378 }
2379 if (remote->has_info_packs)
2380 fetch_indices();
2381
aa1dbc98
NH
2382 /* Get a list of all local and remote heads to validate refspecs */
2383 get_local_heads();
2384 fprintf(stderr, "Fetching remote heads...\n");
2385 get_dav_remote_heads();
2386
3dfaf7bc
NH
2387 /* Remove a remote branch if -d or -D was specified */
2388 if (delete_branch) {
2389 if (delete_remote_branch(refspec[0], force_delete) == -1)
2390 fprintf(stderr, "Unable to delete remote branch %s\n",
2391 refspec[0]);
2392 goto cleanup;
2393 }
2394
aa1dbc98
NH
2395 /* match them up */
2396 if (!remote_tail)
2397 remote_tail = &remote_refs;
2398 if (match_refs(local_refs, remote_refs, &remote_tail,
2399 nr_refspec, refspec, push_all))
2400 return -1;
2401 if (!remote_refs) {
2402 fprintf(stderr, "No refs in common and none specified; doing nothing.\n");
2403 return 0;
2404 }
2405
8c9e7947 2406 new_refs = 0;
aa1dbc98
NH
2407 for (ref = remote_refs; ref; ref = ref->next) {
2408 char old_hex[60], *new_hex;
8c9e7947
JH
2409 const char *commit_argv[4];
2410 int commit_argc;
2411 char *new_sha1_hex, *old_sha1_hex;
2412
aa1dbc98
NH
2413 if (!ref->peer_ref)
2414 continue;
a89fccd2 2415 if (!hashcmp(ref->old_sha1, ref->peer_ref->new_sha1)) {
aa1dbc98
NH
2416 if (push_verbosely || 1)
2417 fprintf(stderr, "'%s': up-to-date\n", ref->name);
2418 continue;
2419 }
2420
2421 if (!force_all &&
2422 !is_zero_sha1(ref->old_sha1) &&
2423 !ref->force) {
2424 if (!has_sha1_file(ref->old_sha1) ||
2425 !ref_newer(ref->peer_ref->new_sha1,
2426 ref->old_sha1)) {
2427 /* We do not have the remote ref, or
2428 * we know that the remote ref is not
2429 * an ancestor of what we are trying to
2430 * push. Either way this can be losing
2431 * commits at the remote end and likely
2432 * we were not up to date to begin with.
2433 */
2434 error("remote '%s' is not a strict "
2435 "subset of local ref '%s'. "
2436 "maybe you are not up-to-date and "
2437 "need to pull first?",
2438 ref->name,
2439 ref->peer_ref->name);
1a703cba 2440 rc = -2;
aa1dbc98
NH
2441 continue;
2442 }
58e60dd2 2443 }
e702496e 2444 hashcpy(ref->new_sha1, ref->peer_ref->new_sha1);
aa1dbc98
NH
2445 if (is_zero_sha1(ref->new_sha1)) {
2446 error("cannot happen anymore");
1a703cba 2447 rc = -3;
aa1dbc98 2448 continue;
58e60dd2 2449 }
aa1dbc98
NH
2450 new_refs++;
2451 strcpy(old_hex, sha1_to_hex(ref->old_sha1));
2452 new_hex = sha1_to_hex(ref->new_sha1);
2453
2454 fprintf(stderr, "updating '%s'", ref->name);
2455 if (strcmp(ref->name, ref->peer_ref->name))
2456 fprintf(stderr, " using '%s'", ref->peer_ref->name);
2457 fprintf(stderr, "\n from %s\n to %s\n", old_hex, new_hex);
2458
58e60dd2
NH
2459
2460 /* Lock remote branch ref */
aa1dbc98
NH
2461 ref_lock = lock_remote(ref->name, LOCK_TIME);
2462 if (ref_lock == NULL) {
58e60dd2 2463 fprintf(stderr, "Unable to lock remote branch %s\n",
aa1dbc98 2464 ref->name);
58e60dd2
NH
2465 rc = 1;
2466 continue;
2467 }
2468
aa1dbc98 2469 /* Set up revision info for this refspec */
8c9e7947 2470 commit_argc = 3;
9befac47 2471 new_sha1_hex = xstrdup(sha1_to_hex(ref->new_sha1));
8c9e7947 2472 old_sha1_hex = NULL;
5241bfe6
NH
2473 commit_argv[1] = "--objects";
2474 commit_argv[2] = new_sha1_hex;
aa1dbc98
NH
2475 if (!push_all && !is_zero_sha1(ref->old_sha1)) {
2476 old_sha1_hex = xmalloc(42);
2477 sprintf(old_sha1_hex, "^%s",
2478 sha1_to_hex(ref->old_sha1));
5241bfe6 2479 commit_argv[3] = old_sha1_hex;
aa1dbc98 2480 commit_argc++;
58e60dd2 2481 }
db6296a5 2482 init_revisions(&revs, setup_git_directory());
aa1dbc98 2483 setup_revisions(commit_argc, commit_argv, &revs, NULL);
aa1dbc98
NH
2484 free(new_sha1_hex);
2485 if (old_sha1_hex) {
2486 free(old_sha1_hex);
2487 commit_argv[1] = NULL;
58e60dd2
NH
2488 }
2489
aa1dbc98 2490 /* Generate a list of objects that need to be pushed */
58e60dd2 2491 pushing = 0;
aa1dbc98
NH
2492 prepare_revision_walk(&revs);
2493 mark_edges_uninteresting(revs.commits);
1a703cba 2494 objects_to_send = get_delta(&revs, ref_lock);
29508e1e 2495 finish_all_active_slots();
58e60dd2
NH
2496
2497 /* Push missing objects to remote, this would be a
2498 convenient time to pack them first if appropriate. */
2499 pushing = 1;
1a703cba
NH
2500 if (objects_to_send)
2501 fprintf(stderr, " sending %d objects\n",
2502 objects_to_send);
b3ca4e4e 2503#ifdef USE_CURL_MULTI
29508e1e 2504 fill_active_slots();
b3ca4e4e 2505#endif
29508e1e 2506 finish_all_active_slots();
58e60dd2
NH
2507
2508 /* Update the remote branch if all went well */
aa1dbc98
NH
2509 if (aborted || !update_remote(ref->new_sha1, ref_lock)) {
2510 rc = 1;
2511 goto unlock;
58e60dd2
NH
2512 }
2513
2514 unlock:
aa1dbc98
NH
2515 if (!rc)
2516 fprintf(stderr, " done\n");
2517 unlock_remote(ref_lock);
512d632c 2518 check_locks();
58e60dd2
NH
2519 }
2520
197e8951
NH
2521 /* Update remote server info if appropriate */
2522 if (remote->has_info_refs && new_refs) {
2523 if (info_ref_lock && remote->can_update_info_refs) {
2524 fprintf(stderr, "Updating remote server info\n");
2525 update_remote_info_refs(info_ref_lock);
2526 } else {
2527 fprintf(stderr, "Unable to update server info\n");
2528 }
2529 }
2530 if (info_ref_lock)
2531 unlock_remote(info_ref_lock);
2532
58e60dd2
NH
2533 cleanup:
2534 free(remote);
2535
2536 curl_slist_free_all(no_pragma_header);
2537 curl_slist_free_all(default_headers);
2538
29508e1e 2539 http_cleanup();
58e60dd2
NH
2540
2541 request = request_queue_head;
2542 while (request != NULL) {
2543 next_request = request->next;
2544 release_request(request);
58e60dd2
NH
2545 request = next_request;
2546 }
2547
58e60dd2
NH
2548 return rc;
2549}