]> git.ipfire.org Git - thirdparty/git.git/blame - connect.c
i18n: add no-op _() and N_() wrappers
[thirdparty/git.git] / connect.c
CommitLineData
731043fd 1#include "git-compat-util.h"
f7192598 2#include "cache.h"
41cb7488 3#include "pkt-line.h"
b10d0ec7 4#include "quote.h"
6abf5c0c 5#include "refs.h"
15a1c012 6#include "run-command.h"
6b62816c 7#include "remote.h"
9d2e9420 8#include "url.h"
f7192598 9
96f1e58f 10static char *server_capabilities;
211b5f9e 11
2718ff09
LT
12static int check_ref(const char *name, int len, unsigned int flags)
13{
14 if (!flags)
15 return 1;
16
c41e20b3 17 if (len < 5 || memcmp(name, "refs/", 5))
2718ff09
LT
18 return 0;
19
20 /* Skip the "refs/" part */
21 name += 5;
22 len -= 5;
23
24 /* REF_NORMAL means that we don't want the magic fake tag refs */
25 if ((flags & REF_NORMAL) && check_ref_format(name) < 0)
26 return 0;
27
28 /* REF_HEADS means that we want regular branch heads */
29 if ((flags & REF_HEADS) && !memcmp(name, "heads/", 6))
30 return 1;
31
32 /* REF_TAGS means that we want tags */
33 if ((flags & REF_TAGS) && !memcmp(name, "tags/", 5))
34 return 1;
35
36 /* All type bits clear means that we are ok with anything */
37 return !(flags & ~REF_NORMAL);
38}
39
4577370e
DB
40int check_ref_type(const struct ref *ref, int flags)
41{
42 return check_ref(ref->name, strlen(ref->name), flags);
43}
44
40c155ff
JH
45static void add_extra_have(struct extra_have_objects *extra, unsigned char *sha1)
46{
47 ALLOC_GROW(extra->array, extra->nr + 1, extra->alloc);
48 hashcpy(&(extra->array[extra->nr][0]), sha1);
49 extra->nr++;
50}
51
d1c133f5
LT
52/*
53 * Read all the refs from the other end
54 */
1a7141ff 55struct ref **get_remote_heads(int in, struct ref **list,
2718ff09 56 int nr_match, char **match,
40c155ff
JH
57 unsigned int flags,
58 struct extra_have_objects *extra_have)
d1c133f5
LT
59{
60 *list = NULL;
61 for (;;) {
62 struct ref *ref;
63 unsigned char old_sha1[20];
64 static char buffer[1000];
65 char *name;
211b5f9e 66 int len, name_len;
d1c133f5
LT
67
68 len = packet_read_line(in, buffer, sizeof(buffer));
69 if (!len)
70 break;
71 if (buffer[len-1] == '\n')
72 buffer[--len] = 0;
73
a8073289
TPW
74 if (len > 4 && !prefixcmp(buffer, "ERR "))
75 die("remote error: %s", buffer + 4);
76
d1c133f5
LT
77 if (len < 42 || get_sha1_hex(buffer, old_sha1) || buffer[40] != ' ')
78 die("protocol error: expected sha/ref, got '%s'", buffer);
79 name = buffer + 41;
1a7141ff 80
211b5f9e
JS
81 name_len = strlen(name);
82 if (len != name_len + 41) {
8e0f7003 83 free(server_capabilities);
9befac47 84 server_capabilities = xstrdup(name + name_len + 1);
211b5f9e
JS
85 }
86
40c155ff
JH
87 if (extra_have &&
88 name_len == 5 && !memcmp(".have", name, 5)) {
89 add_extra_have(extra_have, old_sha1);
90 continue;
91 }
92
2718ff09 93 if (!check_ref(name, name_len, flags))
cfee10a7 94 continue;
d1c133f5
LT
95 if (nr_match && !path_match(name, nr_match, match))
96 continue;
59c69c0c 97 ref = alloc_ref(buffer + 41);
e702496e 98 hashcpy(ref->old_sha1, old_sha1);
d1c133f5
LT
99 *list = ref;
100 list = &ref->next;
101 }
102 return list;
103}
104
211b5f9e
JS
105int server_supports(const char *feature)
106{
1f5881bb
JS
107 return server_capabilities &&
108 strstr(server_capabilities, feature) != NULL;
211b5f9e
JS
109}
110
013e7c7f
LT
111int path_match(const char *path, int nr, char **match)
112{
113 int i;
114 int pathlen = strlen(path);
115
116 for (i = 0; i < nr; i++) {
117 char *s = match[i];
118 int len = strlen(s);
119
120 if (!len || len > pathlen)
121 continue;
122 if (memcmp(path + pathlen - len, s, len))
123 continue;
124 if (pathlen > len && path[pathlen - len - 1] != '/')
125 continue;
126 *s = 0;
9546010b 127 return (i + 1);
013e7c7f
LT
128 }
129 return 0;
130}
131
2386d658
LT
132enum protocol {
133 PROTO_LOCAL = 1,
134 PROTO_SSH,
4b05548f 135 PROTO_GIT
2386d658
LT
136};
137
138static enum protocol get_protocol(const char *name)
139{
140 if (!strcmp(name, "ssh"))
141 return PROTO_SSH;
142 if (!strcmp(name, "git"))
143 return PROTO_GIT;
c05186cc
LT
144 if (!strcmp(name, "git+ssh"))
145 return PROTO_SSH;
146 if (!strcmp(name, "ssh+git"))
147 return PROTO_SSH;
72a4f4b6
LT
148 if (!strcmp(name, "file"))
149 return PROTO_LOCAL;
2386d658
LT
150 die("I don't handle protocol '%s'", name);
151}
152
5ba88448
YH
153#define STR_(s) # s
154#define STR(s) STR_(s)
2386d658 155
72a534da
ML
156static void get_host_and_port(char **host, const char **port)
157{
158 char *colon, *end;
159
160 if (*host[0] == '[') {
161 end = strchr(*host + 1, ']');
162 if (end) {
163 *end = 0;
164 end++;
165 (*host)++;
166 } else
167 end = *host;
168 } else
169 end = *host;
170 colon = strchr(end, ':');
171
172 if (colon) {
173 *colon = 0;
174 *port = colon + 1;
175 }
176}
177
49744d63 178#ifndef NO_IPV6
4c505f71 179
ba505322
AR
180static const char *ai_name(const struct addrinfo *ai)
181{
785a9857
BK
182 static char addr[NI_MAXHOST];
183 if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0,
184 NI_NUMERICHOST) != 0)
ba505322 185 strcpy(addr, "(unknown)");
785a9857 186
ba505322
AR
187 return addr;
188}
189
5ad312be
JL
190/*
191 * Returns a connected socket() fd, or else die()s.
192 */
7841ce79 193static int git_tcp_connect_sock(char *host, int flags)
2386d658 194{
ac3bc6c1 195 int sockfd = -1, saved_errno = 0;
554fe20d 196 const char *port = STR(DEFAULT_GIT_PORT);
5ba88448
YH
197 struct addrinfo hints, *ai0, *ai;
198 int gai;
ba505322 199 int cnt = 0;
5ba88448 200
72a534da
ML
201 get_host_and_port(&host, &port);
202 if (!*port)
203 port = "<none>";
5ba88448
YH
204
205 memset(&hints, 0, sizeof(hints));
206 hints.ai_socktype = SOCK_STREAM;
207 hints.ai_protocol = IPPROTO_TCP;
208
7841ce79
MT
209 if (flags & CONNECT_VERBOSE)
210 fprintf(stderr, "Looking up %s ... ", host);
211
5ba88448
YH
212 gai = getaddrinfo(host, port, &hints, &ai);
213 if (gai)
608d48b2 214 die("Unable to look up %s (port %s) (%s)", host, port, gai_strerror(gai));
5ba88448 215
7841ce79
MT
216 if (flags & CONNECT_VERBOSE)
217 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
218
5ba88448 219 for (ai0 = ai; ai; ai = ai->ai_next) {
5ad312be
JL
220 sockfd = socket(ai->ai_family,
221 ai->ai_socktype, ai->ai_protocol);
ac3bc6c1
PB
222 if (sockfd < 0) {
223 saved_errno = errno;
5ba88448 224 continue;
ac3bc6c1 225 }
5ba88448 226 if (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0) {
ac3bc6c1 227 saved_errno = errno;
7cbf2f24 228 fprintf(stderr, "%s[%d: %s]: errno=%s\n",
ba505322
AR
229 host,
230 cnt,
231 ai_name(ai),
ba505322 232 strerror(saved_errno));
5ba88448
YH
233 close(sockfd);
234 sockfd = -1;
235 continue;
2386d658 236 }
ba505322
AR
237 if (flags & CONNECT_VERBOSE)
238 fprintf(stderr, "%s ", ai_name(ai));
5ba88448 239 break;
2386d658
LT
240 }
241
5ba88448 242 freeaddrinfo(ai0);
2386d658 243
2386d658 244 if (sockfd < 0)
ac3bc6c1 245 die("unable to connect a socket (%s)", strerror(saved_errno));
5ba88448 246
7841ce79
MT
247 if (flags & CONNECT_VERBOSE)
248 fprintf(stderr, "done.\n");
249
5ad312be 250 return sockfd;
2386d658
LT
251}
252
49744d63 253#else /* NO_IPV6 */
4c505f71 254
5ad312be
JL
255/*
256 * Returns a connected socket() fd, or else die()s.
257 */
7841ce79 258static int git_tcp_connect_sock(char *host, int flags)
4c505f71 259{
ac3bc6c1 260 int sockfd = -1, saved_errno = 0;
72a534da
ML
261 const char *port = STR(DEFAULT_GIT_PORT);
262 char *ep;
4c505f71
PA
263 struct hostent *he;
264 struct sockaddr_in sa;
265 char **ap;
266 unsigned int nport;
ba505322 267 int cnt;
4c505f71 268
72a534da 269 get_host_and_port(&host, &port);
4c505f71 270
7841ce79
MT
271 if (flags & CONNECT_VERBOSE)
272 fprintf(stderr, "Looking up %s ... ", host);
273
4c505f71
PA
274 he = gethostbyname(host);
275 if (!he)
276 die("Unable to look up %s (%s)", host, hstrerror(h_errno));
277 nport = strtoul(port, &ep, 10);
278 if ( ep == port || *ep ) {
279 /* Not numeric */
280 struct servent *se = getservbyname(port,"tcp");
281 if ( !se )
d7530708 282 die("Unknown port %s", port);
4c505f71
PA
283 nport = se->s_port;
284 }
285
7841ce79
MT
286 if (flags & CONNECT_VERBOSE)
287 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
288
ba505322 289 for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) {
4c505f71 290 sockfd = socket(he->h_addrtype, SOCK_STREAM, 0);
ac3bc6c1
PB
291 if (sockfd < 0) {
292 saved_errno = errno;
4c505f71 293 continue;
ac3bc6c1 294 }
4c505f71
PA
295
296 memset(&sa, 0, sizeof sa);
297 sa.sin_family = he->h_addrtype;
6573faff 298 sa.sin_port = htons(nport);
c6164218 299 memcpy(&sa.sin_addr, *ap, he->h_length);
4c505f71
PA
300
301 if (connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) {
ac3bc6c1 302 saved_errno = errno;
7cbf2f24 303 fprintf(stderr, "%s[%d: %s]: errno=%s\n",
ba505322
AR
304 host,
305 cnt,
306 inet_ntoa(*(struct in_addr *)&sa.sin_addr),
ba505322 307 strerror(saved_errno));
4c505f71
PA
308 close(sockfd);
309 sockfd = -1;
310 continue;
311 }
ba505322
AR
312 if (flags & CONNECT_VERBOSE)
313 fprintf(stderr, "%s ",
314 inet_ntoa(*(struct in_addr *)&sa.sin_addr));
4c505f71
PA
315 break;
316 }
317
318 if (sockfd < 0)
ac3bc6c1 319 die("unable to connect a socket (%s)", strerror(saved_errno));
4c505f71 320
7841ce79
MT
321 if (flags & CONNECT_VERBOSE)
322 fprintf(stderr, "done.\n");
323
5ad312be
JL
324 return sockfd;
325}
326
327#endif /* NO_IPV6 */
328
329
7841ce79 330static void git_tcp_connect(int fd[2], char *host, int flags)
5ad312be 331{
7841ce79 332 int sockfd = git_tcp_connect_sock(host, flags);
5ad312be 333
4c505f71 334 fd[0] = sockfd;
ec587fde 335 fd[1] = dup(sockfd);
4c505f71
PA
336}
337
4c505f71 338
96f1e58f 339static char *git_proxy_command;
f8014776 340
ef90d6d4
JS
341static int git_proxy_command_options(const char *var, const char *value,
342 void *cb)
f8014776 343{
e814bc4d 344 if (!strcmp(var, "core.gitproxy")) {
c3df8568
YH
345 const char *for_pos;
346 int matchlen = -1;
347 int hostlen;
15112c95
EFL
348 const char *rhost_name = cb;
349 int rhost_len = strlen(rhost_name);
c3df8568 350
e814bc4d 351 if (git_proxy_command)
f8014776 352 return 0;
c64b9ad0
JH
353 if (!value)
354 return config_error_nonbool(var);
e814bc4d
JH
355 /* [core]
356 * ;# matches www.kernel.org as well
357 * gitproxy = netcatter-1 for kernel.org
358 * gitproxy = netcatter-2 for sample.xz
359 * gitproxy = netcatter-default
360 */
c3df8568 361 for_pos = strstr(value, " for ");
e814bc4d
JH
362 if (!for_pos)
363 /* matches everybody */
364 matchlen = strlen(value);
365 else {
366 hostlen = strlen(for_pos + 5);
367 if (rhost_len < hostlen)
368 matchlen = -1;
369 else if (!strncmp(for_pos + 5,
370 rhost_name + rhost_len - hostlen,
371 hostlen) &&
372 ((rhost_len == hostlen) ||
373 rhost_name[rhost_len - hostlen -1] == '.'))
374 matchlen = for_pos - value;
375 else
376 matchlen = -1;
377 }
378 if (0 <= matchlen) {
379 /* core.gitproxy = none for kernel.org */
a6080a0a 380 if (matchlen == 4 &&
e814bc4d
JH
381 !memcmp(value, "none", 4))
382 matchlen = 0;
182af834 383 git_proxy_command = xmemdupz(value, matchlen);
f8014776 384 }
e814bc4d 385 return 0;
f8014776
PC
386 }
387
ef90d6d4 388 return git_default_config(var, value, cb);
f8014776
PC
389}
390
e814bc4d 391static int git_use_proxy(const char *host)
f8014776
PC
392{
393 git_proxy_command = getenv("GIT_PROXY_COMMAND");
15112c95 394 git_config(git_proxy_command_options, (void*)host);
e814bc4d 395 return (git_proxy_command && *git_proxy_command);
f8014776
PC
396}
397
c78963d2 398static void git_proxy_connect(int fd[2], char *host)
f8014776 399{
554fe20d 400 const char *port = STR(DEFAULT_GIT_PORT);
15a1c012
SP
401 const char *argv[4];
402 struct child_process proxy;
f8014776 403
72a534da 404 get_host_and_port(&host, &port);
f8014776 405
15a1c012
SP
406 argv[0] = git_proxy_command;
407 argv[1] = host;
408 argv[2] = port;
409 argv[3] = NULL;
410 memset(&proxy, 0, sizeof(proxy));
411 proxy.argv = argv;
412 proxy.in = -1;
413 proxy.out = -1;
414 if (start_command(&proxy))
415 die("cannot start proxy %s", argv[0]);
416 fd[0] = proxy.out; /* read from proxy stdout */
417 fd[1] = proxy.in; /* write to proxy stdin */
f8014776
PC
418}
419
0f503d77
CC
420#define MAX_CMD_LEN 1024
421
2af202be 422static char *get_port(char *host)
2e776665
LT
423{
424 char *end;
425 char *p = strchr(host, ':');
426
427 if (p) {
8f148253
RS
428 long port = strtol(p + 1, &end, 10);
429 if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) {
2e776665
LT
430 *p = '\0';
431 return p+1;
432 }
433 }
434
435 return NULL;
436}
437
fb32c917
JS
438static struct child_process no_fork;
439
f7192598 440/*
fb32c917
JS
441 * This returns a dummy child_process if the transport protocol does not
442 * need fork(2), or a struct child_process object if it does. Once done,
443 * finish the connection with finish_connect() with the value returned from
444 * this function (it is safe to call finish_connect() with NULL to support
445 * the former case).
f42a5c4e 446 *
fb32c917
JS
447 * If it returns, the connect is successful; it just dies on errors (this
448 * will hopefully be changed in a libification effort, to return NULL when
449 * the connection failed).
f7192598 450 */
4577370e 451struct child_process *git_connect(int fd[2], const char *url_orig,
98158e9c 452 const char *prog, int flags)
f7192598 453{
9d2e9420 454 char *url;
8e76bf3f 455 char *host, *path;
356bece0
YH
456 char *end;
457 int c;
98158e9c 458 struct child_process *conn;
faea9ccb 459 enum protocol protocol = PROTO_LOCAL;
da2a95b2 460 int free_path = 0;
2e776665 461 char *port = NULL;
f364cb88
JS
462 const char **arg;
463 struct strbuf cmd;
faea9ccb 464
f0b7367c
JH
465 /* Without this we cannot rely on waitpid() to tell
466 * what happened to our children.
467 */
468 signal(SIGCHLD, SIG_DFL);
469
9d2e9420
JK
470 if (is_url(url_orig))
471 url = url_decode(url_orig);
472 else
473 url = xstrdup(url_orig);
474
faea9ccb 475 host = strstr(url, "://");
eeefa7c9 476 if (host) {
faea9ccb
AE
477 *host = '\0';
478 protocol = get_protocol(url);
479 host += 3;
356bece0
YH
480 c = '/';
481 } else {
f7192598 482 host = url;
356bece0
YH
483 c = ':';
484 }
485
9aa5053d
IL
486 /*
487 * Don't do destructive transforms with git:// as that
9517e6b8 488 * protocol code does '[]' unwrapping of its own.
9aa5053d 489 */
356bece0
YH
490 if (host[0] == '[') {
491 end = strchr(host + 1, ']');
492 if (end) {
9aa5053d
IL
493 if (protocol != PROTO_GIT) {
494 *end = 0;
495 host++;
496 }
356bece0 497 end++;
356bece0
YH
498 } else
499 end = host;
500 } else
501 end = host;
502
503 path = strchr(end, c);
be501813 504 if (path && !has_dos_drive_prefix(end)) {
72a4f4b6 505 if (c == ':') {
faea9ccb 506 protocol = PROTO_SSH;
356bece0 507 *path++ = '\0';
72a4f4b6
LT
508 }
509 } else
510 path = end;
2386d658 511
faea9ccb
AE
512 if (!path || !*path)
513 die("No path specified. See 'man git-pull' for valid url syntax");
514
515 /*
516 * null-terminate hostname and point path to ~ for URL's like this:
517 * ssh://host.xz/~user/repo
518 */
519 if (protocol != PROTO_LOCAL && host != url) {
520 char *ptr = path;
521 if (path[1] == '~')
522 path++;
da2a95b2 523 else {
9befac47 524 path = xstrdup(ptr);
da2a95b2
SH
525 free_path = 1;
526 }
faea9ccb
AE
527
528 *ptr = '\0';
529 }
530
2e776665
LT
531 /*
532 * Add support for ssh port: ssh://host.xy:<port>/...
533 */
534 if (protocol == PROTO_SSH && host != url)
535 port = get_port(host);
536
f8014776 537 if (protocol == PROTO_GIT) {
5ad312be
JL
538 /* These underlying connection commands die() if they
539 * cannot connect.
540 */
9befac47 541 char *target_host = xstrdup(host);
e814bc4d 542 if (git_use_proxy(host))
c78963d2 543 git_proxy_connect(fd, host);
da2a95b2 544 else
7841ce79 545 git_tcp_connect(fd, host, flags);
5ad312be
JL
546 /*
547 * Separate original protocol components prog and path
73bb33a9
SP
548 * from extended host header with a NUL byte.
549 *
550 * Note: Do not add any other headers here! Doing so
551 * will cause older git-daemon servers to crash.
5ad312be
JL
552 */
553 packet_write(fd[1],
554 "%s %s%chost=%s%c",
555 prog, path, 0,
556 target_host, 0);
557 free(target_host);
4577370e 558 free(url);
da2a95b2
SH
559 if (free_path)
560 free(path);
fb32c917 561 return &no_fork;
f8014776 562 }
2386d658 563
98158e9c 564 conn = xcalloc(1, sizeof(*conn));
2e776665 565
f364cb88
JS
566 strbuf_init(&cmd, MAX_CMD_LEN);
567 strbuf_addstr(&cmd, prog);
568 strbuf_addch(&cmd, ' ');
569 sq_quote_buf(&cmd, path);
570 if (cmd.len >= MAX_CMD_LEN)
571 die("command line too long");
572
573 conn->in = conn->out = -1;
36ad53ff 574 conn->argv = arg = xcalloc(7, sizeof(*arg));
f364cb88
JS
575 if (protocol == PROTO_SSH) {
576 const char *ssh = getenv("GIT_SSH");
36ad53ff 577 int putty = ssh && strcasestr(ssh, "plink");
f364cb88
JS
578 if (!ssh) ssh = "ssh";
579
580 *arg++ = ssh;
36ad53ff
EY
581 if (putty && !strcasestr(ssh, "tortoiseplink"))
582 *arg++ = "-batch";
f364cb88 583 if (port) {
36ad53ff
EY
584 /* P is for PuTTY, p is for OpenSSH */
585 *arg++ = putty ? "-P" : "-p";
f364cb88 586 *arg++ = port;
4852f723 587 }
f364cb88
JS
588 *arg++ = host;
589 }
590 else {
48a7c1c4
GB
591 /* remove repo-local variables from the environment */
592 conn->env = local_repo_env;
4cfb2a44 593 conn->use_shell = 1;
016fb48b 594 }
f364cb88
JS
595 *arg++ = cmd.buf;
596 *arg = NULL;
597
598 if (start_command(conn))
599 die("unable to fork");
600
601 fd[0] = conn->out; /* read from child's stdout */
602 fd[1] = conn->in; /* write to child's stdin */
603 strbuf_release(&cmd);
4577370e 604 free(url);
da2a95b2
SH
605 if (free_path)
606 free(path);
98158e9c 607 return conn;
f7192598
LT
608}
609
98158e9c 610int finish_connect(struct child_process *conn)
f7192598 611{
f364cb88 612 int code;
fb32c917 613 if (!conn || conn == &no_fork)
f42a5c4e
FBH
614 return 0;
615
f364cb88
JS
616 code = finish_command(conn);
617 free(conn->argv);
98158e9c 618 free(conn);
f364cb88 619 return code;
f7192598 620}
f206063b
FL
621
622char *git_getpass(const char *prompt)
623{
d3e7da89 624 const char *askpass;
f206063b
FL
625 struct child_process pass;
626 const char *args[3];
627 static struct strbuf buffer = STRBUF_INIT;
628
629 askpass = getenv("GIT_ASKPASS");
d3e7da89
AK
630 if (!askpass)
631 askpass = askpass_program;
90e87b01
KF
632 if (!askpass)
633 askpass = getenv("SSH_ASKPASS");
8713feb1
JS
634 if (!askpass || !(*askpass)) {
635 char *result = getpass(prompt);
636 if (!result)
637 die_errno("Could not read password");
638 return result;
639 }
f206063b
FL
640
641 args[0] = askpass;
642 args[1] = prompt;
643 args[2] = NULL;
644
645 memset(&pass, 0, sizeof(pass));
646 pass.argv = args;
647 pass.out = -1;
648
649 if (start_command(&pass))
650 exit(1);
651
652 strbuf_reset(&buffer);
653 if (strbuf_read(&buffer, pass.out, 20) < 0)
654 die("failed to read password from %s\n", askpass);
655
656 close(pass.out);
657
658 if (finish_command(&pass))
659 exit(1);
660
661 strbuf_setlen(&buffer, strcspn(buffer.buf, "\r\n"));
662
663 return buffer.buf;
664}