]> git.ipfire.org Git - thirdparty/git.git/blame - http.c
bundle: put strbuf_readline_fd in strbuf.c with adjustments
[thirdparty/git.git] / http.c
CommitLineData
29508e1e 1#include "http.h"
2264dfa5 2#include "pack.h"
de1a2fdd 3#include "sideband.h"
fe72d420 4#include "run-command.h"
f39f72d8 5#include "url.h"
29508e1e 6
4251ccbd 7int active_requests;
e9176745 8int http_is_verbose;
de1a2fdd 9size_t http_post_buffer = 16 * LARGE_PACKET_MAX;
29508e1e 10
b8ac9230
MS
11#if LIBCURL_VERSION_NUM >= 0x070a06
12#define LIBCURL_CAN_HANDLE_AUTH_ANY
13#endif
14
ad75ebe5
TRC
15static int min_curl_sessions = 1;
16static int curl_session_count;
29508e1e 17#ifdef USE_CURL_MULTI
cc3530e8
MH
18static int max_requests = -1;
19static CURLM *curlm;
29508e1e
NH
20#endif
21#ifndef NO_CURL_EASY_DUPHANDLE
cc3530e8 22static CURL *curl_default;
29508e1e 23#endif
5424bc55
TRC
24
25#define PREV_BUF_SIZE 4096
26#define RANGE_HEADER_SIZE 30
27
29508e1e
NH
28char curl_errorstr[CURL_ERROR_SIZE];
29
cc3530e8 30static int curl_ssl_verify = -1;
4251ccbd 31static const char *ssl_cert;
ef52aafa 32#if LIBCURL_VERSION_NUM >= 0x070903
4251ccbd 33static const char *ssl_key;
29508e1e
NH
34#endif
35#if LIBCURL_VERSION_NUM >= 0x070908
4251ccbd 36static const char *ssl_capath;
29508e1e 37#endif
4251ccbd 38static const char *ssl_cainfo;
cc3530e8
MH
39static long curl_low_speed_limit = -1;
40static long curl_low_speed_time = -1;
4251ccbd
JH
41static int curl_ftp_no_epsv;
42static const char *curl_http_proxy;
bcfb95dd 43static const char *curl_cookie_file;
070b4dd5 44static char *user_name, *user_pass, *description;
a4ddbc33 45static int http_proactive_auth;
b1d1058c 46static const char *user_agent;
29508e1e 47
30dd9163
ML
48#if LIBCURL_VERSION_NUM >= 0x071700
49/* Use CURLOPT_KEYPASSWD as is */
50#elif LIBCURL_VERSION_NUM >= 0x070903
51#define CURLOPT_KEYPASSWD CURLOPT_SSLKEYPASSWD
52#else
53#define CURLOPT_KEYPASSWD CURLOPT_SSLCERTPASSWD
54#endif
55
56static char *ssl_cert_password;
57static int ssl_cert_password_required;
58
cc3530e8 59static struct curl_slist *pragma_header;
5424bc55 60static struct curl_slist *no_pragma_header;
e9176745 61
4251ccbd 62static struct active_request_slot *active_queue_head;
29508e1e 63
a04ff3ec 64size_t fread_buffer(char *ptr, size_t eltsize, size_t nmemb, void *buffer_)
29508e1e
NH
65{
66 size_t size = eltsize * nmemb;
f444e528
JH
67 struct buffer *buffer = buffer_;
68
028c2976
MH
69 if (size > buffer->buf.len - buffer->posn)
70 size = buffer->buf.len - buffer->posn;
71 memcpy(ptr, buffer->buf.buf + buffer->posn, size);
29508e1e 72 buffer->posn += size;
028c2976 73
29508e1e
NH
74 return size;
75}
76
3944ba0c
MS
77#ifndef NO_CURL_IOCTL
78curlioerr ioctl_buffer(CURL *handle, int cmd, void *clientp)
79{
80 struct buffer *buffer = clientp;
81
82 switch (cmd) {
83 case CURLIOCMD_NOP:
84 return CURLIOE_OK;
85
86 case CURLIOCMD_RESTARTREAD:
87 buffer->posn = 0;
88 return CURLIOE_OK;
89
90 default:
91 return CURLIOE_UNKNOWNCMD;
92 }
93}
94#endif
95
a04ff3ec 96size_t fwrite_buffer(char *ptr, size_t eltsize, size_t nmemb, void *buffer_)
29508e1e
NH
97{
98 size_t size = eltsize * nmemb;
f444e528
JH
99 struct strbuf *buffer = buffer_;
100
028c2976 101 strbuf_add(buffer, ptr, size);
29508e1e
NH
102 return size;
103}
104
a04ff3ec 105size_t fwrite_null(char *ptr, size_t eltsize, size_t nmemb, void *strbuf)
29508e1e 106{
29508e1e
NH
107 return eltsize * nmemb;
108}
109
29508e1e
NH
110#ifdef USE_CURL_MULTI
111static void process_curl_messages(void)
112{
113 int num_messages;
114 struct active_request_slot *slot;
115 CURLMsg *curl_message = curl_multi_info_read(curlm, &num_messages);
116
117 while (curl_message != NULL) {
118 if (curl_message->msg == CURLMSG_DONE) {
119 int curl_result = curl_message->data.result;
120 slot = active_queue_head;
121 while (slot != NULL &&
122 slot->curl != curl_message->easy_handle)
123 slot = slot->next;
124 if (slot != NULL) {
125 curl_multi_remove_handle(curlm, slot->curl);
126 slot->curl_result = curl_result;
127 finish_active_slot(slot);
128 } else {
129 fprintf(stderr, "Received DONE message for unknown request!\n");
130 }
131 } else {
132 fprintf(stderr, "Unknown CURL message received: %d\n",
133 (int)curl_message->msg);
134 }
135 curl_message = curl_multi_info_read(curlm, &num_messages);
136 }
137}
138#endif
139
070b4dd5
MG
140static char *git_getpass_with_description(const char *what, const char *desc)
141{
142 struct strbuf prompt = STRBUF_INIT;
143 char *r;
144
145 if (desc)
146 strbuf_addf(&prompt, "%s for '%s': ", what, desc);
147 else
148 strbuf_addf(&prompt, "%s: ", what);
149 /*
150 * NEEDSWORK: for usernames, we should do something less magical that
151 * actually echoes the characters. However, we need to read from
152 * /dev/tty and not stdio, which is not portable (but getpass will do
153 * it for us). http.c uses the same workaround.
154 */
155 r = git_getpass(prompt.buf);
156
157 strbuf_release(&prompt);
158 return xstrdup(r);
159}
160
ef90d6d4 161static int http_options(const char *var, const char *value, void *cb)
29508e1e
NH
162{
163 if (!strcmp("http.sslverify", var)) {
7059cd99 164 curl_ssl_verify = git_config_bool(var, value);
29508e1e
NH
165 return 0;
166 }
7059cd99
JH
167 if (!strcmp("http.sslcert", var))
168 return git_config_string(&ssl_cert, var, value);
ef52aafa 169#if LIBCURL_VERSION_NUM >= 0x070903
7059cd99
JH
170 if (!strcmp("http.sslkey", var))
171 return git_config_string(&ssl_key, var, value);
29508e1e
NH
172#endif
173#if LIBCURL_VERSION_NUM >= 0x070908
7059cd99
JH
174 if (!strcmp("http.sslcapath", var))
175 return git_config_string(&ssl_capath, var, value);
29508e1e 176#endif
7059cd99
JH
177 if (!strcmp("http.sslcainfo", var))
178 return git_config_string(&ssl_cainfo, var, value);
754ae192
ML
179 if (!strcmp("http.sslcertpasswordprotected", var)) {
180 if (git_config_bool(var, value))
181 ssl_cert_password_required = 1;
182 return 0;
183 }
ad75ebe5
TRC
184 if (!strcmp("http.minsessions", var)) {
185 min_curl_sessions = git_config_int(var, value);
186#ifndef USE_CURL_MULTI
187 if (min_curl_sessions > 1)
188 min_curl_sessions = 1;
189#endif
190 return 0;
191 }
a6080a0a 192#ifdef USE_CURL_MULTI
29508e1e 193 if (!strcmp("http.maxrequests", var)) {
7059cd99 194 max_requests = git_config_int(var, value);
29508e1e
NH
195 return 0;
196 }
197#endif
29508e1e 198 if (!strcmp("http.lowspeedlimit", var)) {
7059cd99 199 curl_low_speed_limit = (long)git_config_int(var, value);
29508e1e
NH
200 return 0;
201 }
202 if (!strcmp("http.lowspeedtime", var)) {
7059cd99 203 curl_low_speed_time = (long)git_config_int(var, value);
29508e1e
NH
204 return 0;
205 }
206
3ea099d4
SK
207 if (!strcmp("http.noepsv", var)) {
208 curl_ftp_no_epsv = git_config_bool(var, value);
209 return 0;
210 }
7059cd99
JH
211 if (!strcmp("http.proxy", var))
212 return git_config_string(&curl_http_proxy, var, value);
3ea099d4 213
bcfb95dd
DB
214 if (!strcmp("http.cookiefile", var))
215 return git_config_string(&curl_cookie_file, var, value);
216
de1a2fdd
SP
217 if (!strcmp("http.postbuffer", var)) {
218 http_post_buffer = git_config_int(var, value);
219 if (http_post_buffer < LARGE_PACKET_MAX)
220 http_post_buffer = LARGE_PACKET_MAX;
221 return 0;
222 }
223
b1d1058c
SO
224 if (!strcmp("http.useragent", var))
225 return git_config_string(&user_agent, var, value);
226
29508e1e 227 /* Fall back on the default ones */
ef90d6d4 228 return git_default_config(var, value, cb);
29508e1e
NH
229}
230
c33976cb
JH
231static void init_curl_http_auth(CURL *result)
232{
750d9305 233 if (user_name) {
c33976cb
JH
234 struct strbuf up = STRBUF_INIT;
235 if (!user_pass)
070b4dd5 236 user_pass = xstrdup(git_getpass_with_description("Password", description));
c33976cb
JH
237 strbuf_addf(&up, "%s:%s", user_name, user_pass);
238 curl_easy_setopt(result, CURLOPT_USERPWD,
239 strbuf_detach(&up, NULL));
240 }
241}
242
30dd9163
ML
243static int has_cert_password(void)
244{
245 if (ssl_cert_password != NULL)
246 return 1;
247 if (ssl_cert == NULL || ssl_cert_password_required != 1)
248 return 0;
249 /* Only prompt the user once. */
250 ssl_cert_password_required = -1;
070b4dd5 251 ssl_cert_password = git_getpass_with_description("Certificate Password", description);
30dd9163
ML
252 if (ssl_cert_password != NULL) {
253 ssl_cert_password = xstrdup(ssl_cert_password);
254 return 1;
255 } else
256 return 0;
257}
258
4251ccbd 259static CURL *get_curl_handle(void)
11979b98 260{
4251ccbd 261 CURL *result = curl_easy_init();
11979b98 262
a5ccc597
JH
263 if (!curl_ssl_verify) {
264 curl_easy_setopt(result, CURLOPT_SSL_VERIFYPEER, 0);
265 curl_easy_setopt(result, CURLOPT_SSL_VERIFYHOST, 0);
266 } else {
267 /* Verify authenticity of the peer's certificate */
268 curl_easy_setopt(result, CURLOPT_SSL_VERIFYPEER, 1);
269 /* The name in the cert must match whom we tried to connect */
270 curl_easy_setopt(result, CURLOPT_SSL_VERIFYHOST, 2);
271 }
272
11979b98
JH
273#if LIBCURL_VERSION_NUM >= 0x070907
274 curl_easy_setopt(result, CURLOPT_NETRC, CURL_NETRC_OPTIONAL);
275#endif
b8ac9230 276#ifdef LIBCURL_CAN_HANDLE_AUTH_ANY
525ecd26 277 curl_easy_setopt(result, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
b8ac9230 278#endif
11979b98 279
a4ddbc33
JK
280 if (http_proactive_auth)
281 init_curl_http_auth(result);
282
11979b98
JH
283 if (ssl_cert != NULL)
284 curl_easy_setopt(result, CURLOPT_SSLCERT, ssl_cert);
30dd9163
ML
285 if (has_cert_password())
286 curl_easy_setopt(result, CURLOPT_KEYPASSWD, ssl_cert_password);
ef52aafa 287#if LIBCURL_VERSION_NUM >= 0x070903
11979b98
JH
288 if (ssl_key != NULL)
289 curl_easy_setopt(result, CURLOPT_SSLKEY, ssl_key);
290#endif
291#if LIBCURL_VERSION_NUM >= 0x070908
292 if (ssl_capath != NULL)
293 curl_easy_setopt(result, CURLOPT_CAPATH, ssl_capath);
294#endif
295 if (ssl_cainfo != NULL)
296 curl_easy_setopt(result, CURLOPT_CAINFO, ssl_cainfo);
297 curl_easy_setopt(result, CURLOPT_FAILONERROR, 1);
298
299 if (curl_low_speed_limit > 0 && curl_low_speed_time > 0) {
300 curl_easy_setopt(result, CURLOPT_LOW_SPEED_LIMIT,
301 curl_low_speed_limit);
302 curl_easy_setopt(result, CURLOPT_LOW_SPEED_TIME,
303 curl_low_speed_time);
304 }
305
306 curl_easy_setopt(result, CURLOPT_FOLLOWLOCATION, 1);
311e2ea0
TRC
307#if LIBCURL_VERSION_NUM >= 0x071301
308 curl_easy_setopt(result, CURLOPT_POSTREDIR, CURL_REDIR_POST_ALL);
309#elif LIBCURL_VERSION_NUM >= 0x071101
310 curl_easy_setopt(result, CURLOPT_POST301, 1);
311#endif
11979b98 312
7982d74e
MW
313 if (getenv("GIT_CURL_VERBOSE"))
314 curl_easy_setopt(result, CURLOPT_VERBOSE, 1);
315
b1d1058c
SO
316 curl_easy_setopt(result, CURLOPT_USERAGENT,
317 user_agent ? user_agent : GIT_HTTP_USER_AGENT);
20fc9bc5 318
3ea099d4
SK
319 if (curl_ftp_no_epsv)
320 curl_easy_setopt(result, CURLOPT_FTP_USE_EPSV, 0);
321
9c5665aa
SV
322 if (curl_http_proxy)
323 curl_easy_setopt(result, CURLOPT_PROXY, curl_http_proxy);
324
11979b98
JH
325 return result;
326}
327
c33976cb
JH
328static void http_auth_init(const char *url)
329{
070b4dd5 330 const char *at, *colon, *cp, *slash, *host;
c33976cb
JH
331
332 cp = strstr(url, "://");
333 if (!cp)
334 return;
335
336 /*
337 * Ok, the URL looks like "proto://something". Which one?
338 * "proto://<user>:<pass>@<host>/...",
339 * "proto://<user>@<host>/...", or just
340 * "proto://<host>/..."?
341 */
342 cp += 3;
343 at = strchr(cp, '@');
344 colon = strchr(cp, ':');
345 slash = strchrnul(cp, '/');
070b4dd5
MG
346 if (!at || slash <= at) {
347 /* No credentials, but we may have to ask for some later */
348 host = cp;
349 }
350 else if (!colon || at <= colon) {
c33976cb 351 /* Only username */
66c84485 352 user_name = url_decode_mem(cp, at - cp);
c33976cb 353 user_pass = NULL;
070b4dd5 354 host = at + 1;
c33976cb 355 } else {
66c84485
JK
356 user_name = url_decode_mem(cp, colon - cp);
357 user_pass = url_decode_mem(colon + 1, at - (colon + 1));
070b4dd5 358 host = at + 1;
c33976cb 359 }
070b4dd5
MG
360
361 description = url_decode_mem(host, slash - host);
c33976cb
JH
362}
363
7059cd99
JH
364static void set_from_env(const char **var, const char *envname)
365{
366 const char *val = getenv(envname);
367 if (val)
368 *var = val;
369}
370
a4ddbc33 371void http_init(struct remote *remote, const char *url, int proactive_auth)
29508e1e
NH
372{
373 char *low_speed_limit;
374 char *low_speed_time;
375
e9176745
TRC
376 http_is_verbose = 0;
377
7059cd99
JH
378 git_config(http_options, NULL);
379
29508e1e
NH
380 curl_global_init(CURL_GLOBAL_ALL);
381
a4ddbc33
JK
382 http_proactive_auth = proactive_auth;
383
9fc6440d
MH
384 if (remote && remote->http_proxy)
385 curl_http_proxy = xstrdup(remote->http_proxy);
386
29508e1e 387 pragma_header = curl_slist_append(pragma_header, "Pragma: no-cache");
e9176745 388 no_pragma_header = curl_slist_append(no_pragma_header, "Pragma:");
29508e1e
NH
389
390#ifdef USE_CURL_MULTI
391 {
392 char *http_max_requests = getenv("GIT_HTTP_MAX_REQUESTS");
393 if (http_max_requests != NULL)
394 max_requests = atoi(http_max_requests);
395 }
396
397 curlm = curl_multi_init();
398 if (curlm == NULL) {
399 fprintf(stderr, "Error creating curl multi handle.\n");
400 exit(1);
401 }
402#endif
403
404 if (getenv("GIT_SSL_NO_VERIFY"))
405 curl_ssl_verify = 0;
406
7059cd99 407 set_from_env(&ssl_cert, "GIT_SSL_CERT");
ef52aafa 408#if LIBCURL_VERSION_NUM >= 0x070903
7059cd99 409 set_from_env(&ssl_key, "GIT_SSL_KEY");
29508e1e
NH
410#endif
411#if LIBCURL_VERSION_NUM >= 0x070908
7059cd99 412 set_from_env(&ssl_capath, "GIT_SSL_CAPATH");
29508e1e 413#endif
7059cd99 414 set_from_env(&ssl_cainfo, "GIT_SSL_CAINFO");
29508e1e 415
b1d1058c
SO
416 set_from_env(&user_agent, "GIT_HTTP_USER_AGENT");
417
29508e1e
NH
418 low_speed_limit = getenv("GIT_HTTP_LOW_SPEED_LIMIT");
419 if (low_speed_limit != NULL)
420 curl_low_speed_limit = strtol(low_speed_limit, NULL, 10);
421 low_speed_time = getenv("GIT_HTTP_LOW_SPEED_TIME");
422 if (low_speed_time != NULL)
423 curl_low_speed_time = strtol(low_speed_time, NULL, 10);
424
29508e1e
NH
425 if (curl_ssl_verify == -1)
426 curl_ssl_verify = 1;
427
ad75ebe5 428 curl_session_count = 0;
29508e1e
NH
429#ifdef USE_CURL_MULTI
430 if (max_requests < 1)
431 max_requests = DEFAULT_MAX_REQUESTS;
432#endif
433
3ea099d4
SK
434 if (getenv("GIT_CURL_FTP_NO_EPSV"))
435 curl_ftp_no_epsv = 1;
436
deba4937
JK
437 if (url) {
438 http_auth_init(url);
754ae192
ML
439 if (!ssl_cert_password_required &&
440 getenv("GIT_SSL_CERT_PASSWORD_PROTECTED") &&
deba4937 441 !prefixcmp(url, "https://"))
30dd9163
ML
442 ssl_cert_password_required = 1;
443 }
c33976cb 444
29508e1e
NH
445#ifndef NO_CURL_EASY_DUPHANDLE
446 curl_default = get_curl_handle();
447#endif
448}
449
450void http_cleanup(void)
451{
452 struct active_request_slot *slot = active_queue_head;
29508e1e
NH
453
454 while (slot != NULL) {
3278cd0a 455 struct active_request_slot *next = slot->next;
f23d1f76 456 if (slot->curl != NULL) {
29508e1e 457#ifdef USE_CURL_MULTI
f23d1f76 458 curl_multi_remove_handle(curlm, slot->curl);
29508e1e 459#endif
29508e1e 460 curl_easy_cleanup(slot->curl);
f23d1f76 461 }
3278cd0a
SP
462 free(slot);
463 slot = next;
29508e1e 464 }
3278cd0a 465 active_queue_head = NULL;
29508e1e
NH
466
467#ifndef NO_CURL_EASY_DUPHANDLE
468 curl_easy_cleanup(curl_default);
469#endif
470
471#ifdef USE_CURL_MULTI
472 curl_multi_cleanup(curlm);
473#endif
474 curl_global_cleanup();
b3ca4e4e
NH
475
476 curl_slist_free_all(pragma_header);
3278cd0a 477 pragma_header = NULL;
9fc6440d 478
e9176745
TRC
479 curl_slist_free_all(no_pragma_header);
480 no_pragma_header = NULL;
481
9fc6440d 482 if (curl_http_proxy) {
e4a80ecf 483 free((void *)curl_http_proxy);
9fc6440d
MH
484 curl_http_proxy = NULL;
485 }
30dd9163
ML
486
487 if (ssl_cert_password != NULL) {
488 memset(ssl_cert_password, 0, strlen(ssl_cert_password));
489 free(ssl_cert_password);
490 ssl_cert_password = NULL;
491 }
492 ssl_cert_password_required = 0;
29508e1e
NH
493}
494
29508e1e
NH
495struct active_request_slot *get_active_slot(void)
496{
497 struct active_request_slot *slot = active_queue_head;
498 struct active_request_slot *newslot;
499
500#ifdef USE_CURL_MULTI
501 int num_transfers;
502
503 /* Wait for a slot to open up if the queue is full */
504 while (active_requests >= max_requests) {
505 curl_multi_perform(curlm, &num_transfers);
4251ccbd 506 if (num_transfers < active_requests)
29508e1e 507 process_curl_messages();
29508e1e
NH
508 }
509#endif
510
4251ccbd 511 while (slot != NULL && slot->in_use)
29508e1e 512 slot = slot->next;
4251ccbd 513
29508e1e
NH
514 if (slot == NULL) {
515 newslot = xmalloc(sizeof(*newslot));
516 newslot->curl = NULL;
517 newslot->in_use = 0;
518 newslot->next = NULL;
519
520 slot = active_queue_head;
521 if (slot == NULL) {
522 active_queue_head = newslot;
523 } else {
4251ccbd 524 while (slot->next != NULL)
29508e1e 525 slot = slot->next;
29508e1e
NH
526 slot->next = newslot;
527 }
528 slot = newslot;
529 }
530
531 if (slot->curl == NULL) {
532#ifdef NO_CURL_EASY_DUPHANDLE
533 slot->curl = get_curl_handle();
534#else
535 slot->curl = curl_easy_duphandle(curl_default);
536#endif
ad75ebe5 537 curl_session_count++;
29508e1e
NH
538 }
539
540 active_requests++;
541 slot->in_use = 1;
c8568e13 542 slot->results = NULL;
baa7b67d 543 slot->finished = NULL;
29508e1e
NH
544 slot->callback_data = NULL;
545 slot->callback_func = NULL;
bcfb95dd 546 curl_easy_setopt(slot->curl, CURLOPT_COOKIEFILE, curl_cookie_file);
29508e1e 547 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, pragma_header);
29508e1e 548 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, curl_errorstr);
9094950d
NH
549 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, NULL);
550 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, NULL);
551 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, NULL);
1e41827d 552 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, NULL);
9094950d
NH
553 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 0);
554 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
29508e1e
NH
555
556 return slot;
557}
558
559int start_active_slot(struct active_request_slot *slot)
560{
561#ifdef USE_CURL_MULTI
562 CURLMcode curlm_result = curl_multi_add_handle(curlm, slot->curl);
45c17412 563 int num_transfers;
29508e1e
NH
564
565 if (curlm_result != CURLM_OK &&
566 curlm_result != CURLM_CALL_MULTI_PERFORM) {
567 active_requests--;
568 slot->in_use = 0;
569 return 0;
570 }
45c17412
DB
571
572 /*
573 * We know there must be something to do, since we just added
574 * something.
575 */
576 curl_multi_perform(curlm, &num_transfers);
29508e1e
NH
577#endif
578 return 1;
579}
580
581#ifdef USE_CURL_MULTI
fc57b6aa
DB
582struct fill_chain {
583 void *data;
584 int (*fill)(void *);
585 struct fill_chain *next;
586};
587
4251ccbd 588static struct fill_chain *fill_cfg;
fc57b6aa
DB
589
590void add_fill_function(void *data, int (*fill)(void *))
591{
e8eec71d 592 struct fill_chain *new = xmalloc(sizeof(*new));
fc57b6aa
DB
593 struct fill_chain **linkp = &fill_cfg;
594 new->data = data;
595 new->fill = fill;
596 new->next = NULL;
597 while (*linkp)
598 linkp = &(*linkp)->next;
599 *linkp = new;
600}
601
45c17412
DB
602void fill_active_slots(void)
603{
604 struct active_request_slot *slot = active_queue_head;
605
fc57b6aa
DB
606 while (active_requests < max_requests) {
607 struct fill_chain *fill;
608 for (fill = fill_cfg; fill; fill = fill->next)
609 if (fill->fill(fill->data))
610 break;
611
612 if (!fill)
45c17412 613 break;
fc57b6aa 614 }
45c17412
DB
615
616 while (slot != NULL) {
ad75ebe5
TRC
617 if (!slot->in_use && slot->curl != NULL
618 && curl_session_count > min_curl_sessions) {
45c17412
DB
619 curl_easy_cleanup(slot->curl);
620 slot->curl = NULL;
ad75ebe5 621 curl_session_count--;
45c17412
DB
622 }
623 slot = slot->next;
624 }
625}
626
29508e1e
NH
627void step_active_slots(void)
628{
629 int num_transfers;
630 CURLMcode curlm_result;
631
632 do {
633 curlm_result = curl_multi_perform(curlm, &num_transfers);
634 } while (curlm_result == CURLM_CALL_MULTI_PERFORM);
635 if (num_transfers < active_requests) {
636 process_curl_messages();
637 fill_active_slots();
638 }
639}
640#endif
641
642void run_active_slot(struct active_request_slot *slot)
643{
644#ifdef USE_CURL_MULTI
29508e1e
NH
645 fd_set readfds;
646 fd_set writefds;
647 fd_set excfds;
648 int max_fd;
649 struct timeval select_timeout;
baa7b67d 650 int finished = 0;
29508e1e 651
baa7b67d
NH
652 slot->finished = &finished;
653 while (!finished) {
29508e1e
NH
654 step_active_slots();
655
df26c471 656 if (slot->in_use) {
eb56c821
MF
657#if LIBCURL_VERSION_NUM >= 0x070f04
658 long curl_timeout;
659 curl_multi_timeout(curlm, &curl_timeout);
660 if (curl_timeout == 0) {
661 continue;
662 } else if (curl_timeout == -1) {
663 select_timeout.tv_sec = 0;
664 select_timeout.tv_usec = 50000;
665 } else {
666 select_timeout.tv_sec = curl_timeout / 1000;
667 select_timeout.tv_usec = (curl_timeout % 1000) * 1000;
668 }
669#else
670 select_timeout.tv_sec = 0;
671 select_timeout.tv_usec = 50000;
672#endif
29508e1e 673
6f9dd67f 674 max_fd = -1;
29508e1e
NH
675 FD_ZERO(&readfds);
676 FD_ZERO(&writefds);
677 FD_ZERO(&excfds);
6f9dd67f 678 curl_multi_fdset(curlm, &readfds, &writefds, &excfds, &max_fd);
eb56c821 679
6f9dd67f 680 select(max_fd+1, &readfds, &writefds, &excfds, &select_timeout);
29508e1e
NH
681 }
682 }
683#else
684 while (slot->in_use) {
685 slot->curl_result = curl_easy_perform(slot->curl);
686 finish_active_slot(slot);
687 }
688#endif
689}
690
53f31389 691static void closedown_active_slot(struct active_request_slot *slot)
29508e1e 692{
028c2976
MH
693 active_requests--;
694 slot->in_use = 0;
53f31389
MW
695}
696
83e41e2e 697static void release_active_slot(struct active_request_slot *slot)
53f31389
MW
698{
699 closedown_active_slot(slot);
ad75ebe5 700 if (slot->curl && curl_session_count > min_curl_sessions) {
b3ca4e4e 701#ifdef USE_CURL_MULTI
53f31389 702 curl_multi_remove_handle(curlm, slot->curl);
b3ca4e4e 703#endif
53f31389
MW
704 curl_easy_cleanup(slot->curl);
705 slot->curl = NULL;
ad75ebe5 706 curl_session_count--;
53f31389 707 }
b3ca4e4e 708#ifdef USE_CURL_MULTI
53f31389 709 fill_active_slots();
b3ca4e4e 710#endif
53f31389
MW
711}
712
de1a2fdd 713void finish_active_slot(struct active_request_slot *slot)
53f31389
MW
714{
715 closedown_active_slot(slot);
028c2976 716 curl_easy_getinfo(slot->curl, CURLINFO_HTTP_CODE, &slot->http_code);
c8568e13 717
baa7b67d
NH
718 if (slot->finished != NULL)
719 (*slot->finished) = 1;
720
c8568e13
NH
721 /* Store slot results so they can be read after the slot is reused */
722 if (slot->results != NULL) {
723 slot->results->curl_result = slot->curl_result;
724 slot->results->http_code = slot->http_code;
725 }
726
028c2976 727 /* Run callback if appropriate */
4251ccbd 728 if (slot->callback_func != NULL)
028c2976 729 slot->callback_func(slot->callback_data);
29508e1e
NH
730}
731
732void finish_all_active_slots(void)
733{
734 struct active_request_slot *slot = active_queue_head;
735
736 while (slot != NULL)
737 if (slot->in_use) {
738 run_active_slot(slot);
739 slot = active_queue_head;
740 } else {
741 slot = slot->next;
742 }
743}
d7e92806 744
5ace994f 745/* Helpers for modifying and creating URLs */
d7e92806
MH
746static inline int needs_quote(int ch)
747{
748 if (((ch >= 'A') && (ch <= 'Z'))
749 || ((ch >= 'a') && (ch <= 'z'))
750 || ((ch >= '0') && (ch <= '9'))
751 || (ch == '/')
752 || (ch == '-')
753 || (ch == '.'))
754 return 0;
755 return 1;
756}
757
d7e92806
MH
758static char *quote_ref_url(const char *base, const char *ref)
759{
113106e0 760 struct strbuf buf = STRBUF_INIT;
d7e92806 761 const char *cp;
113106e0 762 int ch;
d7e92806 763
5ace994f 764 end_url_with_slash(&buf, base);
113106e0
TRC
765
766 for (cp = ref; (ch = *cp) != 0; cp++)
d7e92806 767 if (needs_quote(ch))
113106e0 768 strbuf_addf(&buf, "%%%02x", ch);
d7e92806 769 else
113106e0 770 strbuf_addch(&buf, *cp);
d7e92806 771
113106e0 772 return strbuf_detach(&buf, NULL);
d7e92806
MH
773}
774
5424bc55
TRC
775void append_remote_object_url(struct strbuf *buf, const char *url,
776 const char *hex,
777 int only_two_digit_prefix)
778{
800324c3
TRC
779 end_url_with_slash(buf, url);
780
781 strbuf_addf(buf, "objects/%.*s/", 2, hex);
5424bc55
TRC
782 if (!only_two_digit_prefix)
783 strbuf_addf(buf, "%s", hex+2);
784}
785
786char *get_remote_object_url(const char *url, const char *hex,
787 int only_two_digit_prefix)
788{
789 struct strbuf buf = STRBUF_INIT;
790 append_remote_object_url(&buf, url, hex, only_two_digit_prefix);
791 return strbuf_detach(&buf, NULL);
792}
793
e929cd20
MH
794/* http_request() targets */
795#define HTTP_REQUEST_STRBUF 0
796#define HTTP_REQUEST_FILE 1
797
798static int http_request(const char *url, void *result, int target, int options)
799{
800 struct active_request_slot *slot;
801 struct slot_results results;
802 struct curl_slist *headers = NULL;
803 struct strbuf buf = STRBUF_INIT;
804 int ret;
805
806 slot = get_active_slot();
807 slot->results = &results;
808 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
809
810 if (result == NULL) {
811 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
812 } else {
813 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
814 curl_easy_setopt(slot->curl, CURLOPT_FILE, result);
815
816 if (target == HTTP_REQUEST_FILE) {
817 long posn = ftell(result);
818 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION,
819 fwrite);
820 if (posn > 0) {
821 strbuf_addf(&buf, "Range: bytes=%ld-", posn);
822 headers = curl_slist_append(headers, buf.buf);
823 strbuf_reset(&buf);
824 }
e929cd20
MH
825 } else
826 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION,
827 fwrite_buffer);
828 }
829
830 strbuf_addstr(&buf, "Pragma:");
831 if (options & HTTP_NO_CACHE)
832 strbuf_addstr(&buf, " no-cache");
833
834 headers = curl_slist_append(headers, buf.buf);
835
836 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
837 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
838
839 if (start_active_slot(slot)) {
840 run_active_slot(slot);
841 if (results.curl_result == CURLE_OK)
842 ret = HTTP_OK;
843 else if (missing_target(&results))
844 ret = HTTP_MISSING_TARGET;
42653c09 845 else if (results.http_code == 401) {
986bbc08 846 if (user_name && user_pass) {
42653c09
SC
847 ret = HTTP_NOAUTH;
848 } else {
849 /*
850 * git_getpass is needed here because its very likely stdin/stdout are
851 * pipes to our parent process. So we instead need to use /dev/tty,
852 * but that is non-portable. Using git_getpass() can at least be stubbed
853 * on other platforms with a different implementation if/when necessary.
854 */
986bbc08
SN
855 if (!user_name)
856 user_name = xstrdup(git_getpass_with_description("Username", description));
42653c09
SC
857 init_curl_http_auth(slot->curl);
858 ret = HTTP_REAUTH;
859 }
be22d92e
JN
860 } else {
861 if (!curl_errorstr[0])
862 strlcpy(curl_errorstr,
863 curl_easy_strerror(results.curl_result),
864 sizeof(curl_errorstr));
e929cd20 865 ret = HTTP_ERROR;
be22d92e 866 }
e929cd20
MH
867 } else {
868 error("Unable to start HTTP request for %s", url);
869 ret = HTTP_START_FAILED;
870 }
871
e929cd20
MH
872 curl_slist_free_all(headers);
873 strbuf_release(&buf);
874
875 return ret;
876}
877
8d677edc
JK
878static int http_request_reauth(const char *url, void *result, int target,
879 int options)
880{
881 int ret = http_request(url, result, target, options);
882 if (ret != HTTP_REAUTH)
883 return ret;
884 return http_request(url, result, target, options);
885}
886
e929cd20
MH
887int http_get_strbuf(const char *url, struct strbuf *result, int options)
888{
8d677edc 889 return http_request_reauth(url, result, HTTP_REQUEST_STRBUF, options);
e929cd20
MH
890}
891
83e41e2e
JH
892/*
893 * Downloads an url and stores the result in the given file.
894 *
895 * If a previous interrupted download is detected (i.e. a previous temporary
896 * file is still around) the download is resumed.
897 */
898static int http_get_file(const char *url, const char *filename, int options)
e929cd20
MH
899{
900 int ret;
901 struct strbuf tmpfile = STRBUF_INIT;
902 FILE *result;
903
904 strbuf_addf(&tmpfile, "%s.temp", filename);
905 result = fopen(tmpfile.buf, "a");
906 if (! result) {
907 error("Unable to open local file %s", tmpfile.buf);
908 ret = HTTP_ERROR;
909 goto cleanup;
910 }
911
8d677edc 912 ret = http_request_reauth(url, result, HTTP_REQUEST_FILE, options);
e929cd20
MH
913 fclose(result);
914
915 if ((ret == HTTP_OK) && move_temp_to_file(tmpfile.buf, filename))
916 ret = HTTP_ERROR;
917cleanup:
918 strbuf_release(&tmpfile);
919 return ret;
920}
921
922int http_error(const char *url, int ret)
923{
924 /* http_request has already handled HTTP_START_FAILED. */
925 if (ret != HTTP_START_FAILED)
8abc5082 926 error("%s while accessing %s", curl_errorstr, url);
e929cd20
MH
927
928 return ret;
929}
930
c13b2633 931int http_fetch_ref(const char *base, struct ref *ref)
d7e92806
MH
932{
933 char *url;
934 struct strbuf buffer = STRBUF_INIT;
0d5896e1 935 int ret = -1;
d7e92806 936
c13b2633 937 url = quote_ref_url(base, ref->name);
0d5896e1
MH
938 if (http_get_strbuf(url, &buffer, HTTP_NO_CACHE) == HTTP_OK) {
939 strbuf_rtrim(&buffer);
940 if (buffer.len == 40)
941 ret = get_sha1_hex(buffer.buf, ref->old_sha1);
942 else if (!prefixcmp(buffer.buf, "ref: ")) {
943 ref->symref = xstrdup(buffer.buf + 5);
944 ret = 0;
d7e92806 945 }
d7e92806
MH
946 }
947
948 strbuf_release(&buffer);
949 free(url);
950 return ret;
951}
b8caac2b
TRC
952
953/* Helpers for fetching packs */
750ef425 954static char *fetch_pack_index(unsigned char *sha1, const char *base_url)
b8caac2b 955{
750ef425 956 char *url, *tmp;
b8caac2b 957 struct strbuf buf = STRBUF_INIT;
b8caac2b 958
b8caac2b 959 if (http_is_verbose)
162eb5f8 960 fprintf(stderr, "Getting index for pack %s\n", sha1_to_hex(sha1));
b8caac2b
TRC
961
962 end_url_with_slash(&buf, base_url);
162eb5f8 963 strbuf_addf(&buf, "objects/pack/pack-%s.idx", sha1_to_hex(sha1));
b8caac2b
TRC
964 url = strbuf_detach(&buf, NULL);
965
750ef425
SP
966 strbuf_addf(&buf, "%s.temp", sha1_pack_index_name(sha1));
967 tmp = strbuf_detach(&buf, NULL);
968
969 if (http_get_file(url, tmp, 0) != HTTP_OK) {
970 error("Unable to get pack index %s\n", url);
971 free(tmp);
972 tmp = NULL;
973 }
b8caac2b 974
b8caac2b 975 free(url);
750ef425 976 return tmp;
b8caac2b
TRC
977}
978
979static int fetch_and_setup_pack_index(struct packed_git **packs_head,
980 unsigned char *sha1, const char *base_url)
981{
982 struct packed_git *new_pack;
750ef425
SP
983 char *tmp_idx = NULL;
984 int ret;
b8caac2b 985
750ef425
SP
986 if (has_pack_index(sha1)) {
987 new_pack = parse_pack_index(sha1, NULL);
988 if (!new_pack)
989 return -1; /* parse_pack_index() already issued error message */
990 goto add_pack;
991 }
992
993 tmp_idx = fetch_pack_index(sha1, base_url);
994 if (!tmp_idx)
b8caac2b
TRC
995 return -1;
996
750ef425
SP
997 new_pack = parse_pack_index(sha1, tmp_idx);
998 if (!new_pack) {
999 unlink(tmp_idx);
1000 free(tmp_idx);
1001
b8caac2b 1002 return -1; /* parse_pack_index() already issued error message */
750ef425
SP
1003 }
1004
1005 ret = verify_pack_index(new_pack);
1006 if (!ret) {
1007 close_pack_index(new_pack);
1008 ret = move_temp_to_file(tmp_idx, sha1_pack_index_name(sha1));
1009 }
1010 free(tmp_idx);
1011 if (ret)
1012 return -1;
1013
1014add_pack:
b8caac2b
TRC
1015 new_pack->next = *packs_head;
1016 *packs_head = new_pack;
1017 return 0;
1018}
1019
1020int http_get_info_packs(const char *base_url, struct packed_git **packs_head)
1021{
1022 int ret = 0, i = 0;
1023 char *url, *data;
1024 struct strbuf buf = STRBUF_INIT;
1025 unsigned char sha1[20];
1026
1027 end_url_with_slash(&buf, base_url);
1028 strbuf_addstr(&buf, "objects/info/packs");
1029 url = strbuf_detach(&buf, NULL);
1030
1031 ret = http_get_strbuf(url, &buf, HTTP_NO_CACHE);
1032 if (ret != HTTP_OK)
1033 goto cleanup;
1034
1035 data = buf.buf;
1036 while (i < buf.len) {
1037 switch (data[i]) {
1038 case 'P':
1039 i++;
1040 if (i + 52 <= buf.len &&
1041 !prefixcmp(data + i, " pack-") &&
1042 !prefixcmp(data + i + 46, ".pack\n")) {
1043 get_sha1_hex(data + i + 6, sha1);
1044 fetch_and_setup_pack_index(packs_head, sha1,
1045 base_url);
1046 i += 51;
1047 break;
1048 }
1049 default:
1050 while (i < buf.len && data[i] != '\n')
1051 i++;
1052 }
1053 i++;
1054 }
1055
1056cleanup:
1057 free(url);
1058 return ret;
1059}
2264dfa5
TRC
1060
1061void release_http_pack_request(struct http_pack_request *preq)
1062{
1063 if (preq->packfile != NULL) {
1064 fclose(preq->packfile);
1065 preq->packfile = NULL;
2264dfa5
TRC
1066 }
1067 if (preq->range_header != NULL) {
1068 curl_slist_free_all(preq->range_header);
1069 preq->range_header = NULL;
1070 }
1071 preq->slot = NULL;
1072 free(preq->url);
1073}
1074
1075int finish_http_pack_request(struct http_pack_request *preq)
1076{
2264dfa5 1077 struct packed_git **lst;
021ab6f0 1078 struct packed_git *p = preq->target;
fe72d420
SP
1079 char *tmp_idx;
1080 struct child_process ip;
1081 const char *ip_argv[8];
2264dfa5 1082
fe72d420 1083 close_pack_index(p);
2264dfa5 1084
3065274c
SP
1085 fclose(preq->packfile);
1086 preq->packfile = NULL;
2264dfa5
TRC
1087
1088 lst = preq->lst;
021ab6f0 1089 while (*lst != p)
2264dfa5
TRC
1090 lst = &((*lst)->next);
1091 *lst = (*lst)->next;
1092
fe72d420
SP
1093 tmp_idx = xstrdup(preq->tmpfile);
1094 strcpy(tmp_idx + strlen(tmp_idx) - strlen(".pack.temp"),
1095 ".idx.temp");
1096
1097 ip_argv[0] = "index-pack";
1098 ip_argv[1] = "-o";
1099 ip_argv[2] = tmp_idx;
1100 ip_argv[3] = preq->tmpfile;
1101 ip_argv[4] = NULL;
1102
1103 memset(&ip, 0, sizeof(ip));
1104 ip.argv = ip_argv;
1105 ip.git_cmd = 1;
1106 ip.no_stdin = 1;
1107 ip.no_stdout = 1;
1108
1109 if (run_command(&ip)) {
1110 unlink(preq->tmpfile);
1111 unlink(tmp_idx);
1112 free(tmp_idx);
2264dfa5 1113 return -1;
fe72d420
SP
1114 }
1115
1116 unlink(sha1_pack_index_name(p->sha1));
2264dfa5 1117
fe72d420
SP
1118 if (move_temp_to_file(preq->tmpfile, sha1_pack_name(p->sha1))
1119 || move_temp_to_file(tmp_idx, sha1_pack_index_name(p->sha1))) {
1120 free(tmp_idx);
2264dfa5 1121 return -1;
fe72d420 1122 }
2264dfa5 1123
fe72d420
SP
1124 install_packed_git(p);
1125 free(tmp_idx);
2264dfa5
TRC
1126 return 0;
1127}
1128
1129struct http_pack_request *new_http_pack_request(
1130 struct packed_git *target, const char *base_url)
1131{
2264dfa5
TRC
1132 long prev_posn = 0;
1133 char range[RANGE_HEADER_SIZE];
1134 struct strbuf buf = STRBUF_INIT;
1135 struct http_pack_request *preq;
1136
ec99c9a8 1137 preq = xcalloc(1, sizeof(*preq));
2264dfa5 1138 preq->target = target;
2264dfa5
TRC
1139
1140 end_url_with_slash(&buf, base_url);
1141 strbuf_addf(&buf, "objects/pack/pack-%s.pack",
1142 sha1_to_hex(target->sha1));
bb99190e 1143 preq->url = strbuf_detach(&buf, NULL);
2264dfa5 1144
90d05713
TRC
1145 snprintf(preq->tmpfile, sizeof(preq->tmpfile), "%s.temp",
1146 sha1_pack_name(target->sha1));
2264dfa5
TRC
1147 preq->packfile = fopen(preq->tmpfile, "a");
1148 if (!preq->packfile) {
1149 error("Unable to open local file %s for pack",
1150 preq->tmpfile);
1151 goto abort;
1152 }
1153
1154 preq->slot = get_active_slot();
2264dfa5
TRC
1155 curl_easy_setopt(preq->slot->curl, CURLOPT_FILE, preq->packfile);
1156 curl_easy_setopt(preq->slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
bb99190e 1157 curl_easy_setopt(preq->slot->curl, CURLOPT_URL, preq->url);
2264dfa5
TRC
1158 curl_easy_setopt(preq->slot->curl, CURLOPT_HTTPHEADER,
1159 no_pragma_header);
1160
1161 /*
1162 * If there is data present from a previous transfer attempt,
1163 * resume where it left off
1164 */
1165 prev_posn = ftell(preq->packfile);
1166 if (prev_posn>0) {
1167 if (http_is_verbose)
1168 fprintf(stderr,
1169 "Resuming fetch of pack %s at byte %ld\n",
1170 sha1_to_hex(target->sha1), prev_posn);
1171 sprintf(range, "Range: bytes=%ld-", prev_posn);
1172 preq->range_header = curl_slist_append(NULL, range);
1173 curl_easy_setopt(preq->slot->curl, CURLOPT_HTTPHEADER,
1174 preq->range_header);
1175 }
1176
1177 return preq;
1178
1179abort:
bb99190e 1180 free(preq->url);
5ae9ebfd 1181 free(preq);
2264dfa5
TRC
1182 return NULL;
1183}
5424bc55
TRC
1184
1185/* Helpers for fetching objects (loose) */
a04ff3ec 1186static size_t fwrite_sha1_file(char *ptr, size_t eltsize, size_t nmemb,
5424bc55
TRC
1187 void *data)
1188{
1189 unsigned char expn[4096];
1190 size_t size = eltsize * nmemb;
1191 int posn = 0;
1192 struct http_object_request *freq =
1193 (struct http_object_request *)data;
1194 do {
1195 ssize_t retval = xwrite(freq->localfile,
1196 (char *) ptr + posn, size - posn);
1197 if (retval < 0)
1198 return posn;
1199 posn += retval;
1200 } while (posn < size);
1201
1202 freq->stream.avail_in = size;
a04ff3ec 1203 freq->stream.next_in = (void *)ptr;
5424bc55
TRC
1204 do {
1205 freq->stream.next_out = expn;
1206 freq->stream.avail_out = sizeof(expn);
1207 freq->zret = git_inflate(&freq->stream, Z_SYNC_FLUSH);
1208 git_SHA1_Update(&freq->c, expn,
1209 sizeof(expn) - freq->stream.avail_out);
1210 } while (freq->stream.avail_in && freq->zret == Z_OK);
5424bc55
TRC
1211 return size;
1212}
1213
1214struct http_object_request *new_http_object_request(const char *base_url,
1215 unsigned char *sha1)
1216{
1217 char *hex = sha1_to_hex(sha1);
1218 char *filename;
1219 char prevfile[PATH_MAX];
5424bc55 1220 int prevlocal;
a04ff3ec 1221 char prev_buf[PREV_BUF_SIZE];
5424bc55
TRC
1222 ssize_t prev_read = 0;
1223 long prev_posn = 0;
1224 char range[RANGE_HEADER_SIZE];
1225 struct curl_slist *range_header = NULL;
1226 struct http_object_request *freq;
1227
ec99c9a8 1228 freq = xcalloc(1, sizeof(*freq));
5424bc55
TRC
1229 hashcpy(freq->sha1, sha1);
1230 freq->localfile = -1;
1231
1232 filename = sha1_file_name(sha1);
5424bc55
TRC
1233 snprintf(freq->tmpfile, sizeof(freq->tmpfile),
1234 "%s.temp", filename);
1235
1236 snprintf(prevfile, sizeof(prevfile), "%s.prev", filename);
1237 unlink_or_warn(prevfile);
1238 rename(freq->tmpfile, prevfile);
1239 unlink_or_warn(freq->tmpfile);
1240
1241 if (freq->localfile != -1)
1242 error("fd leakage in start: %d", freq->localfile);
1243 freq->localfile = open(freq->tmpfile,
1244 O_WRONLY | O_CREAT | O_EXCL, 0666);
1245 /*
1246 * This could have failed due to the "lazy directory creation";
1247 * try to mkdir the last path component.
1248 */
1249 if (freq->localfile < 0 && errno == ENOENT) {
1250 char *dir = strrchr(freq->tmpfile, '/');
1251 if (dir) {
1252 *dir = 0;
1253 mkdir(freq->tmpfile, 0777);
1254 *dir = '/';
1255 }
1256 freq->localfile = open(freq->tmpfile,
1257 O_WRONLY | O_CREAT | O_EXCL, 0666);
1258 }
1259
1260 if (freq->localfile < 0) {
0da8b2e7
SP
1261 error("Couldn't create temporary file %s: %s",
1262 freq->tmpfile, strerror(errno));
5424bc55
TRC
1263 goto abort;
1264 }
1265
5424bc55
TRC
1266 git_inflate_init(&freq->stream);
1267
1268 git_SHA1_Init(&freq->c);
1269
bb99190e 1270 freq->url = get_remote_object_url(base_url, hex, 0);
5424bc55
TRC
1271
1272 /*
1273 * If a previous temp file is present, process what was already
1274 * fetched.
1275 */
1276 prevlocal = open(prevfile, O_RDONLY);
1277 if (prevlocal != -1) {
1278 do {
1279 prev_read = xread(prevlocal, prev_buf, PREV_BUF_SIZE);
1280 if (prev_read>0) {
1281 if (fwrite_sha1_file(prev_buf,
1282 1,
1283 prev_read,
1284 freq) == prev_read) {
1285 prev_posn += prev_read;
1286 } else {
1287 prev_read = -1;
1288 }
1289 }
1290 } while (prev_read > 0);
1291 close(prevlocal);
1292 }
1293 unlink_or_warn(prevfile);
1294
1295 /*
1296 * Reset inflate/SHA1 if there was an error reading the previous temp
1297 * file; also rewind to the beginning of the local file.
1298 */
1299 if (prev_read == -1) {
1300 memset(&freq->stream, 0, sizeof(freq->stream));
1301 git_inflate_init(&freq->stream);
1302 git_SHA1_Init(&freq->c);
1303 if (prev_posn>0) {
1304 prev_posn = 0;
1305 lseek(freq->localfile, 0, SEEK_SET);
0c4f21e4 1306 if (ftruncate(freq->localfile, 0) < 0) {
0da8b2e7
SP
1307 error("Couldn't truncate temporary file %s: %s",
1308 freq->tmpfile, strerror(errno));
0c4f21e4
JL
1309 goto abort;
1310 }
5424bc55
TRC
1311 }
1312 }
1313
1314 freq->slot = get_active_slot();
1315
1316 curl_easy_setopt(freq->slot->curl, CURLOPT_FILE, freq);
1317 curl_easy_setopt(freq->slot->curl, CURLOPT_WRITEFUNCTION, fwrite_sha1_file);
1318 curl_easy_setopt(freq->slot->curl, CURLOPT_ERRORBUFFER, freq->errorstr);
bb99190e 1319 curl_easy_setopt(freq->slot->curl, CURLOPT_URL, freq->url);
5424bc55
TRC
1320 curl_easy_setopt(freq->slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
1321
1322 /*
1323 * If we have successfully processed data from a previous fetch
1324 * attempt, only fetch the data we don't already have.
1325 */
1326 if (prev_posn>0) {
1327 if (http_is_verbose)
1328 fprintf(stderr,
1329 "Resuming fetch of object %s at byte %ld\n",
1330 hex, prev_posn);
1331 sprintf(range, "Range: bytes=%ld-", prev_posn);
1332 range_header = curl_slist_append(range_header, range);
1333 curl_easy_setopt(freq->slot->curl,
1334 CURLOPT_HTTPHEADER, range_header);
1335 }
1336
1337 return freq;
1338
5424bc55 1339abort:
bb99190e 1340 free(freq->url);
5424bc55
TRC
1341 free(freq);
1342 return NULL;
1343}
1344
1345void process_http_object_request(struct http_object_request *freq)
1346{
1347 if (freq->slot == NULL)
1348 return;
1349 freq->curl_result = freq->slot->curl_result;
1350 freq->http_code = freq->slot->http_code;
1351 freq->slot = NULL;
1352}
1353
1354int finish_http_object_request(struct http_object_request *freq)
1355{
1356 struct stat st;
1357
1358 close(freq->localfile);
1359 freq->localfile = -1;
1360
1361 process_http_object_request(freq);
1362
1363 if (freq->http_code == 416) {
bd757c18 1364 warning("requested range invalid; we may already have all the data.");
5424bc55
TRC
1365 } else if (freq->curl_result != CURLE_OK) {
1366 if (stat(freq->tmpfile, &st) == 0)
1367 if (st.st_size == 0)
1368 unlink_or_warn(freq->tmpfile);
1369 return -1;
1370 }
1371
1372 git_inflate_end(&freq->stream);
1373 git_SHA1_Final(freq->real_sha1, &freq->c);
1374 if (freq->zret != Z_STREAM_END) {
1375 unlink_or_warn(freq->tmpfile);
1376 return -1;
1377 }
1378 if (hashcmp(freq->sha1, freq->real_sha1)) {
1379 unlink_or_warn(freq->tmpfile);
1380 return -1;
1381 }
1382 freq->rename =
0da8b2e7 1383 move_temp_to_file(freq->tmpfile, sha1_file_name(freq->sha1));
5424bc55
TRC
1384
1385 return freq->rename;
1386}
1387
1388void abort_http_object_request(struct http_object_request *freq)
1389{
1390 unlink_or_warn(freq->tmpfile);
1391
1392 release_http_object_request(freq);
1393}
1394
1395void release_http_object_request(struct http_object_request *freq)
1396{
1397 if (freq->localfile != -1) {
1398 close(freq->localfile);
1399 freq->localfile = -1;
1400 }
1401 if (freq->url != NULL) {
1402 free(freq->url);
1403 freq->url = NULL;
1404 }
4b9fa0e3
TRC
1405 if (freq->slot != NULL) {
1406 freq->slot->callback_func = NULL;
1407 freq->slot->callback_data = NULL;
1408 release_active_slot(freq->slot);
1409 freq->slot = NULL;
1410 }
5424bc55 1411}