]> git.ipfire.org Git - thirdparty/git.git/blame - http-push.c
environment.h: move declarations for environment.c functions from cache.h
[thirdparty/git.git] / http-push.c
CommitLineData
58e60dd2 1#include "cache.h"
32a8f510 2#include "environment.h"
41771fa4 3#include "hex.h"
109cd76d 4#include "repository.h"
58e60dd2 5#include "commit.h"
58e60dd2
NH
6#include "tag.h"
7#include "blob.h"
29508e1e 8#include "http.h"
aa1dbc98 9#include "refs.h"
c4e05b1a 10#include "diff.h"
aa1dbc98 11#include "revision.h"
d807c4a0 12#include "exec-cmd.h"
6b62816c 13#include "remote.h"
d633c882 14#include "list-objects.h"
4a16d072 15#include "sigchain.h"
dbbcd44f 16#include "strvec.h"
d6fe0036 17#include "packfile.h"
a80d72db 18#include "object-store.h"
64043556 19#include "commit-reach.h"
109cd76d 20
081fd8d0
MK
21#ifdef EXPAT_NEEDS_XMLPARSE_H
22#include <xmlparse.h>
23#else
bee8e79d 24#include <expat.h>
081fd8d0 25#endif
58e60dd2
NH
26
27static const char http_push_usage[] =
1b1dd23f 28"git http-push [--all] [--dry-run] [--force] [--verbose] <remote> [<head>...]\n";
58e60dd2 29
92e2eb9c
JS
30#ifndef XML_STATUS_OK
31enum XML_Status {
32 XML_STATUS_OK = 1,
33 XML_STATUS_ERROR = 0
34};
35#define XML_STATUS_OK 1
36#define XML_STATUS_ERROR 0
37#endif
38
197e8951 39#define PREV_BUF_SIZE 4096
58e60dd2 40
acf59575 41/* DAV methods */
58e60dd2
NH
42#define DAV_LOCK "LOCK"
43#define DAV_MKCOL "MKCOL"
44#define DAV_MOVE "MOVE"
45#define DAV_PROPFIND "PROPFIND"
46#define DAV_PUT "PUT"
47#define DAV_UNLOCK "UNLOCK"
3dfaf7bc 48#define DAV_DELETE "DELETE"
acf59575
NH
49
50/* DAV lock flags */
51#define DAV_PROP_LOCKWR (1u << 0)
52#define DAV_PROP_LOCKEX (1u << 1)
53#define DAV_LOCK_OK (1u << 2)
54
55/* DAV XML properties */
56#define DAV_CTX_LOCKENTRY ".multistatus.response.propstat.prop.supportedlock.lockentry"
57#define DAV_CTX_LOCKTYPE_WRITE ".multistatus.response.propstat.prop.supportedlock.lockentry.locktype.write"
58#define DAV_CTX_LOCKTYPE_EXCLUSIVE ".multistatus.response.propstat.prop.supportedlock.lockentry.lockscope.exclusive"
59#define DAV_ACTIVELOCK_OWNER ".prop.lockdiscovery.activelock.owner.href"
60#define DAV_ACTIVELOCK_TIMEOUT ".prop.lockdiscovery.activelock.timeout"
61#define DAV_ACTIVELOCK_TOKEN ".prop.lockdiscovery.activelock.locktoken.href"
aa1dbc98
NH
62#define DAV_PROPFIND_RESP ".multistatus.response"
63#define DAV_PROPFIND_NAME ".multistatus.response.href"
64#define DAV_PROPFIND_COLLECTION ".multistatus.response.propstat.prop.resourcetype.collection"
acf59575
NH
65
66/* DAV request body templates */
aa1dbc98
NH
67#define PROPFIND_SUPPORTEDLOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:prop xmlns:R=\"%s\">\n<D:supportedlock/>\n</D:prop>\n</D:propfind>"
68#define PROPFIND_ALL_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:allprop/>\n</D:propfind>"
58e60dd2
NH
69#define LOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:lockinfo xmlns:D=\"DAV:\">\n<D:lockscope><D:exclusive/></D:lockscope>\n<D:locktype><D:write/></D:locktype>\n<D:owner>\n<D:href>mailto:%s</D:href>\n</D:owner>\n</D:lockinfo>"
70
75187c9d
NH
71#define LOCK_TIME 600
72#define LOCK_REFRESH 30
73
208acbfb 74/* Remember to update object flag allocation in object.h */
64472d15 75#define LOCAL (1u<<11)
76#define REMOTE (1u<<12)
77#define FETCHING (1u<<13)
78#define PUSHING (1u<<14)
aa1dbc98 79
3dfaf7bc
NH
80/* We allow "recursive" symbolic refs. Only within reason, though */
81#define MAXDEPTH 5
82
96f1e58f
DR
83static int pushing;
84static int aborted;
a3c57c9a 85static signed char remote_dir_exists[256];
58e60dd2 86
96f1e58f 87static int push_verbosely;
28b9d6e5 88static int push_all = MATCH_REFS_NONE;
96f1e58f 89static int force_all;
fe5d1d3e 90static int dry_run;
ae4efe19 91static int helper_status;
58e60dd2 92
96f1e58f 93static struct object_list *objects;
aa1dbc98 94
9cba13ca 95struct repo {
58e60dd2 96 char *url;
e1f33efe 97 char *path;
aa1dbc98 98 int path_len;
197e8951
NH
99 int has_info_refs;
100 int can_update_info_refs;
101 int has_info_packs;
58e60dd2 102 struct packed_git *packs;
512d632c 103 struct remote_lock *locks;
58e60dd2
NH
104};
105
7b5201a6 106static struct repo *repo;
58e60dd2
NH
107
108enum transfer_state {
197e8951
NH
109 NEED_FETCH,
110 RUN_FETCH_LOOSE,
111 RUN_FETCH_PACKED,
58e60dd2
NH
112 NEED_PUSH,
113 RUN_MKCOL,
114 RUN_PUT,
115 RUN_MOVE,
116 ABORTED,
4b05548f 117 COMPLETE
58e60dd2
NH
118};
119
9cba13ca 120struct transfer_request {
aa1dbc98 121 struct object *obj;
eb053492 122 struct packed_git *target;
58e60dd2
NH
123 char *url;
124 char *dest;
aa1dbc98 125 struct remote_lock *lock;
58e60dd2
NH
126 struct curl_slist *headers;
127 struct buffer buffer;
58e60dd2
NH
128 enum transfer_state state;
129 CURLcode curl_result;
130 char errorstr[CURL_ERROR_SIZE];
131 long http_code;
197e8951 132 void *userData;
58e60dd2
NH
133 struct active_request_slot *slot;
134 struct transfer_request *next;
135};
136
96f1e58f 137static struct transfer_request *request_queue_head;
58e60dd2 138
9cba13ca 139struct xml_ctx {
acf59575
NH
140 char *name;
141 int len;
142 char *cdata;
143 void (*userFunc)(struct xml_ctx *ctx, int tag_closed);
144 void *userData;
145};
146
9cba13ca 147struct remote_lock {
75187c9d 148 char *url;
26349b2e 149 char *owner;
75187c9d 150 char *token;
f024b87a 151 char tmpfile_suffix[GIT_MAX_HEXSZ + 1];
26349b2e
NH
152 time_t start_time;
153 long timeout;
75187c9d 154 int refreshing;
aa1dbc98
NH
155 struct remote_lock *next;
156};
157
3030baa7
NH
158/* Flags that control remote_ls processing */
159#define PROCESS_FILES (1u << 0)
160#define PROCESS_DIRS (1u << 1)
161#define RECURSIVE (1u << 2)
162
163/* Flags that remote_ls passes to callback functions */
164#define IS_DIR (1u << 0)
165
9cba13ca 166struct remote_ls_ctx {
3030baa7
NH
167 char *path;
168 void (*userFunc)(struct remote_ls_ctx *ls);
169 void *userData;
170 int flags;
171 char *dentry_name;
172 int dentry_flags;
173 struct remote_ls_ctx *parent;
26349b2e
NH
174};
175
b1c7d4aa
TRC
176/* get_dav_token_headers options */
177enum dav_header_flag {
178 DAV_HEADER_IF = (1u << 0),
179 DAV_HEADER_LOCK = (1u << 1),
180 DAV_HEADER_TIMEOUT = (1u << 2)
181};
182
2aab167a 183static char *xml_entities(const char *s)
519d05be
MH
184{
185 struct strbuf buf = STRBUF_INIT;
37141f27 186 strbuf_addstr_xml_quoted(&buf, s);
519d05be
MH
187 return strbuf_detach(&buf, NULL);
188}
189
ebaaf316
DM
190static void curl_setup_http_get(CURL *curl, const char *url,
191 const char *custom_req)
192{
193 curl_easy_setopt(curl, CURLOPT_HTTPGET, 1);
194 curl_easy_setopt(curl, CURLOPT_URL, url);
195 curl_easy_setopt(curl, CURLOPT_CUSTOMREQUEST, custom_req);
196 curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, fwrite_null);
197}
198
199static void curl_setup_http(CURL *curl, const char *url,
200 const char *custom_req, struct buffer *buffer,
201 curl_write_callback write_fn)
202{
69560157 203 curl_easy_setopt(curl, CURLOPT_UPLOAD, 1);
ebaaf316
DM
204 curl_easy_setopt(curl, CURLOPT_URL, url);
205 curl_easy_setopt(curl, CURLOPT_INFILE, buffer);
206 curl_easy_setopt(curl, CURLOPT_INFILESIZE, buffer->buf.len);
207 curl_easy_setopt(curl, CURLOPT_READFUNCTION, fread_buffer);
fe7e44e1
JK
208 curl_easy_setopt(curl, CURLOPT_SEEKFUNCTION, seek_buffer);
209 curl_easy_setopt(curl, CURLOPT_SEEKDATA, buffer);
ebaaf316
DM
210 curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, write_fn);
211 curl_easy_setopt(curl, CURLOPT_NOBODY, 0);
212 curl_easy_setopt(curl, CURLOPT_CUSTOMREQUEST, custom_req);
213 curl_easy_setopt(curl, CURLOPT_UPLOAD, 1);
214}
215
d456c9fd
JH
216static struct curl_slist *get_dav_token_headers(struct remote_lock *lock, enum dav_header_flag options)
217{
b1c7d4aa 218 struct strbuf buf = STRBUF_INIT;
8cb01e2f 219 struct curl_slist *dav_headers = http_copy_default_headers();
b1c7d4aa 220
d456c9fd 221 if (options & DAV_HEADER_IF) {
b1c7d4aa
TRC
222 strbuf_addf(&buf, "If: (<%s>)", lock->token);
223 dav_headers = curl_slist_append(dav_headers, buf.buf);
224 strbuf_reset(&buf);
225 }
d456c9fd 226 if (options & DAV_HEADER_LOCK) {
b1c7d4aa
TRC
227 strbuf_addf(&buf, "Lock-Token: <%s>", lock->token);
228 dav_headers = curl_slist_append(dav_headers, buf.buf);
229 strbuf_reset(&buf);
230 }
d456c9fd 231 if (options & DAV_HEADER_TIMEOUT) {
b1c7d4aa
TRC
232 strbuf_addf(&buf, "Timeout: Second-%ld", lock->timeout);
233 dav_headers = curl_slist_append(dav_headers, buf.buf);
234 strbuf_reset(&buf);
235 }
236 strbuf_release(&buf);
237
238 return dav_headers;
239}
240
29508e1e 241static void finish_request(struct transfer_request *request);
197e8951 242static void release_request(struct transfer_request *request);
58e60dd2 243
29508e1e 244static void process_response(void *callback_data)
58e60dd2 245{
29508e1e
NH
246 struct transfer_request *request =
247 (struct transfer_request *)callback_data;
58e60dd2 248
29508e1e 249 finish_request(request);
58e60dd2
NH
250}
251
197e8951
NH
252static void start_fetch_loose(struct transfer_request *request)
253{
197e8951 254 struct active_request_slot *slot;
5424bc55 255 struct http_object_request *obj_req;
197e8951 256
f0be0db1 257 obj_req = new_http_object_request(repo->url, &request->obj->oid);
afe8a907 258 if (!obj_req) {
197e8951 259 request->state = ABORTED;
197e8951
NH
260 return;
261 }
262
5424bc55 263 slot = obj_req->slot;
197e8951
NH
264 slot->callback_func = process_response;
265 slot->callback_data = request;
266 request->slot = slot;
5424bc55 267 request->userData = obj_req;
197e8951
NH
268
269 /* Try to get the request started, abort the request on error */
270 request->state = RUN_FETCH_LOOSE;
271 if (!start_active_slot(slot)) {
272 fprintf(stderr, "Unable to start GET request\n");
7b5201a6 273 repo->can_update_info_refs = 0;
5424bc55 274 release_http_object_request(obj_req);
197e8951
NH
275 release_request(request);
276 }
277}
278
dd8239f9
JH
279static void start_mkcol(struct transfer_request *request)
280{
f2fd0760 281 char *hex = oid_to_hex(&request->obj->oid);
dd8239f9 282 struct active_request_slot *slot;
dd8239f9 283
7b5201a6 284 request->url = get_remote_object_url(repo->url, hex, 1);
dd8239f9
JH
285
286 slot = get_active_slot();
287 slot->callback_func = process_response;
288 slot->callback_data = request;
ebaaf316 289 curl_setup_http_get(slot->curl, request->url, DAV_MKCOL);
dd8239f9 290 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
dd8239f9
JH
291
292 if (start_active_slot(slot)) {
293 request->slot = slot;
294 request->state = RUN_MKCOL;
295 } else {
296 request->state = ABORTED;
6a83d902 297 FREE_AND_NULL(request->url);
dd8239f9
JH
298 }
299}
dd8239f9 300
197e8951
NH
301static void start_fetch_packed(struct transfer_request *request)
302{
197e8951 303 struct packed_git *target;
197e8951
NH
304
305 struct transfer_request *check_request = request_queue_head;
2264dfa5 306 struct http_pack_request *preq;
197e8951 307
ed1c9977 308 target = find_sha1_pack(request->obj->oid.hash, repo->packs);
197e8951 309 if (!target) {
f2fd0760 310 fprintf(stderr, "Unable to fetch %s, will not be able to update server info refs\n", oid_to_hex(&request->obj->oid));
7b5201a6 311 repo->can_update_info_refs = 0;
197e8951
NH
312 release_request(request);
313 return;
314 }
eb053492
JT
315 close_pack_index(target);
316 request->target = target;
197e8951 317
538b1523 318 fprintf(stderr, "Fetching pack %s\n",
1cb158b6 319 hash_to_hex(target->hash));
f2fd0760 320 fprintf(stderr, " which contains %s\n", oid_to_hex(&request->obj->oid));
197e8951 321
eb053492 322 preq = new_http_pack_request(target->hash, repo->url);
afe8a907 323 if (!preq) {
2264dfa5
TRC
324 repo->can_update_info_refs = 0;
325 return;
326 }
197e8951
NH
327
328 /* Make sure there isn't another open request for this pack */
329 while (check_request) {
330 if (check_request->state == RUN_FETCH_PACKED &&
2264dfa5
TRC
331 !strcmp(check_request->url, preq->url)) {
332 release_http_pack_request(preq);
197e8951
NH
333 release_request(request);
334 return;
335 }
336 check_request = check_request->next;
337 }
338
2264dfa5
TRC
339 preq->slot->callback_func = process_response;
340 preq->slot->callback_data = request;
341 request->slot = preq->slot;
342 request->userData = preq;
197e8951
NH
343
344 /* Try to get the request started, abort the request on error */
345 request->state = RUN_FETCH_PACKED;
2264dfa5 346 if (!start_active_slot(preq->slot)) {
197e8951 347 fprintf(stderr, "Unable to start GET request\n");
2264dfa5 348 release_http_pack_request(preq);
7b5201a6 349 repo->can_update_info_refs = 0;
197e8951
NH
350 release_request(request);
351 }
352}
353
58e60dd2
NH
354static void start_put(struct transfer_request *request)
355{
f2fd0760 356 char *hex = oid_to_hex(&request->obj->oid);
58e60dd2 357 struct active_request_slot *slot;
817d14a8 358 struct strbuf buf = STRBUF_INIT;
21666f1a 359 enum object_type type;
58e60dd2
NH
360 char hdr[50];
361 void *unpacked;
362 unsigned long len;
363 int hdrlen;
364 ssize_t size;
ef49a7a0 365 git_zstream stream;
58e60dd2 366
b4f5aca4 367 unpacked = read_object_file(&request->obj->oid, &type, &len);
b04cdea4 368 hdrlen = format_object_header(hdr, sizeof(hdr), type, len);
58e60dd2
NH
369
370 /* Set it up */
55bb5c91 371 git_deflate_init(&stream, zlib_compression_level);
225a6f10 372 size = git_deflate_bound(&stream, len + hdrlen);
028c2976
MH
373 strbuf_init(&request->buffer.buf, size);
374 request->buffer.posn = 0;
58e60dd2
NH
375
376 /* Compress it */
028c2976 377 stream.next_out = (unsigned char *)request->buffer.buf.buf;
58e60dd2
NH
378 stream.avail_out = size;
379
380 /* First header.. */
381 stream.next_in = (void *)hdr;
382 stream.avail_in = hdrlen;
55bb5c91
JH
383 while (git_deflate(&stream, 0) == Z_OK)
384 ; /* nothing */
58e60dd2
NH
385
386 /* Then the data itself.. */
387 stream.next_in = unpacked;
388 stream.avail_in = len;
55bb5c91
JH
389 while (git_deflate(&stream, Z_FINISH) == Z_OK)
390 ; /* nothing */
391 git_deflate_end(&stream);
58e60dd2
NH
392 free(unpacked);
393
028c2976 394 request->buffer.buf.len = stream.total_out;
58e60dd2 395
817d14a8 396 strbuf_addstr(&buf, "Destination: ");
7b5201a6 397 append_remote_object_url(&buf, repo->url, hex, 0);
817d14a8
TRC
398 request->dest = strbuf_detach(&buf, NULL);
399
7b5201a6 400 append_remote_object_url(&buf, repo->url, hex, 0);
f024b87a 401 strbuf_add(&buf, request->lock->tmpfile_suffix, the_hash_algo->hexsz + 1);
817d14a8 402 request->url = strbuf_detach(&buf, NULL);
58e60dd2
NH
403
404 slot = get_active_slot();
29508e1e
NH
405 slot->callback_func = process_response;
406 slot->callback_data = request;
ebaaf316
DM
407 curl_setup_http(slot->curl, request->url, DAV_PUT,
408 &request->buffer, fwrite_null);
58e60dd2
NH
409
410 if (start_active_slot(slot)) {
411 request->slot = slot;
412 request->state = RUN_PUT;
413 } else {
414 request->state = ABORTED;
6a83d902 415 FREE_AND_NULL(request->url);
58e60dd2
NH
416 }
417}
418
419static void start_move(struct transfer_request *request)
420{
421 struct active_request_slot *slot;
8cb01e2f 422 struct curl_slist *dav_headers = http_copy_default_headers();
58e60dd2
NH
423
424 slot = get_active_slot();
29508e1e
NH
425 slot->callback_func = process_response;
426 slot->callback_data = request;
ebaaf316 427 curl_setup_http_get(slot->curl, request->url, DAV_MOVE);
58e60dd2
NH
428 dav_headers = curl_slist_append(dav_headers, request->dest);
429 dav_headers = curl_slist_append(dav_headers, "Overwrite: T");
430 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
58e60dd2
NH
431
432 if (start_active_slot(slot)) {
433 request->slot = slot;
434 request->state = RUN_MOVE;
435 } else {
436 request->state = ABORTED;
6a83d902 437 FREE_AND_NULL(request->url);
58e60dd2
NH
438 }
439}
440
512d632c 441static int refresh_lock(struct remote_lock *lock)
75187c9d
NH
442{
443 struct active_request_slot *slot;
baa7b67d 444 struct slot_results results;
b1c7d4aa 445 struct curl_slist *dav_headers;
512d632c 446 int rc = 0;
75187c9d 447
512d632c 448 lock->refreshing = 1;
75187c9d 449
b1c7d4aa 450 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF | DAV_HEADER_TIMEOUT);
75187c9d 451
512d632c
NH
452 slot = get_active_slot();
453 slot->results = &results;
ebaaf316 454 curl_setup_http_get(slot->curl, lock->url, DAV_LOCK);
512d632c 455 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
75187c9d 456
512d632c
NH
457 if (start_active_slot(slot)) {
458 run_active_slot(slot);
459 if (results.curl_result != CURLE_OK) {
460 fprintf(stderr, "LOCK HTTP error %ld\n",
461 results.http_code);
462 } else {
463 lock->start_time = time(NULL);
464 rc = 1;
465 }
466 }
aa1dbc98 467
512d632c
NH
468 lock->refreshing = 0;
469 curl_slist_free_all(dav_headers);
aa1dbc98 470
512d632c
NH
471 return rc;
472}
473
ec26b4d6 474static void check_locks(void)
512d632c 475{
7b5201a6 476 struct remote_lock *lock = repo->locks;
512d632c
NH
477 time_t current_time = time(NULL);
478 int time_remaining;
479
480 while (lock) {
481 time_remaining = lock->start_time + lock->timeout -
482 current_time;
483 if (!lock->refreshing && time_remaining < LOCK_REFRESH) {
484 if (!refresh_lock(lock)) {
485 fprintf(stderr,
486 "Unable to refresh lock for %s\n",
487 lock->url);
488 aborted = 1;
489 return;
aa1dbc98 490 }
75187c9d 491 }
512d632c 492 lock = lock->next;
75187c9d 493 }
aa1dbc98 494}
75187c9d 495
aa1dbc98
NH
496static void release_request(struct transfer_request *request)
497{
498 struct transfer_request *entry = request_queue_head;
499
500 if (request == request_queue_head) {
501 request_queue_head = request->next;
502 } else {
5cc6a4be 503 while (entry && entry->next != request)
aa1dbc98 504 entry = entry->next;
5cc6a4be
RS
505 if (entry)
506 entry->next = request->next;
aa1dbc98
NH
507 }
508
8e0f7003 509 free(request->url);
aa1dbc98 510 free(request);
75187c9d
NH
511}
512
58e60dd2
NH
513static void finish_request(struct transfer_request *request)
514{
2264dfa5 515 struct http_pack_request *preq;
5424bc55 516 struct http_object_request *obj_req;
197e8951
NH
517
518 request->curl_result = request->slot->curl_result;
58e60dd2
NH
519 request->http_code = request->slot->http_code;
520 request->slot = NULL;
75187c9d 521
aa1dbc98 522 /* Keep locks active */
512d632c 523 check_locks();
75187c9d 524
afe8a907 525 if (request->headers)
58e60dd2 526 curl_slist_free_all(request->headers);
7b899967 527
9dde06de
CMAB
528 /* URL is reused for MOVE after PUT and used during FETCH */
529 if (request->state != RUN_PUT && request->state != RUN_FETCH_PACKED) {
6a83d902 530 FREE_AND_NULL(request->url);
aa1dbc98 531 }
7b899967 532
aa1dbc98 533 if (request->state == RUN_MKCOL) {
58e60dd2
NH
534 if (request->curl_result == CURLE_OK ||
535 request->http_code == 405) {
ed1c9977 536 remote_dir_exists[request->obj->oid.hash[0]] = 1;
58e60dd2
NH
537 start_put(request);
538 } else {
539 fprintf(stderr, "MKCOL %s failed, aborting (%d/%ld)\n",
f2fd0760 540 oid_to_hex(&request->obj->oid),
58e60dd2
NH
541 request->curl_result, request->http_code);
542 request->state = ABORTED;
543 aborted = 1;
544 }
545 } else if (request->state == RUN_PUT) {
546 if (request->curl_result == CURLE_OK) {
547 start_move(request);
548 } else {
549 fprintf(stderr, "PUT %s failed, aborting (%d/%ld)\n",
f2fd0760 550 oid_to_hex(&request->obj->oid),
58e60dd2
NH
551 request->curl_result, request->http_code);
552 request->state = ABORTED;
553 aborted = 1;
554 }
555 } else if (request->state == RUN_MOVE) {
556 if (request->curl_result == CURLE_OK) {
1a703cba
NH
557 if (push_verbosely)
558 fprintf(stderr, " sent %s\n",
f2fd0760 559 oid_to_hex(&request->obj->oid));
aa1dbc98
NH
560 request->obj->flags |= REMOTE;
561 release_request(request);
58e60dd2
NH
562 } else {
563 fprintf(stderr, "MOVE %s failed, aborting (%d/%ld)\n",
f2fd0760 564 oid_to_hex(&request->obj->oid),
58e60dd2
NH
565 request->curl_result, request->http_code);
566 request->state = ABORTED;
567 aborted = 1;
568 }
197e8951 569 } else if (request->state == RUN_FETCH_LOOSE) {
5424bc55 570 obj_req = (struct http_object_request *)request->userData;
197e8951 571
5424bc55
TRC
572 if (finish_http_object_request(obj_req) == 0)
573 if (obj_req->rename == 0)
574 request->obj->flags |= (LOCAL | REMOTE);
197e8951
NH
575
576 /* Try fetching packed if necessary */
5424bc55
TRC
577 if (request->obj->flags & LOCAL) {
578 release_http_object_request(obj_req);
197e8951 579 release_request(request);
5424bc55 580 } else
197e8951
NH
581 start_fetch_packed(request);
582
583 } else if (request->state == RUN_FETCH_PACKED) {
2264dfa5 584 int fail = 1;
197e8951
NH
585 if (request->curl_result != CURLE_OK) {
586 fprintf(stderr, "Unable to get pack file %s\n%s",
587 request->url, curl_errorstr);
197e8951 588 } else {
2264dfa5
TRC
589 preq = (struct http_pack_request *)request->userData;
590
591 if (preq) {
609621a4 592 if (finish_http_pack_request(preq) == 0)
2264dfa5
TRC
593 fail = 0;
594 release_http_pack_request(preq);
197e8951
NH
595 }
596 }
2264dfa5
TRC
597 if (fail)
598 repo->can_update_info_refs = 0;
eb053492
JT
599 else
600 http_install_packfile(request->target, &repo->packs);
197e8951 601 release_request(request);
58e60dd2
NH
602 }
603}
604
4f66250d 605static int is_running_queue;
fc57b6aa 606static int fill_active_slot(void *unused)
58e60dd2 607{
8e24cbae 608 struct transfer_request *request;
58e60dd2 609
4f66250d 610 if (aborted || !is_running_queue)
45c17412 611 return 0;
58e60dd2 612
45c17412 613 for (request = request_queue_head; request; request = request->next) {
197e8951
NH
614 if (request->state == NEED_FETCH) {
615 start_fetch_loose(request);
45c17412 616 return 1;
197e8951 617 } else if (pushing && request->state == NEED_PUSH) {
ed1c9977 618 if (remote_dir_exists[request->obj->oid.hash[0]] == 1) {
0dd276b8 619 start_put(request);
aa1dbc98 620 } else {
0dd276b8 621 start_mkcol(request);
aa1dbc98 622 }
45c17412 623 return 1;
58e60dd2 624 }
aa1dbc98 625 }
45c17412 626 return 0;
58e60dd2 627}
58e60dd2 628
aa1dbc98
NH
629static void get_remote_object_list(unsigned char parent);
630
197e8951
NH
631static void add_fetch_request(struct object *obj)
632{
633 struct transfer_request *request;
634
635 check_locks();
636
637 /*
638 * Don't fetch the object if it's known to exist locally
639 * or is already in the request queue
640 */
ed1c9977 641 if (remote_dir_exists[obj->oid.hash[0]] == -1)
642 get_remote_object_list(obj->oid.hash[0]);
197e8951
NH
643 if (obj->flags & (LOCAL | FETCHING))
644 return;
645
646 obj->flags |= FETCHING;
647 request = xmalloc(sizeof(*request));
648 request->obj = obj;
649 request->url = NULL;
650 request->lock = NULL;
651 request->headers = NULL;
197e8951
NH
652 request->state = NEED_FETCH;
653 request->next = request_queue_head;
654 request_queue_head = request;
655
656 fill_active_slots();
657 step_active_slots();
658}
659
1a703cba 660static int add_send_request(struct object *obj, struct remote_lock *lock)
58e60dd2 661{
3def06e6 662 struct transfer_request *request;
58e60dd2 663 struct packed_git *target;
58e60dd2 664
512d632c
NH
665 /* Keep locks active */
666 check_locks();
667
aa1dbc98
NH
668 /*
669 * Don't push the object if it's known to exist on the remote
670 * or is already in the request queue
671 */
ed1c9977 672 if (remote_dir_exists[obj->oid.hash[0]] == -1)
673 get_remote_object_list(obj->oid.hash[0]);
aa1dbc98 674 if (obj->flags & (REMOTE | PUSHING))
1a703cba 675 return 0;
ed1c9977 676 target = find_sha1_pack(obj->oid.hash, repo->packs);
aa1dbc98
NH
677 if (target) {
678 obj->flags |= REMOTE;
1a703cba 679 return 0;
aa1dbc98 680 }
58e60dd2 681
aa1dbc98 682 obj->flags |= PUSHING;
58e60dd2 683 request = xmalloc(sizeof(*request));
aa1dbc98 684 request->obj = obj;
58e60dd2 685 request->url = NULL;
26349b2e 686 request->lock = lock;
58e60dd2 687 request->headers = NULL;
aa1dbc98 688 request->state = NEED_PUSH;
c17fb6ee
NH
689 request->next = request_queue_head;
690 request_queue_head = request;
29508e1e
NH
691
692 fill_active_slots();
693 step_active_slots();
1a703cba
NH
694
695 return 1;
58e60dd2
NH
696}
697
f4f440a0 698static int fetch_indices(void)
58e60dd2 699{
b8caac2b 700 int ret;
58e60dd2 701
58e60dd2
NH
702 if (push_verbosely)
703 fprintf(stderr, "Getting pack list\n");
1a703cba 704
b8caac2b
TRC
705 switch (http_get_info_packs(repo->url, &repo->packs)) {
706 case HTTP_OK:
707 case HTTP_MISSING_TARGET:
708 ret = 0;
709 break;
710 default:
711 ret = -1;
58e60dd2
NH
712 }
713
b8caac2b 714 return ret;
58e60dd2
NH
715}
716
1aa40df6 717static void one_remote_object(const struct object_id *oid)
aa1dbc98 718{
aa1dbc98
NH
719 struct object *obj;
720
d0229abd 721 obj = lookup_object(the_repository, oid);
aa1dbc98 722 if (!obj)
109cd76d 723 obj = parse_object(the_repository, oid);
aa1dbc98
NH
724
725 /* Ignore remote objects that don't exist locally */
726 if (!obj)
727 return;
728
729 obj->flags |= REMOTE;
730 if (!object_list_contains(objects, obj))
1f1e895f 731 object_list_insert(obj, &objects);
aa1dbc98
NH
732}
733
acf59575 734static void handle_lockprop_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 735{
acf59575
NH
736 int *lock_flags = (int *)ctx->userData;
737
738 if (tag_closed) {
739 if (!strcmp(ctx->name, DAV_CTX_LOCKENTRY)) {
740 if ((*lock_flags & DAV_PROP_LOCKEX) &&
741 (*lock_flags & DAV_PROP_LOCKWR)) {
742 *lock_flags |= DAV_LOCK_OK;
743 }
744 *lock_flags &= DAV_LOCK_OK;
745 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_WRITE)) {
746 *lock_flags |= DAV_PROP_LOCKWR;
747 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_EXCLUSIVE)) {
748 *lock_flags |= DAV_PROP_LOCKEX;
749 }
750 }
26349b2e
NH
751}
752
acf59575 753static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 754{
aa1dbc98 755 struct remote_lock *lock = (struct remote_lock *)ctx->userData;
f024b87a 756 git_hash_ctx hash_ctx;
757 unsigned char lock_token_hash[GIT_MAX_RAWSZ];
acf59575
NH
758
759 if (tag_closed && ctx->cdata) {
760 if (!strcmp(ctx->name, DAV_ACTIVELOCK_OWNER)) {
95244ae3 761 lock->owner = xstrdup(ctx->cdata);
acf59575 762 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TIMEOUT)) {
ae021d87
JK
763 const char *arg;
764 if (skip_prefix(ctx->cdata, "Second-", &arg))
765 lock->timeout = strtol(arg, NULL, 10);
acf59575 766 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
95244ae3 767 lock->token = xstrdup(ctx->cdata);
dfab7c14 768
f024b87a 769 the_hash_algo->init_fn(&hash_ctx);
770 the_hash_algo->update_fn(&hash_ctx, lock->token, strlen(lock->token));
771 the_hash_algo->final_fn(lock_token_hash, &hash_ctx);
dfab7c14
TRC
772
773 lock->tmpfile_suffix[0] = '_';
f024b87a 774 memcpy(lock->tmpfile_suffix + 1, hash_to_hex(lock_token_hash), the_hash_algo->hexsz);
acf59575 775 }
26349b2e
NH
776 }
777}
778
2aab167a 779static void one_remote_ref(const char *refname);
aa1dbc98 780
26349b2e 781static void
acf59575 782xml_start_tag(void *userData, const char *name, const char **atts)
26349b2e 783{
acf59575 784 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 785 const char *c = strchr(name, ':');
0cc41428 786 int old_namelen, new_len;
acf59575 787
afe8a907 788 if (!c)
acf59575
NH
789 c = name;
790 else
791 c++;
792
0cc41428
JK
793 old_namelen = strlen(ctx->name);
794 new_len = old_namelen + strlen(c) + 2;
acf59575
NH
795
796 if (new_len > ctx->len) {
797 ctx->name = xrealloc(ctx->name, new_len);
798 ctx->len = new_len;
26349b2e 799 }
0cc41428 800 xsnprintf(ctx->name + old_namelen, ctx->len - old_namelen, ".%s", c);
26349b2e 801
6a83d902 802 FREE_AND_NULL(ctx->cdata);
acf59575
NH
803
804 ctx->userFunc(ctx, 0);
26349b2e
NH
805}
806
58e60dd2 807static void
acf59575 808xml_end_tag(void *userData, const char *name)
58e60dd2 809{
acf59575 810 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 811 const char *c = strchr(name, ':');
acf59575 812 char *ep;
58e60dd2 813
acf59575
NH
814 ctx->userFunc(ctx, 1);
815
afe8a907 816 if (!c)
acf59575
NH
817 c = name;
818 else
819 c++;
820
821 ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
822 *ep = 0;
58e60dd2
NH
823}
824
825static void
acf59575 826xml_cdata(void *userData, const XML_Char *s, int len)
58e60dd2 827{
acf59575 828 struct xml_ctx *ctx = (struct xml_ctx *)userData;
4cac42b1 829 free(ctx->cdata);
182af834 830 ctx->cdata = xmemdupz(s, len);
58e60dd2
NH
831}
832
554fe20d 833static struct remote_lock *lock_remote(const char *path, long timeout)
58e60dd2
NH
834{
835 struct active_request_slot *slot;
baa7b67d 836 struct slot_results results;
028c2976
MH
837 struct buffer out_buffer = { STRBUF_INIT, 0 };
838 struct strbuf in_buffer = STRBUF_INIT;
58e60dd2 839 char *url;
0772b9a6 840 char *ep;
58e60dd2 841 char timeout_header[25];
512d632c 842 struct remote_lock *lock = NULL;
8cb01e2f 843 struct curl_slist *dav_headers = http_copy_default_headers();
acf59575 844 struct xml_ctx ctx;
519d05be 845 char *escaped;
58e60dd2 846
28310186 847 url = xstrfmt("%s%s", repo->url, path);
aa1dbc98 848
0772b9a6 849 /* Make sure leading directories exist for the remote ref */
7b5201a6 850 ep = strchr(url + strlen(repo->url) + 1, '/');
0772b9a6 851 while (ep) {
466ddf90
JS
852 char saved_character = ep[1];
853 ep[1] = '\0';
0772b9a6 854 slot = get_active_slot();
baa7b67d 855 slot->results = &results;
ebaaf316 856 curl_setup_http_get(slot->curl, url, DAV_MKCOL);
0772b9a6
NH
857 if (start_active_slot(slot)) {
858 run_active_slot(slot);
baa7b67d
NH
859 if (results.curl_result != CURLE_OK &&
860 results.http_code != 405) {
0772b9a6
NH
861 fprintf(stderr,
862 "Unable to create branch path %s\n",
863 url);
864 free(url);
865 return NULL;
866 }
867 } else {
1a703cba 868 fprintf(stderr, "Unable to start MKCOL request\n");
0772b9a6
NH
869 free(url);
870 return NULL;
871 }
466ddf90 872 ep[1] = saved_character;
0772b9a6
NH
873 ep = strchr(ep + 1, '/');
874 }
875
5cb2194a 876 escaped = xml_entities(ident_default_email());
519d05be
MH
877 strbuf_addf(&out_buffer.buf, LOCK_REQUEST, escaped);
878 free(escaped);
26349b2e 879
5096d490 880 xsnprintf(timeout_header, sizeof(timeout_header), "Timeout: Second-%ld", timeout);
58e60dd2
NH
881 dav_headers = curl_slist_append(dav_headers, timeout_header);
882 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
883
884 slot = get_active_slot();
baa7b67d 885 slot->results = &results;
ebaaf316 886 curl_setup_http(slot->curl, url, DAV_LOCK, &out_buffer, fwrite_buffer);
58e60dd2 887 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
8dda4cbd 888 curl_easy_setopt(slot->curl, CURLOPT_WRITEDATA, &in_buffer);
58e60dd2 889
ca56dadb 890 CALLOC_ARRAY(lock, 1);
aa1dbc98 891 lock->timeout = -1;
acf59575 892
58e60dd2
NH
893 if (start_active_slot(slot)) {
894 run_active_slot(slot);
baa7b67d 895 if (results.curl_result == CURLE_OK) {
472b2570
MH
896 XML_Parser parser = XML_ParserCreate(NULL);
897 enum XML_Status result;
acf59575
NH
898 ctx.name = xcalloc(10, 1);
899 ctx.len = 0;
900 ctx.cdata = NULL;
901 ctx.userFunc = handle_new_lock_ctx;
aa1dbc98 902 ctx.userData = lock;
acf59575
NH
903 XML_SetUserData(parser, &ctx);
904 XML_SetElementHandler(parser, xml_start_tag,
905 xml_end_tag);
906 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
907 result = XML_Parse(parser, in_buffer.buf,
908 in_buffer.len, 1);
acf59575
NH
909 free(ctx.name);
910 if (result != XML_STATUS_OK) {
911 fprintf(stderr, "XML error: %s\n",
912 XML_ErrorString(
913 XML_GetErrorCode(parser)));
aa1dbc98 914 lock->timeout = -1;
acf59575 915 }
472b2570 916 XML_ParserFree(parser);
a2b9820c
PO
917 } else {
918 fprintf(stderr,
919 "error: curl result=%d, HTTP code=%ld\n",
920 results.curl_result, results.http_code);
58e60dd2
NH
921 }
922 } else {
1a703cba 923 fprintf(stderr, "Unable to start LOCK request\n");
58e60dd2
NH
924 }
925
acf59575 926 curl_slist_free_all(dav_headers);
028c2976
MH
927 strbuf_release(&out_buffer.buf);
928 strbuf_release(&in_buffer);
26349b2e 929
aa1dbc98 930 if (lock->token == NULL || lock->timeout <= 0) {
8e0f7003
JM
931 free(lock->token);
932 free(lock->owner);
75187c9d 933 free(url);
6a83d902 934 FREE_AND_NULL(lock);
acf59575 935 } else {
aa1dbc98 936 lock->url = url;
aa1dbc98 937 lock->start_time = time(NULL);
7b5201a6
AK
938 lock->next = repo->locks;
939 repo->locks = lock;
26349b2e
NH
940 }
941
aa1dbc98 942 return lock;
58e60dd2
NH
943}
944
aa1dbc98 945static int unlock_remote(struct remote_lock *lock)
58e60dd2
NH
946{
947 struct active_request_slot *slot;
baa7b67d 948 struct slot_results results;
7b5201a6 949 struct remote_lock *prev = repo->locks;
b1c7d4aa 950 struct curl_slist *dav_headers;
58e60dd2
NH
951 int rc = 0;
952
b1c7d4aa 953 dav_headers = get_dav_token_headers(lock, DAV_HEADER_LOCK);
58e60dd2
NH
954
955 slot = get_active_slot();
baa7b67d 956 slot->results = &results;
ebaaf316 957 curl_setup_http_get(slot->curl, lock->url, DAV_UNLOCK);
58e60dd2
NH
958 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
959
960 if (start_active_slot(slot)) {
961 run_active_slot(slot);
baa7b67d 962 if (results.curl_result == CURLE_OK)
58e60dd2
NH
963 rc = 1;
964 else
512d632c 965 fprintf(stderr, "UNLOCK HTTP error %ld\n",
baa7b67d 966 results.http_code);
58e60dd2 967 } else {
512d632c 968 fprintf(stderr, "Unable to start UNLOCK request\n");
58e60dd2
NH
969 }
970
971 curl_slist_free_all(dav_headers);
75187c9d 972
7b5201a6
AK
973 if (repo->locks == lock) {
974 repo->locks = lock->next;
512d632c
NH
975 } else {
976 while (prev && prev->next != lock)
977 prev = prev->next;
978 if (prev)
5cc6a4be 979 prev->next = lock->next;
512d632c
NH
980 }
981
8e0f7003 982 free(lock->owner);
512d632c
NH
983 free(lock->url);
984 free(lock->token);
985 free(lock);
58e60dd2
NH
986
987 return rc;
988}
989
6a491a17
CB
990static void remove_locks(void)
991{
7b5201a6 992 struct remote_lock *lock = repo->locks;
6a491a17
CB
993
994 fprintf(stderr, "Removing remote locks...\n");
995 while (lock) {
6589ebf1 996 struct remote_lock *next = lock->next;
6a491a17 997 unlock_remote(lock);
6589ebf1 998 lock = next;
6a491a17
CB
999 }
1000}
1001
1002static void remove_locks_on_signal(int signo)
1003{
1004 remove_locks();
4a16d072 1005 sigchain_pop(signo);
6a491a17
CB
1006 raise(signo);
1007}
1008
3030baa7
NH
1009static void remote_ls(const char *path, int flags,
1010 void (*userFunc)(struct remote_ls_ctx *ls),
1011 void *userData);
aa1dbc98 1012
c3bdc4e7 1013/* extract hex from sharded "xx/x{38}" filename */
1aa40df6 1014static int get_oid_hex_from_objpath(const char *path, struct object_id *oid)
67a31f61 1015{
c3b4e4ee 1016 oid->algo = hash_algo_by_ptr(the_hash_algo);
1017
f024b87a 1018 if (strlen(path) != the_hash_algo->hexsz + 1)
67a31f61
JK
1019 return -1;
1020
c3bdc4e7
RS
1021 if (hex_to_bytes(oid->hash, path, 1))
1022 return -1;
67a31f61
JK
1023 path += 2;
1024 path++; /* skip '/' */
67a31f61 1025
f024b87a 1026 return hex_to_bytes(oid->hash + 1, path, the_hash_algo->rawsz - 1);
67a31f61
JK
1027}
1028
3030baa7
NH
1029static void process_ls_object(struct remote_ls_ctx *ls)
1030{
1031 unsigned int *parent = (unsigned int *)ls->userData;
67a31f61 1032 const char *path = ls->dentry_name;
1aa40df6 1033 struct object_id oid;
aa1dbc98 1034
3030baa7
NH
1035 if (!strcmp(ls->path, ls->dentry_name) && (ls->flags & IS_DIR)) {
1036 remote_dir_exists[*parent] = 1;
1037 return;
1038 }
aa1dbc98 1039
67a31f61 1040 if (!skip_prefix(path, "objects/", &path) ||
1aa40df6 1041 get_oid_hex_from_objpath(path, &oid))
3030baa7 1042 return;
67a31f61 1043
1aa40df6 1044 one_remote_object(&oid);
3030baa7 1045}
aa1dbc98 1046
3030baa7
NH
1047static void process_ls_ref(struct remote_ls_ctx *ls)
1048{
1049 if (!strcmp(ls->path, ls->dentry_name) && (ls->dentry_flags & IS_DIR)) {
1050 fprintf(stderr, " %s\n", ls->dentry_name);
1051 return;
1052 }
aa1dbc98 1053
3030baa7
NH
1054 if (!(ls->dentry_flags & IS_DIR))
1055 one_remote_ref(ls->dentry_name);
1056}
aa1dbc98 1057
3030baa7
NH
1058static void handle_remote_ls_ctx(struct xml_ctx *ctx, int tag_closed)
1059{
1060 struct remote_ls_ctx *ls = (struct remote_ls_ctx *)ctx->userData;
aa1dbc98 1061
3030baa7
NH
1062 if (tag_closed) {
1063 if (!strcmp(ctx->name, DAV_PROPFIND_RESP) && ls->dentry_name) {
1064 if (ls->dentry_flags & IS_DIR) {
0fdadc50
TRC
1065
1066 /* ensure collection names end with slash */
1067 str_end_url_with_slash(ls->dentry_name, &ls->dentry_name);
1068
3030baa7
NH
1069 if (ls->flags & PROCESS_DIRS) {
1070 ls->userFunc(ls);
1071 }
1072 if (strcmp(ls->dentry_name, ls->path) &&
1073 ls->flags & RECURSIVE) {
1074 remote_ls(ls->dentry_name,
1075 ls->flags,
1076 ls->userFunc,
1077 ls->userData);
1078 }
1079 } else if (ls->flags & PROCESS_FILES) {
1080 ls->userFunc(ls);
aa1dbc98 1081 }
3030baa7 1082 } else if (!strcmp(ctx->name, DAV_PROPFIND_NAME) && ctx->cdata) {
e1f33efe
KK
1083 char *path = ctx->cdata;
1084 if (*ctx->cdata == 'h') {
1085 path = strstr(path, "//");
1086 if (path) {
1087 path = strchr(path+2, '/');
1088 }
1089 }
1090 if (path) {
dfc2dcd9
TRC
1091 const char *url = repo->url;
1092 if (repo->path)
1093 url = repo->path;
1094 if (strncmp(path, url, repo->path_len))
82247e9b 1095 error("Parsed path '%s' does not match url: '%s'",
dfc2dcd9
TRC
1096 path, url);
1097 else {
1098 path += repo->path_len;
1099 ls->dentry_name = xstrdup(path);
1100 }
e1f33efe 1101 }
3030baa7
NH
1102 } else if (!strcmp(ctx->name, DAV_PROPFIND_COLLECTION)) {
1103 ls->dentry_flags |= IS_DIR;
aa1dbc98 1104 }
3030baa7 1105 } else if (!strcmp(ctx->name, DAV_PROPFIND_RESP)) {
6a83d902 1106 FREE_AND_NULL(ls->dentry_name);
3030baa7 1107 ls->dentry_flags = 0;
aa1dbc98 1108 }
aa1dbc98
NH
1109}
1110
20642801
JS
1111/*
1112 * NEEDSWORK: remote_ls() ignores info/refs on the remote side. But it
1113 * should _only_ heed the information from that file, instead of trying to
1114 * determine the refs from the remote file system (badly: it does not even
1115 * know about packed-refs).
1116 */
3030baa7
NH
1117static void remote_ls(const char *path, int flags,
1118 void (*userFunc)(struct remote_ls_ctx *ls),
1119 void *userData)
aa1dbc98 1120{
28310186 1121 char *url = xstrfmt("%s%s", repo->url, path);
aa1dbc98 1122 struct active_request_slot *slot;
baa7b67d 1123 struct slot_results results;
028c2976
MH
1124 struct strbuf in_buffer = STRBUF_INIT;
1125 struct buffer out_buffer = { STRBUF_INIT, 0 };
8cb01e2f 1126 struct curl_slist *dav_headers = http_copy_default_headers();
aa1dbc98 1127 struct xml_ctx ctx;
3030baa7
NH
1128 struct remote_ls_ctx ls;
1129
1130 ls.flags = flags;
9befac47 1131 ls.path = xstrdup(path);
3030baa7
NH
1132 ls.dentry_name = NULL;
1133 ls.dentry_flags = 0;
1134 ls.userData = userData;
1135 ls.userFunc = userFunc;
aa1dbc98 1136
02962d36 1137 strbuf_addstr(&out_buffer.buf, PROPFIND_ALL_REQUEST);
aa1dbc98
NH
1138
1139 dav_headers = curl_slist_append(dav_headers, "Depth: 1");
1140 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1141
1142 slot = get_active_slot();
baa7b67d 1143 slot->results = &results;
ebaaf316
DM
1144 curl_setup_http(slot->curl, url, DAV_PROPFIND,
1145 &out_buffer, fwrite_buffer);
aa1dbc98 1146 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
8dda4cbd 1147 curl_easy_setopt(slot->curl, CURLOPT_WRITEDATA, &in_buffer);
aa1dbc98
NH
1148
1149 if (start_active_slot(slot)) {
1150 run_active_slot(slot);
baa7b67d 1151 if (results.curl_result == CURLE_OK) {
472b2570
MH
1152 XML_Parser parser = XML_ParserCreate(NULL);
1153 enum XML_Status result;
aa1dbc98
NH
1154 ctx.name = xcalloc(10, 1);
1155 ctx.len = 0;
1156 ctx.cdata = NULL;
3030baa7
NH
1157 ctx.userFunc = handle_remote_ls_ctx;
1158 ctx.userData = &ls;
aa1dbc98
NH
1159 XML_SetUserData(parser, &ctx);
1160 XML_SetElementHandler(parser, xml_start_tag,
1161 xml_end_tag);
1162 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
1163 result = XML_Parse(parser, in_buffer.buf,
1164 in_buffer.len, 1);
aa1dbc98
NH
1165 free(ctx.name);
1166
1167 if (result != XML_STATUS_OK) {
1168 fprintf(stderr, "XML error: %s\n",
1169 XML_ErrorString(
1170 XML_GetErrorCode(parser)));
1171 }
472b2570 1172 XML_ParserFree(parser);
aa1dbc98
NH
1173 }
1174 } else {
3030baa7 1175 fprintf(stderr, "Unable to start PROPFIND request\n");
aa1dbc98
NH
1176 }
1177
3030baa7 1178 free(ls.path);
aa1dbc98 1179 free(url);
028c2976
MH
1180 strbuf_release(&out_buffer.buf);
1181 strbuf_release(&in_buffer);
aa1dbc98
NH
1182 curl_slist_free_all(dav_headers);
1183}
1184
3030baa7
NH
1185static void get_remote_object_list(unsigned char parent)
1186{
1187 char path[] = "objects/XX/";
1188 static const char hex[] = "0123456789abcdef";
1189 unsigned int val = parent;
1190
1191 path[8] = hex[val >> 4];
1192 path[9] = hex[val & 0xf];
1193 remote_dir_exists[val] = 0;
1194 remote_ls(path, (PROCESS_FILES | PROCESS_DIRS),
1195 process_ls_object, &val);
1196}
1197
acf59575 1198static int locking_available(void)
58e60dd2
NH
1199{
1200 struct active_request_slot *slot;
baa7b67d 1201 struct slot_results results;
028c2976
MH
1202 struct strbuf in_buffer = STRBUF_INIT;
1203 struct buffer out_buffer = { STRBUF_INIT, 0 };
8cb01e2f 1204 struct curl_slist *dav_headers = http_copy_default_headers();
acf59575
NH
1205 struct xml_ctx ctx;
1206 int lock_flags = 0;
519d05be 1207 char *escaped;
58e60dd2 1208
519d05be
MH
1209 escaped = xml_entities(repo->url);
1210 strbuf_addf(&out_buffer.buf, PROPFIND_SUPPORTEDLOCK_REQUEST, escaped);
1211 free(escaped);
58e60dd2
NH
1212
1213 dav_headers = curl_slist_append(dav_headers, "Depth: 0");
1214 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
baa7b67d 1215
58e60dd2 1216 slot = get_active_slot();
baa7b67d 1217 slot->results = &results;
ebaaf316
DM
1218 curl_setup_http(slot->curl, repo->url, DAV_PROPFIND,
1219 &out_buffer, fwrite_buffer);
58e60dd2 1220 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
8dda4cbd 1221 curl_easy_setopt(slot->curl, CURLOPT_WRITEDATA, &in_buffer);
58e60dd2
NH
1222
1223 if (start_active_slot(slot)) {
1224 run_active_slot(slot);
baa7b67d 1225 if (results.curl_result == CURLE_OK) {
472b2570
MH
1226 XML_Parser parser = XML_ParserCreate(NULL);
1227 enum XML_Status result;
acf59575
NH
1228 ctx.name = xcalloc(10, 1);
1229 ctx.len = 0;
1230 ctx.cdata = NULL;
1231 ctx.userFunc = handle_lockprop_ctx;
1232 ctx.userData = &lock_flags;
1233 XML_SetUserData(parser, &ctx);
1234 XML_SetElementHandler(parser, xml_start_tag,
1235 xml_end_tag);
028c2976
MH
1236 result = XML_Parse(parser, in_buffer.buf,
1237 in_buffer.len, 1);
acf59575
NH
1238 free(ctx.name);
1239
1240 if (result != XML_STATUS_OK) {
1241 fprintf(stderr, "XML error: %s\n",
1242 XML_ErrorString(
1243 XML_GetErrorCode(parser)));
1244 lock_flags = 0;
1245 }
472b2570 1246 XML_ParserFree(parser);
325ce395 1247 if (!lock_flags)
d5c87cb4 1248 error("no DAV locking support on %s",
7b5201a6 1249 repo->url);
325ce395
JH
1250
1251 } else {
1252 error("Cannot access URL %s, return code %d",
7b5201a6 1253 repo->url, results.curl_result);
325ce395 1254 lock_flags = 0;
58e60dd2 1255 }
58e60dd2 1256 } else {
7b5201a6 1257 error("Unable to start PROPFIND request on %s", repo->url);
58e60dd2
NH
1258 }
1259
028c2976
MH
1260 strbuf_release(&out_buffer.buf);
1261 strbuf_release(&in_buffer);
acf59575
NH
1262 curl_slist_free_all(dav_headers);
1263
1264 return lock_flags;
58e60dd2
NH
1265}
1266
b5bf7cd6 1267static struct object_list **add_one_object(struct object *obj, struct object_list **p)
1f1e895f
LT
1268{
1269 struct object_list *entry = xmalloc(sizeof(struct object_list));
1270 entry->item = obj;
1271 entry->next = *p;
1272 *p = entry;
1273 return &entry->next;
1274}
1275
aa1dbc98 1276static struct object_list **process_blob(struct blob *blob,
41595938 1277 struct object_list **p)
58e60dd2 1278{
aa1dbc98 1279 struct object *obj = &blob->object;
58e60dd2 1280
aa1dbc98
NH
1281 obj->flags |= LOCAL;
1282
1283 if (obj->flags & (UNINTERESTING | SEEN))
1284 return p;
1285
1286 obj->flags |= SEEN;
1f1e895f 1287 return add_one_object(obj, p);
aa1dbc98
NH
1288}
1289
1290static struct object_list **process_tree(struct tree *tree,
41595938 1291 struct object_list **p)
aa1dbc98
NH
1292{
1293 struct object *obj = &tree->object;
2d9c58c6 1294 struct tree_desc desc;
4c068a98 1295 struct name_entry entry;
aa1dbc98
NH
1296
1297 obj->flags |= LOCAL;
1298
1299 if (obj->flags & (UNINTERESTING | SEEN))
1300 return p;
1301 if (parse_tree(tree) < 0)
f2fd0760 1302 die("bad tree object %s", oid_to_hex(&obj->oid));
aa1dbc98
NH
1303
1304 obj->flags |= SEEN;
1f1e895f 1305 p = add_one_object(obj, p);
2d9c58c6 1306
6fda5e51 1307 init_tree_desc(&desc, tree->buffer, tree->size);
2d9c58c6 1308
1bbeb4c6
JS
1309 while (tree_entry(&desc, &entry))
1310 switch (object_type(entry.mode)) {
1311 case OBJ_TREE:
ea82b2a0 1312 p = process_tree(lookup_tree(the_repository, &entry.oid),
f86bcc7b 1313 p);
1bbeb4c6
JS
1314 break;
1315 case OBJ_BLOB:
ea82b2a0 1316 p = process_blob(lookup_blob(the_repository, &entry.oid),
da14a7ff 1317 p);
1bbeb4c6
JS
1318 break;
1319 default:
1320 /* Subproject commit - not in this repository */
1321 break;
1322 }
1323
6e454b9a 1324 free_tree_buffer(tree);
aa1dbc98 1325 return p;
58e60dd2
NH
1326}
1327
1a703cba 1328static int get_delta(struct rev_info *revs, struct remote_lock *lock)
58e60dd2 1329{
1f1e895f 1330 int i;
58e60dd2 1331 struct commit *commit;
1f1e895f 1332 struct object_list **p = &objects;
1a703cba 1333 int count = 0;
58e60dd2 1334
aa1dbc98 1335 while ((commit = get_revision(revs)) != NULL) {
2e27bd77 1336 p = process_tree(get_commit_tree(commit), p);
aa1dbc98
NH
1337 commit->object.flags |= LOCAL;
1338 if (!(commit->object.flags & UNINTERESTING))
1a703cba 1339 count += add_send_request(&commit->object, lock);
aa1dbc98 1340 }
58e60dd2 1341
1f1e895f
LT
1342 for (i = 0; i < revs->pending.nr; i++) {
1343 struct object_array_entry *entry = revs->pending.objects + i;
1344 struct object *obj = entry->item;
1345 const char *name = entry->name;
58e60dd2 1346
aa1dbc98
NH
1347 if (obj->flags & (UNINTERESTING | SEEN))
1348 continue;
1974632c 1349 if (obj->type == OBJ_TAG) {
aa1dbc98 1350 obj->flags |= SEEN;
1f1e895f 1351 p = add_one_object(obj, p);
aa1dbc98 1352 continue;
58e60dd2 1353 }
1974632c 1354 if (obj->type == OBJ_TREE) {
41595938 1355 p = process_tree((struct tree *)obj, p);
aa1dbc98 1356 continue;
58e60dd2 1357 }
1974632c 1358 if (obj->type == OBJ_BLOB) {
41595938 1359 p = process_blob((struct blob *)obj, p);
aa1dbc98 1360 continue;
58e60dd2 1361 }
f2fd0760 1362 die("unknown pending object %s (%s)", oid_to_hex(&obj->oid), name);
aa1dbc98
NH
1363 }
1364
1365 while (objects) {
1366 if (!(objects->item->flags & UNINTERESTING))
1a703cba 1367 count += add_send_request(objects->item, lock);
aa1dbc98 1368 objects = objects->next;
58e60dd2 1369 }
1a703cba
NH
1370
1371 return count;
58e60dd2
NH
1372}
1373
1cb158b6 1374static int update_remote(const struct object_id *oid, struct remote_lock *lock)
58e60dd2
NH
1375{
1376 struct active_request_slot *slot;
baa7b67d 1377 struct slot_results results;
028c2976 1378 struct buffer out_buffer = { STRBUF_INIT, 0 };
b1c7d4aa 1379 struct curl_slist *dav_headers;
58e60dd2 1380
b1c7d4aa 1381 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF);
58e60dd2 1382
1cb158b6 1383 strbuf_addf(&out_buffer.buf, "%s\n", oid_to_hex(oid));
58e60dd2
NH
1384
1385 slot = get_active_slot();
baa7b67d 1386 slot->results = &results;
ebaaf316
DM
1387 curl_setup_http(slot->curl, lock->url, DAV_PUT,
1388 &out_buffer, fwrite_null);
58e60dd2 1389 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
58e60dd2
NH
1390
1391 if (start_active_slot(slot)) {
1392 run_active_slot(slot);
028c2976 1393 strbuf_release(&out_buffer.buf);
baa7b67d 1394 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1395 fprintf(stderr,
1396 "PUT error: curl result=%d, HTTP code=%ld\n",
baa7b67d 1397 results.curl_result, results.http_code);
58e60dd2
NH
1398 /* We should attempt recovery? */
1399 return 0;
1400 }
1401 } else {
028c2976 1402 strbuf_release(&out_buffer.buf);
58e60dd2
NH
1403 fprintf(stderr, "Unable to start PUT request\n");
1404 return 0;
1405 }
1406
1407 return 1;
1408}
1409
6d2bf96e 1410static struct ref *remote_refs;
aa1dbc98 1411
2aab167a 1412static void one_remote_ref(const char *refname)
aa1dbc98
NH
1413{
1414 struct ref *ref;
197e8951 1415 struct object *obj;
aa1dbc98 1416
59c69c0c 1417 ref = alloc_ref(refname);
c13b2633 1418
7b5201a6 1419 if (http_fetch_ref(repo->url, ref) != 0) {
aa1dbc98
NH
1420 fprintf(stderr,
1421 "Unable to fetch ref %s from %s\n",
7b5201a6 1422 refname, repo->url);
c13b2633 1423 free(ref);
aa1dbc98
NH
1424 return;
1425 }
1426
197e8951
NH
1427 /*
1428 * Fetch a copy of the object if it doesn't exist locally - it
1429 * may be required for updating server info later.
1430 */
f4e54d02 1431 if (repo->can_update_info_refs && !has_object_file(&ref->old_oid)) {
45a187cc 1432 obj = lookup_unknown_object(the_repository, &ref->old_oid);
e94eac49
RS
1433 fprintf(stderr, " fetch %s for %s\n",
1434 oid_to_hex(&ref->old_oid), refname);
1435 add_fetch_request(obj);
197e8951
NH
1436 }
1437
6d2bf96e
CB
1438 ref->next = remote_refs;
1439 remote_refs = ref;
aa1dbc98
NH
1440}
1441
aa1dbc98
NH
1442static void get_dav_remote_heads(void)
1443{
3030baa7 1444 remote_ls("refs/", (PROCESS_FILES | PROCESS_DIRS | RECURSIVE), process_ls_ref, NULL);
aa1dbc98
NH
1445}
1446
197e8951
NH
1447static void add_remote_info_ref(struct remote_ls_ctx *ls)
1448{
028c2976 1449 struct strbuf *buf = (struct strbuf *)ls->userData;
197e8951 1450 struct object *o;
c13b2633
DB
1451 struct ref *ref;
1452
59c69c0c 1453 ref = alloc_ref(ls->dentry_name);
197e8951 1454
7b5201a6 1455 if (http_fetch_ref(repo->url, ref) != 0) {
197e8951
NH
1456 fprintf(stderr,
1457 "Unable to fetch ref %s from %s\n",
7b5201a6 1458 ls->dentry_name, repo->url);
197e8951 1459 aborted = 1;
c13b2633 1460 free(ref);
197e8951
NH
1461 return;
1462 }
1463
109cd76d 1464 o = parse_object(the_repository, &ref->old_oid);
197e8951
NH
1465 if (!o) {
1466 fprintf(stderr,
1467 "Unable to parse object %s for remote ref %s\n",
f4e54d02 1468 oid_to_hex(&ref->old_oid), ls->dentry_name);
197e8951 1469 aborted = 1;
c13b2633 1470 free(ref);
197e8951
NH
1471 return;
1472 }
1473
7d0581a9 1474 strbuf_addf(buf, "%s\t%s\n",
f4e54d02 1475 oid_to_hex(&ref->old_oid), ls->dentry_name);
197e8951 1476
1974632c 1477 if (o->type == OBJ_TAG) {
a74093da 1478 o = deref_tag(the_repository, o, ls->dentry_name, 0);
7d0581a9
JK
1479 if (o)
1480 strbuf_addf(buf, "%s\t%s^{}\n",
f2fd0760 1481 oid_to_hex(&o->oid), ls->dentry_name);
197e8951 1482 }
c13b2633 1483 free(ref);
197e8951
NH
1484}
1485
1486static void update_remote_info_refs(struct remote_lock *lock)
1487{
028c2976 1488 struct buffer buffer = { STRBUF_INIT, 0 };
197e8951
NH
1489 struct active_request_slot *slot;
1490 struct slot_results results;
b1c7d4aa 1491 struct curl_slist *dav_headers;
197e8951 1492
197e8951 1493 remote_ls("refs/", (PROCESS_FILES | RECURSIVE),
028c2976 1494 add_remote_info_ref, &buffer.buf);
197e8951 1495 if (!aborted) {
b1c7d4aa 1496 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF);
197e8951
NH
1497
1498 slot = get_active_slot();
1499 slot->results = &results;
ebaaf316
DM
1500 curl_setup_http(slot->curl, lock->url, DAV_PUT,
1501 &buffer, fwrite_null);
197e8951 1502 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
197e8951 1503
197e8951
NH
1504 if (start_active_slot(slot)) {
1505 run_active_slot(slot);
1506 if (results.curl_result != CURLE_OK) {
1507 fprintf(stderr,
1508 "PUT error: curl result=%d, HTTP code=%ld\n",
1509 results.curl_result, results.http_code);
1510 }
1511 }
197e8951 1512 }
028c2976 1513 strbuf_release(&buffer.buf);
197e8951
NH
1514}
1515
1516static int remote_exists(const char *path)
1517{
28310186 1518 char *url = xstrfmt("%s%s", repo->url, path);
446b941a 1519 int ret;
197e8951 1520
197e8951 1521
1bbcc224 1522 switch (http_get_strbuf(url, NULL, NULL)) {
446b941a
MH
1523 case HTTP_OK:
1524 ret = 1;
1525 break;
1526 case HTTP_MISSING_TARGET:
1527 ret = 0;
1528 break;
1529 case HTTP_ERROR:
4df13f69 1530 error("unable to access '%s': %s", url, curl_errorstr);
1cf01a34 1531 /* fallthrough */
446b941a
MH
1532 default:
1533 ret = -1;
197e8951 1534 }
3a462bc9
MH
1535 free(url);
1536 return ret;
197e8951
NH
1537}
1538
8eb94600 1539static void fetch_symref(const char *path, char **symref, struct object_id *oid)
3dfaf7bc 1540{
28310186 1541 char *url = xstrfmt("%s%s", repo->url, path);
028c2976 1542 struct strbuf buffer = STRBUF_INIT;
ae021d87 1543 const char *name;
3dfaf7bc 1544
1bbcc224 1545 if (http_get_strbuf(url, &buffer, NULL) != HTTP_OK)
9af5abd9
MH
1546 die("Couldn't get %s for remote symref\n%s", url,
1547 curl_errorstr);
3dfaf7bc
NH
1548 free(url);
1549
6a83d902 1550 FREE_AND_NULL(*symref);
8eb94600 1551 oidclr(oid);
3dfaf7bc 1552
028c2976 1553 if (buffer.len == 0)
3dfaf7bc
NH
1554 return;
1555
f6786c8d
JK
1556 /* Cut off trailing newline. */
1557 strbuf_rtrim(&buffer);
1558
3dfaf7bc 1559 /* If it's a symref, set the refname; otherwise try for a sha1 */
ae021d87
JK
1560 if (skip_prefix(buffer.buf, "ref: ", &name)) {
1561 *symref = xmemdupz(name, buffer.len - (name - buffer.buf));
3dfaf7bc 1562 } else {
8eb94600 1563 get_oid_hex(buffer.buf, oid);
3dfaf7bc
NH
1564 }
1565
028c2976 1566 strbuf_release(&buffer);
3dfaf7bc
NH
1567}
1568
8eb94600 1569static int verify_merge_base(struct object_id *head_oid, struct ref *remote)
3dfaf7bc 1570{
bc83266a 1571 struct commit *head = lookup_commit_or_die(head_oid, "HEAD");
1572 struct commit *branch = lookup_commit_or_die(&remote->old_oid,
1573 remote->name);
3dfaf7bc 1574
65712251 1575 return in_merge_bases(branch, head);
3dfaf7bc
NH
1576}
1577
2aab167a 1578static int delete_remote_branch(const char *pattern, int force)
3dfaf7bc
NH
1579{
1580 struct ref *refs = remote_refs;
1581 struct ref *remote_ref = NULL;
8eb94600 1582 struct object_id head_oid;
3dfaf7bc
NH
1583 char *symref = NULL;
1584 int match;
1585 int patlen = strlen(pattern);
1586 int i;
1587 struct active_request_slot *slot;
1588 struct slot_results results;
1589 char *url;
1590
1591 /* Find the remote branch(es) matching the specified branch name */
1592 for (match = 0; refs; refs = refs->next) {
1593 char *name = refs->name;
1594 int namelen = strlen(name);
1595 if (namelen < patlen ||
1596 memcmp(name + namelen - patlen, pattern, patlen))
1597 continue;
1598 if (namelen != patlen && name[namelen - patlen - 1] != '/')
1599 continue;
1600 match++;
1601 remote_ref = refs;
1602 }
1603 if (match == 0)
1604 return error("No remote branch matches %s", pattern);
1605 if (match != 1)
1606 return error("More than one remote branch matches %s",
1607 pattern);
1608
1609 /*
1610 * Remote HEAD must be a symref (not exactly foolproof; a remote
1611 * symlink to a symref will look like a symref)
1612 */
8eb94600 1613 fetch_symref("HEAD", &symref, &head_oid);
3dfaf7bc
NH
1614 if (!symref)
1615 return error("Remote HEAD is not a symref");
1616
1617 /* Remote branch must not be the remote HEAD */
cd2b8ae9 1618 for (i = 0; symref && i < MAXDEPTH; i++) {
3dfaf7bc
NH
1619 if (!strcmp(remote_ref->name, symref))
1620 return error("Remote branch %s is the current HEAD",
1621 remote_ref->name);
8eb94600 1622 fetch_symref(symref, &symref, &head_oid);
3dfaf7bc
NH
1623 }
1624
1625 /* Run extra sanity checks if delete is not forced */
1626 if (!force) {
1627 /* Remote HEAD must resolve to a known object */
1628 if (symref)
1629 return error("Remote HEAD symrefs too deep");
8eb94600 1630 if (is_null_oid(&head_oid))
3dfaf7bc 1631 return error("Unable to resolve remote HEAD");
8eb94600 1632 if (!has_object_file(&head_oid))
1633 return error("Remote HEAD resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", oid_to_hex(&head_oid));
3dfaf7bc
NH
1634
1635 /* Remote branch must resolve to a known object */
f4e54d02 1636 if (is_null_oid(&remote_ref->old_oid))
3dfaf7bc
NH
1637 return error("Unable to resolve remote branch %s",
1638 remote_ref->name);
f4e54d02 1639 if (!has_object_file(&remote_ref->old_oid))
1640 return error("Remote branch %s resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", remote_ref->name, oid_to_hex(&remote_ref->old_oid));
3dfaf7bc
NH
1641
1642 /* Remote branch must be an ancestor of remote HEAD */
8eb94600 1643 if (!verify_merge_base(&head_oid, remote_ref)) {
00ae8289
BF
1644 return error("The branch '%s' is not an ancestor "
1645 "of your current HEAD.\n"
1646 "If you are sure you want to delete it,"
1647 " run:\n\t'git http-push -D %s %s'",
7b5201a6 1648 remote_ref->name, repo->url, pattern);
3dfaf7bc
NH
1649 }
1650 }
1651
1652 /* Send delete request */
1653 fprintf(stderr, "Removing remote branch '%s'\n", remote_ref->name);
6eaf4060
CB
1654 if (dry_run)
1655 return 0;
28310186 1656 url = xstrfmt("%s%s", repo->url, remote_ref->name);
3dfaf7bc
NH
1657 slot = get_active_slot();
1658 slot->results = &results;
ebaaf316 1659 curl_setup_http_get(slot->curl, url, DAV_DELETE);
3dfaf7bc
NH
1660 if (start_active_slot(slot)) {
1661 run_active_slot(slot);
1662 free(url);
1663 if (results.curl_result != CURLE_OK)
82247e9b 1664 return error("DELETE request failed (%d/%ld)",
3dfaf7bc
NH
1665 results.curl_result, results.http_code);
1666 } else {
1667 free(url);
1668 return error("Unable to start DELETE request");
1669 }
1670
1671 return 0;
1672}
1673
2af202be 1674static void run_request_queue(void)
4f66250d 1675{
4f66250d
TRC
1676 is_running_queue = 1;
1677 fill_active_slots();
1678 add_fill_function(NULL, fill_active_slot);
4f66250d
TRC
1679 do {
1680 finish_all_active_slots();
4f66250d 1681 fill_active_slots();
4f66250d
TRC
1682 } while (request_queue_head && !aborted);
1683
4f66250d 1684 is_running_queue = 0;
4f66250d
TRC
1685}
1686
3f2e2297 1687int cmd_main(int argc, const char **argv)
58e60dd2 1688{
58e60dd2
NH
1689 struct transfer_request *request;
1690 struct transfer_request *next_request;
38490dd4 1691 struct refspec rs = REFSPEC_INIT_PUSH;
512d632c 1692 struct remote_lock *ref_lock = NULL;
197e8951 1693 struct remote_lock *info_ref_lock = NULL;
3dfaf7bc
NH
1694 int delete_branch = 0;
1695 int force_delete = 0;
1a703cba 1696 int objects_to_send;
58e60dd2
NH
1697 int rc = 0;
1698 int i;
8c9e7947 1699 int new_refs;
454e2025 1700 struct ref *ref, *local_refs;
58e60dd2 1701
ca56dadb 1702 CALLOC_ARRAY(repo, 1);
58e60dd2
NH
1703
1704 argv++;
1705 for (i = 1; i < argc; i++, argv++) {
3f2e2297 1706 const char *arg = *argv;
58e60dd2
NH
1707
1708 if (*arg == '-') {
aa1dbc98 1709 if (!strcmp(arg, "--all")) {
28b9d6e5 1710 push_all = MATCH_REFS_ALL;
58e60dd2
NH
1711 continue;
1712 }
1713 if (!strcmp(arg, "--force")) {
1714 force_all = 1;
1715 continue;
1716 }
fe5d1d3e
SP
1717 if (!strcmp(arg, "--dry-run")) {
1718 dry_run = 1;
1719 continue;
1720 }
ae4efe19
SP
1721 if (!strcmp(arg, "--helper-status")) {
1722 helper_status = 1;
1723 continue;
1724 }
58e60dd2
NH
1725 if (!strcmp(arg, "--verbose")) {
1726 push_verbosely = 1;
e9176745 1727 http_is_verbose = 1;
58e60dd2
NH
1728 continue;
1729 }
3dfaf7bc
NH
1730 if (!strcmp(arg, "-d")) {
1731 delete_branch = 1;
1732 continue;
1733 }
1734 if (!strcmp(arg, "-D")) {
1735 delete_branch = 1;
1736 force_delete = 1;
1737 continue;
1738 }
548d3464
JN
1739 if (!strcmp(arg, "-h"))
1740 usage(http_push_usage);
58e60dd2 1741 }
7b5201a6 1742 if (!repo->url) {
aa1dbc98 1743 char *path = strstr(arg, "//");
1462d1af
TRC
1744 str_end_url_with_slash(arg, &repo->url);
1745 repo->path_len = strlen(repo->url);
aa1dbc98 1746 if (path) {
7b5201a6
AK
1747 repo->path = strchr(path+2, '/');
1748 if (repo->path)
1749 repo->path_len = strlen(repo->path);
aa1dbc98 1750 }
58e60dd2
NH
1751 continue;
1752 }
38490dd4 1753 refspec_appendn(&rs, argv, argc - i);
58e60dd2
NH
1754 break;
1755 }
1756
7b5201a6 1757 if (!repo->url)
3e9fabc8
NH
1758 usage(http_push_usage);
1759
38490dd4 1760 if (delete_branch && rs.nr != 1)
3dfaf7bc
NH
1761 die("You must specify only one branch name when deleting a remote branch");
1762
548d3464
JN
1763 setup_git_directory();
1764
aa1dbc98 1765 memset(remote_dir_exists, -1, 256);
0dd276b8 1766
a4ddbc33 1767 http_init(NULL, repo->url, 1);
58e60dd2 1768
4f66250d
TRC
1769 is_running_queue = 0;
1770
58e60dd2 1771 /* Verify DAV compliance/lock support */
acf59575 1772 if (!locking_available()) {
58e60dd2
NH
1773 rc = 1;
1774 goto cleanup;
1775 }
1776
57b235a4 1777 sigchain_push_common(remove_locks_on_signal);
6a491a17 1778
197e8951 1779 /* Check whether the remote has server info files */
7b5201a6
AK
1780 repo->can_update_info_refs = 0;
1781 repo->has_info_refs = remote_exists("info/refs");
1782 repo->has_info_packs = remote_exists("objects/info/packs");
1783 if (repo->has_info_refs) {
197e8951
NH
1784 info_ref_lock = lock_remote("info/refs", LOCK_TIME);
1785 if (info_ref_lock)
7b5201a6 1786 repo->can_update_info_refs = 1;
9bdbabad 1787 else {
d5c87cb4 1788 error("cannot lock existing info/refs");
9bdbabad
GB
1789 rc = 1;
1790 goto cleanup;
1791 }
197e8951 1792 }
7b5201a6 1793 if (repo->has_info_packs)
197e8951
NH
1794 fetch_indices();
1795
aa1dbc98 1796 /* Get a list of all local and remote heads to validate refspecs */
454e2025 1797 local_refs = get_local_heads();
aa1dbc98
NH
1798 fprintf(stderr, "Fetching remote heads...\n");
1799 get_dav_remote_heads();
4f66250d 1800 run_request_queue();
aa1dbc98 1801
3dfaf7bc
NH
1802 /* Remove a remote branch if -d or -D was specified */
1803 if (delete_branch) {
38490dd4
BW
1804 const char *branch = rs.items[i].src;
1805 if (delete_remote_branch(branch, force_delete) == -1) {
3dfaf7bc 1806 fprintf(stderr, "Unable to delete remote branch %s\n",
38490dd4 1807 branch);
ae4efe19 1808 if (helper_status)
38490dd4 1809 printf("error %s cannot remove\n", branch);
ae4efe19 1810 }
3dfaf7bc
NH
1811 goto cleanup;
1812 }
1813
aa1dbc98 1814 /* match them up */
5c7ec846 1815 if (match_push_refs(local_refs, &remote_refs, &rs, push_all)) {
9116de59
GB
1816 rc = -1;
1817 goto cleanup;
1818 }
aa1dbc98
NH
1819 if (!remote_refs) {
1820 fprintf(stderr, "No refs in common and none specified; doing nothing.\n");
ae4efe19
SP
1821 if (helper_status)
1822 printf("error null no match\n");
9116de59
GB
1823 rc = 0;
1824 goto cleanup;
aa1dbc98
NH
1825 }
1826
8c9e7947 1827 new_refs = 0;
aa1dbc98 1828 for (ref = remote_refs; ref; ref = ref->next) {
b78ce337 1829 struct rev_info revs;
ef8d7ac4 1830 struct strvec commit_argv = STRVEC_INIT;
8c9e7947 1831
aa1dbc98
NH
1832 if (!ref->peer_ref)
1833 continue;
6eaf4060 1834
f4e54d02 1835 if (is_null_oid(&ref->peer_ref->new_oid)) {
6eaf4060
CB
1836 if (delete_remote_branch(ref->name, 1) == -1) {
1837 error("Could not remove %s", ref->name);
ae4efe19
SP
1838 if (helper_status)
1839 printf("error %s cannot remove\n", ref->name);
6eaf4060
CB
1840 rc = -4;
1841 }
ae4efe19
SP
1842 else if (helper_status)
1843 printf("ok %s\n", ref->name);
6eaf4060
CB
1844 new_refs++;
1845 continue;
1846 }
1847
4a7e27e9 1848 if (oideq(&ref->old_oid, &ref->peer_ref->new_oid)) {
b5e59989 1849 if (push_verbosely)
aa1dbc98 1850 fprintf(stderr, "'%s': up-to-date\n", ref->name);
ae4efe19
SP
1851 if (helper_status)
1852 printf("ok %s up to date\n", ref->name);
aa1dbc98
NH
1853 continue;
1854 }
1855
1856 if (!force_all &&
f4e54d02 1857 !is_null_oid(&ref->old_oid) &&
aa1dbc98 1858 !ref->force) {
f4e54d02 1859 if (!has_object_file(&ref->old_oid) ||
6f3d57b6 1860 !ref_newer(&ref->peer_ref->new_oid,
1861 &ref->old_oid)) {
00ae8289
BF
1862 /*
1863 * We do not have the remote ref, or
aa1dbc98
NH
1864 * we know that the remote ref is not
1865 * an ancestor of what we are trying to
1866 * push. Either way this can be losing
1867 * commits at the remote end and likely
1868 * we were not up to date to begin with.
1869 */
00ae8289
BF
1870 error("remote '%s' is not an ancestor of\n"
1871 "local '%s'.\n"
1872 "Maybe you are not up-to-date and "
aa1dbc98
NH
1873 "need to pull first?",
1874 ref->name,
1875 ref->peer_ref->name);
ae4efe19
SP
1876 if (helper_status)
1877 printf("error %s non-fast forward\n", ref->name);
1a703cba 1878 rc = -2;
aa1dbc98
NH
1879 continue;
1880 }
58e60dd2 1881 }
f4e54d02 1882 oidcpy(&ref->new_oid, &ref->peer_ref->new_oid);
aa1dbc98 1883 new_refs++;
aa1dbc98
NH
1884
1885 fprintf(stderr, "updating '%s'", ref->name);
1886 if (strcmp(ref->name, ref->peer_ref->name))
1887 fprintf(stderr, " using '%s'", ref->peer_ref->name);
2b87d3a8 1888 fprintf(stderr, "\n from %s\n to %s\n",
f4e54d02 1889 oid_to_hex(&ref->old_oid), oid_to_hex(&ref->new_oid));
ae4efe19
SP
1890 if (dry_run) {
1891 if (helper_status)
1892 printf("ok %s\n", ref->name);
fe5d1d3e 1893 continue;
ae4efe19 1894 }
58e60dd2
NH
1895
1896 /* Lock remote branch ref */
aa1dbc98 1897 ref_lock = lock_remote(ref->name, LOCK_TIME);
afe8a907 1898 if (!ref_lock) {
58e60dd2 1899 fprintf(stderr, "Unable to lock remote branch %s\n",
aa1dbc98 1900 ref->name);
ae4efe19
SP
1901 if (helper_status)
1902 printf("error %s lock error\n", ref->name);
58e60dd2
NH
1903 rc = 1;
1904 continue;
1905 }
1906
aa1dbc98 1907 /* Set up revision info for this refspec */
ef8d7ac4
JK
1908 strvec_push(&commit_argv, ""); /* ignored */
1909 strvec_push(&commit_argv, "--objects");
1910 strvec_push(&commit_argv, oid_to_hex(&ref->new_oid));
f4e54d02 1911 if (!push_all && !is_null_oid(&ref->old_oid))
ef8d7ac4 1912 strvec_pushf(&commit_argv, "^%s",
f6d8942b 1913 oid_to_hex(&ref->old_oid));
2abf3503 1914 repo_init_revisions(the_repository, &revs, setup_git_directory());
d70a9eb6 1915 setup_revisions(commit_argv.nr, commit_argv.v, &revs, NULL);
d633c882 1916 revs.edge_hint = 0; /* just in case */
58e60dd2 1917
aa1dbc98 1918 /* Generate a list of objects that need to be pushed */
58e60dd2 1919 pushing = 0;
3d51e1b5
MK
1920 if (prepare_revision_walk(&revs))
1921 die("revision walk setup failed");
4f6d26b1 1922 mark_edges_uninteresting(&revs, NULL, 0);
1a703cba 1923 objects_to_send = get_delta(&revs, ref_lock);
29508e1e 1924 finish_all_active_slots();
58e60dd2
NH
1925
1926 /* Push missing objects to remote, this would be a
1927 convenient time to pack them first if appropriate. */
1928 pushing = 1;
1a703cba
NH
1929 if (objects_to_send)
1930 fprintf(stderr, " sending %d objects\n",
1931 objects_to_send);
4f66250d
TRC
1932
1933 run_request_queue();
58e60dd2
NH
1934
1935 /* Update the remote branch if all went well */
1cb158b6 1936 if (aborted || !update_remote(&ref->new_oid, ref_lock))
aa1dbc98 1937 rc = 1;
58e60dd2 1938
aa1dbc98
NH
1939 if (!rc)
1940 fprintf(stderr, " done\n");
ae4efe19
SP
1941 if (helper_status)
1942 printf("%s %s\n", !rc ? "ok" : "error", ref->name);
aa1dbc98 1943 unlock_remote(ref_lock);
512d632c 1944 check_locks();
ef8d7ac4 1945 strvec_clear(&commit_argv);
b78ce337 1946 release_revisions(&revs);
58e60dd2
NH
1947 }
1948
197e8951 1949 /* Update remote server info if appropriate */
7b5201a6
AK
1950 if (repo->has_info_refs && new_refs) {
1951 if (info_ref_lock && repo->can_update_info_refs) {
197e8951 1952 fprintf(stderr, "Updating remote server info\n");
fe5d1d3e
SP
1953 if (!dry_run)
1954 update_remote_info_refs(info_ref_lock);
197e8951
NH
1955 } else {
1956 fprintf(stderr, "Unable to update server info\n");
1957 }
1958 }
197e8951 1959
58e60dd2 1960 cleanup:
9116de59
GB
1961 if (info_ref_lock)
1962 unlock_remote(info_ref_lock);
7b5201a6 1963 free(repo);
58e60dd2 1964
29508e1e 1965 http_cleanup();
58e60dd2
NH
1966
1967 request = request_queue_head;
1968 while (request != NULL) {
1969 next_request = request->next;
1970 release_request(request);
58e60dd2
NH
1971 request = next_request;
1972 }
1973
58e60dd2
NH
1974 return rc;
1975}