]> git.ipfire.org Git - thirdparty/git.git/blame - http-push.c
is_ntfs_dotgit(): only verify the leading segment
[thirdparty/git.git] / http-push.c
CommitLineData
58e60dd2
NH
1#include "cache.h"
2#include "commit.h"
58e60dd2
NH
3#include "tag.h"
4#include "blob.h"
29508e1e 5#include "http.h"
aa1dbc98 6#include "refs.h"
c4e05b1a 7#include "diff.h"
aa1dbc98 8#include "revision.h"
3dfaf7bc 9#include "exec_cmd.h"
6b62816c 10#include "remote.h"
d633c882 11#include "list-objects.h"
4a16d072 12#include "sigchain.h"
a0355f6b 13#include "argv-array.h"
29508e1e 14
081fd8d0
MK
15#ifdef EXPAT_NEEDS_XMLPARSE_H
16#include <xmlparse.h>
17#else
bee8e79d 18#include <expat.h>
081fd8d0 19#endif
58e60dd2
NH
20
21static const char http_push_usage[] =
1b1dd23f 22"git http-push [--all] [--dry-run] [--force] [--verbose] <remote> [<head>...]\n";
58e60dd2 23
92e2eb9c
JS
24#ifndef XML_STATUS_OK
25enum XML_Status {
26 XML_STATUS_OK = 1,
27 XML_STATUS_ERROR = 0
28};
29#define XML_STATUS_OK 1
30#define XML_STATUS_ERROR 0
31#endif
32
197e8951 33#define PREV_BUF_SIZE 4096
58e60dd2 34
acf59575 35/* DAV methods */
58e60dd2
NH
36#define DAV_LOCK "LOCK"
37#define DAV_MKCOL "MKCOL"
38#define DAV_MOVE "MOVE"
39#define DAV_PROPFIND "PROPFIND"
40#define DAV_PUT "PUT"
41#define DAV_UNLOCK "UNLOCK"
3dfaf7bc 42#define DAV_DELETE "DELETE"
acf59575
NH
43
44/* DAV lock flags */
45#define DAV_PROP_LOCKWR (1u << 0)
46#define DAV_PROP_LOCKEX (1u << 1)
47#define DAV_LOCK_OK (1u << 2)
48
49/* DAV XML properties */
50#define DAV_CTX_LOCKENTRY ".multistatus.response.propstat.prop.supportedlock.lockentry"
51#define DAV_CTX_LOCKTYPE_WRITE ".multistatus.response.propstat.prop.supportedlock.lockentry.locktype.write"
52#define DAV_CTX_LOCKTYPE_EXCLUSIVE ".multistatus.response.propstat.prop.supportedlock.lockentry.lockscope.exclusive"
53#define DAV_ACTIVELOCK_OWNER ".prop.lockdiscovery.activelock.owner.href"
54#define DAV_ACTIVELOCK_TIMEOUT ".prop.lockdiscovery.activelock.timeout"
55#define DAV_ACTIVELOCK_TOKEN ".prop.lockdiscovery.activelock.locktoken.href"
aa1dbc98
NH
56#define DAV_PROPFIND_RESP ".multistatus.response"
57#define DAV_PROPFIND_NAME ".multistatus.response.href"
58#define DAV_PROPFIND_COLLECTION ".multistatus.response.propstat.prop.resourcetype.collection"
acf59575
NH
59
60/* DAV request body templates */
aa1dbc98
NH
61#define PROPFIND_SUPPORTEDLOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:prop xmlns:R=\"%s\">\n<D:supportedlock/>\n</D:prop>\n</D:propfind>"
62#define PROPFIND_ALL_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:allprop/>\n</D:propfind>"
58e60dd2
NH
63#define LOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:lockinfo xmlns:D=\"DAV:\">\n<D:lockscope><D:exclusive/></D:lockscope>\n<D:locktype><D:write/></D:locktype>\n<D:owner>\n<D:href>mailto:%s</D:href>\n</D:owner>\n</D:lockinfo>"
64
75187c9d
NH
65#define LOCK_TIME 600
66#define LOCK_REFRESH 30
67
208acbfb 68/* Remember to update object flag allocation in object.h */
1b65a5aa
JH
69#define LOCAL (1u<<16)
70#define REMOTE (1u<<17)
71#define FETCHING (1u<<18)
72#define PUSHING (1u<<19)
aa1dbc98 73
3dfaf7bc
NH
74/* We allow "recursive" symbolic refs. Only within reason, though */
75#define MAXDEPTH 5
76
96f1e58f
DR
77static int pushing;
78static int aborted;
a3c57c9a 79static signed char remote_dir_exists[256];
58e60dd2 80
96f1e58f 81static int push_verbosely;
28b9d6e5 82static int push_all = MATCH_REFS_NONE;
96f1e58f 83static int force_all;
fe5d1d3e 84static int dry_run;
ae4efe19 85static int helper_status;
58e60dd2 86
96f1e58f 87static struct object_list *objects;
aa1dbc98 88
9cba13ca 89struct repo {
58e60dd2 90 char *url;
e1f33efe 91 char *path;
aa1dbc98 92 int path_len;
197e8951
NH
93 int has_info_refs;
94 int can_update_info_refs;
95 int has_info_packs;
58e60dd2 96 struct packed_git *packs;
512d632c 97 struct remote_lock *locks;
58e60dd2
NH
98};
99
7b5201a6 100static struct repo *repo;
58e60dd2
NH
101
102enum transfer_state {
197e8951
NH
103 NEED_FETCH,
104 RUN_FETCH_LOOSE,
105 RUN_FETCH_PACKED,
58e60dd2
NH
106 NEED_PUSH,
107 RUN_MKCOL,
108 RUN_PUT,
109 RUN_MOVE,
110 ABORTED,
4b05548f 111 COMPLETE
58e60dd2
NH
112};
113
9cba13ca 114struct transfer_request {
aa1dbc98 115 struct object *obj;
58e60dd2
NH
116 char *url;
117 char *dest;
aa1dbc98 118 struct remote_lock *lock;
58e60dd2
NH
119 struct curl_slist *headers;
120 struct buffer buffer;
58e60dd2
NH
121 enum transfer_state state;
122 CURLcode curl_result;
123 char errorstr[CURL_ERROR_SIZE];
124 long http_code;
197e8951 125 void *userData;
58e60dd2
NH
126 struct active_request_slot *slot;
127 struct transfer_request *next;
128};
129
96f1e58f 130static struct transfer_request *request_queue_head;
58e60dd2 131
9cba13ca 132struct xml_ctx {
acf59575
NH
133 char *name;
134 int len;
135 char *cdata;
136 void (*userFunc)(struct xml_ctx *ctx, int tag_closed);
137 void *userData;
138};
139
9cba13ca 140struct remote_lock {
75187c9d 141 char *url;
26349b2e 142 char *owner;
75187c9d 143 char *token;
dfab7c14 144 char tmpfile_suffix[41];
26349b2e
NH
145 time_t start_time;
146 long timeout;
75187c9d 147 int refreshing;
aa1dbc98
NH
148 struct remote_lock *next;
149};
150
3030baa7
NH
151/* Flags that control remote_ls processing */
152#define PROCESS_FILES (1u << 0)
153#define PROCESS_DIRS (1u << 1)
154#define RECURSIVE (1u << 2)
155
156/* Flags that remote_ls passes to callback functions */
157#define IS_DIR (1u << 0)
158
9cba13ca 159struct remote_ls_ctx {
3030baa7
NH
160 char *path;
161 void (*userFunc)(struct remote_ls_ctx *ls);
162 void *userData;
163 int flags;
164 char *dentry_name;
165 int dentry_flags;
166 struct remote_ls_ctx *parent;
26349b2e
NH
167};
168
b1c7d4aa
TRC
169/* get_dav_token_headers options */
170enum dav_header_flag {
171 DAV_HEADER_IF = (1u << 0),
172 DAV_HEADER_LOCK = (1u << 1),
173 DAV_HEADER_TIMEOUT = (1u << 2)
174};
175
2aab167a 176static char *xml_entities(const char *s)
519d05be
MH
177{
178 struct strbuf buf = STRBUF_INIT;
37141f27 179 strbuf_addstr_xml_quoted(&buf, s);
519d05be
MH
180 return strbuf_detach(&buf, NULL);
181}
182
ebaaf316
DM
183static void curl_setup_http_get(CURL *curl, const char *url,
184 const char *custom_req)
185{
186 curl_easy_setopt(curl, CURLOPT_HTTPGET, 1);
187 curl_easy_setopt(curl, CURLOPT_URL, url);
188 curl_easy_setopt(curl, CURLOPT_CUSTOMREQUEST, custom_req);
189 curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, fwrite_null);
190}
191
192static void curl_setup_http(CURL *curl, const char *url,
193 const char *custom_req, struct buffer *buffer,
194 curl_write_callback write_fn)
195{
196 curl_easy_setopt(curl, CURLOPT_PUT, 1);
197 curl_easy_setopt(curl, CURLOPT_URL, url);
198 curl_easy_setopt(curl, CURLOPT_INFILE, buffer);
199 curl_easy_setopt(curl, CURLOPT_INFILESIZE, buffer->buf.len);
200 curl_easy_setopt(curl, CURLOPT_READFUNCTION, fread_buffer);
201#ifndef NO_CURL_IOCTL
202 curl_easy_setopt(curl, CURLOPT_IOCTLFUNCTION, ioctl_buffer);
479eaa8e 203 curl_easy_setopt(curl, CURLOPT_IOCTLDATA, buffer);
ebaaf316
DM
204#endif
205 curl_easy_setopt(curl, CURLOPT_WRITEFUNCTION, write_fn);
206 curl_easy_setopt(curl, CURLOPT_NOBODY, 0);
207 curl_easy_setopt(curl, CURLOPT_CUSTOMREQUEST, custom_req);
208 curl_easy_setopt(curl, CURLOPT_UPLOAD, 1);
209}
210
d456c9fd
JH
211static struct curl_slist *get_dav_token_headers(struct remote_lock *lock, enum dav_header_flag options)
212{
b1c7d4aa 213 struct strbuf buf = STRBUF_INIT;
8cb01e2f 214 struct curl_slist *dav_headers = http_copy_default_headers();
b1c7d4aa 215
d456c9fd 216 if (options & DAV_HEADER_IF) {
b1c7d4aa
TRC
217 strbuf_addf(&buf, "If: (<%s>)", lock->token);
218 dav_headers = curl_slist_append(dav_headers, buf.buf);
219 strbuf_reset(&buf);
220 }
d456c9fd 221 if (options & DAV_HEADER_LOCK) {
b1c7d4aa
TRC
222 strbuf_addf(&buf, "Lock-Token: <%s>", lock->token);
223 dav_headers = curl_slist_append(dav_headers, buf.buf);
224 strbuf_reset(&buf);
225 }
d456c9fd 226 if (options & DAV_HEADER_TIMEOUT) {
b1c7d4aa
TRC
227 strbuf_addf(&buf, "Timeout: Second-%ld", lock->timeout);
228 dav_headers = curl_slist_append(dav_headers, buf.buf);
229 strbuf_reset(&buf);
230 }
231 strbuf_release(&buf);
232
233 return dav_headers;
234}
235
29508e1e 236static void finish_request(struct transfer_request *request);
197e8951 237static void release_request(struct transfer_request *request);
58e60dd2 238
29508e1e 239static void process_response(void *callback_data)
58e60dd2 240{
29508e1e
NH
241 struct transfer_request *request =
242 (struct transfer_request *)callback_data;
58e60dd2 243
29508e1e 244 finish_request(request);
58e60dd2
NH
245}
246
dd8239f9 247#ifdef USE_CURL_MULTI
dcdb3335 248
197e8951
NH
249static void start_fetch_loose(struct transfer_request *request)
250{
197e8951 251 struct active_request_slot *slot;
5424bc55 252 struct http_object_request *obj_req;
197e8951 253
ed1c9977 254 obj_req = new_http_object_request(repo->url, request->obj->oid.hash);
5424bc55 255 if (obj_req == NULL) {
197e8951 256 request->state = ABORTED;
197e8951
NH
257 return;
258 }
259
5424bc55 260 slot = obj_req->slot;
197e8951
NH
261 slot->callback_func = process_response;
262 slot->callback_data = request;
263 request->slot = slot;
5424bc55 264 request->userData = obj_req;
197e8951
NH
265
266 /* Try to get the request started, abort the request on error */
267 request->state = RUN_FETCH_LOOSE;
268 if (!start_active_slot(slot)) {
269 fprintf(stderr, "Unable to start GET request\n");
7b5201a6 270 repo->can_update_info_refs = 0;
5424bc55 271 release_http_object_request(obj_req);
197e8951
NH
272 release_request(request);
273 }
274}
275
dd8239f9
JH
276static void start_mkcol(struct transfer_request *request)
277{
f2fd0760 278 char *hex = oid_to_hex(&request->obj->oid);
dd8239f9 279 struct active_request_slot *slot;
dd8239f9 280
7b5201a6 281 request->url = get_remote_object_url(repo->url, hex, 1);
dd8239f9
JH
282
283 slot = get_active_slot();
284 slot->callback_func = process_response;
285 slot->callback_data = request;
ebaaf316 286 curl_setup_http_get(slot->curl, request->url, DAV_MKCOL);
dd8239f9 287 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
dd8239f9
JH
288
289 if (start_active_slot(slot)) {
290 request->slot = slot;
291 request->state = RUN_MKCOL;
292 } else {
293 request->state = ABORTED;
6a83d902 294 FREE_AND_NULL(request->url);
dd8239f9
JH
295 }
296}
297#endif
298
197e8951
NH
299static void start_fetch_packed(struct transfer_request *request)
300{
197e8951 301 struct packed_git *target;
197e8951
NH
302
303 struct transfer_request *check_request = request_queue_head;
2264dfa5 304 struct http_pack_request *preq;
197e8951 305
ed1c9977 306 target = find_sha1_pack(request->obj->oid.hash, repo->packs);
197e8951 307 if (!target) {
f2fd0760 308 fprintf(stderr, "Unable to fetch %s, will not be able to update server info refs\n", oid_to_hex(&request->obj->oid));
7b5201a6 309 repo->can_update_info_refs = 0;
197e8951
NH
310 release_request(request);
311 return;
312 }
313
314 fprintf(stderr, "Fetching pack %s\n", sha1_to_hex(target->sha1));
f2fd0760 315 fprintf(stderr, " which contains %s\n", oid_to_hex(&request->obj->oid));
197e8951 316
2264dfa5
TRC
317 preq = new_http_pack_request(target, repo->url);
318 if (preq == NULL) {
2264dfa5
TRC
319 repo->can_update_info_refs = 0;
320 return;
321 }
322 preq->lst = &repo->packs;
197e8951
NH
323
324 /* Make sure there isn't another open request for this pack */
325 while (check_request) {
326 if (check_request->state == RUN_FETCH_PACKED &&
2264dfa5
TRC
327 !strcmp(check_request->url, preq->url)) {
328 release_http_pack_request(preq);
197e8951
NH
329 release_request(request);
330 return;
331 }
332 check_request = check_request->next;
333 }
334
2264dfa5
TRC
335 preq->slot->callback_func = process_response;
336 preq->slot->callback_data = request;
337 request->slot = preq->slot;
338 request->userData = preq;
197e8951
NH
339
340 /* Try to get the request started, abort the request on error */
341 request->state = RUN_FETCH_PACKED;
2264dfa5 342 if (!start_active_slot(preq->slot)) {
197e8951 343 fprintf(stderr, "Unable to start GET request\n");
2264dfa5 344 release_http_pack_request(preq);
7b5201a6 345 repo->can_update_info_refs = 0;
197e8951
NH
346 release_request(request);
347 }
348}
349
58e60dd2
NH
350static void start_put(struct transfer_request *request)
351{
f2fd0760 352 char *hex = oid_to_hex(&request->obj->oid);
58e60dd2 353 struct active_request_slot *slot;
817d14a8 354 struct strbuf buf = STRBUF_INIT;
21666f1a 355 enum object_type type;
58e60dd2
NH
356 char hdr[50];
357 void *unpacked;
358 unsigned long len;
359 int hdrlen;
360 ssize_t size;
ef49a7a0 361 git_zstream stream;
58e60dd2 362
ed1c9977 363 unpacked = read_sha1_file(request->obj->oid.hash, &type, &len);
ef1286d3 364 hdrlen = xsnprintf(hdr, sizeof(hdr), "%s %lu", typename(type), len) + 1;
58e60dd2
NH
365
366 /* Set it up */
55bb5c91 367 git_deflate_init(&stream, zlib_compression_level);
225a6f10 368 size = git_deflate_bound(&stream, len + hdrlen);
028c2976
MH
369 strbuf_init(&request->buffer.buf, size);
370 request->buffer.posn = 0;
58e60dd2
NH
371
372 /* Compress it */
028c2976 373 stream.next_out = (unsigned char *)request->buffer.buf.buf;
58e60dd2
NH
374 stream.avail_out = size;
375
376 /* First header.. */
377 stream.next_in = (void *)hdr;
378 stream.avail_in = hdrlen;
55bb5c91
JH
379 while (git_deflate(&stream, 0) == Z_OK)
380 ; /* nothing */
58e60dd2
NH
381
382 /* Then the data itself.. */
383 stream.next_in = unpacked;
384 stream.avail_in = len;
55bb5c91
JH
385 while (git_deflate(&stream, Z_FINISH) == Z_OK)
386 ; /* nothing */
387 git_deflate_end(&stream);
58e60dd2
NH
388 free(unpacked);
389
028c2976 390 request->buffer.buf.len = stream.total_out;
58e60dd2 391
817d14a8 392 strbuf_addstr(&buf, "Destination: ");
7b5201a6 393 append_remote_object_url(&buf, repo->url, hex, 0);
817d14a8
TRC
394 request->dest = strbuf_detach(&buf, NULL);
395
7b5201a6 396 append_remote_object_url(&buf, repo->url, hex, 0);
dfab7c14 397 strbuf_add(&buf, request->lock->tmpfile_suffix, 41);
817d14a8 398 request->url = strbuf_detach(&buf, NULL);
58e60dd2
NH
399
400 slot = get_active_slot();
29508e1e
NH
401 slot->callback_func = process_response;
402 slot->callback_data = request;
ebaaf316
DM
403 curl_setup_http(slot->curl, request->url, DAV_PUT,
404 &request->buffer, fwrite_null);
58e60dd2
NH
405
406 if (start_active_slot(slot)) {
407 request->slot = slot;
408 request->state = RUN_PUT;
409 } else {
410 request->state = ABORTED;
6a83d902 411 FREE_AND_NULL(request->url);
58e60dd2
NH
412 }
413}
414
415static void start_move(struct transfer_request *request)
416{
417 struct active_request_slot *slot;
8cb01e2f 418 struct curl_slist *dav_headers = http_copy_default_headers();
58e60dd2
NH
419
420 slot = get_active_slot();
29508e1e
NH
421 slot->callback_func = process_response;
422 slot->callback_data = request;
ebaaf316 423 curl_setup_http_get(slot->curl, request->url, DAV_MOVE);
58e60dd2
NH
424 dav_headers = curl_slist_append(dav_headers, request->dest);
425 dav_headers = curl_slist_append(dav_headers, "Overwrite: T");
426 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
58e60dd2
NH
427
428 if (start_active_slot(slot)) {
429 request->slot = slot;
430 request->state = RUN_MOVE;
431 } else {
432 request->state = ABORTED;
6a83d902 433 FREE_AND_NULL(request->url);
58e60dd2
NH
434 }
435}
436
512d632c 437static int refresh_lock(struct remote_lock *lock)
75187c9d
NH
438{
439 struct active_request_slot *slot;
baa7b67d 440 struct slot_results results;
b1c7d4aa 441 struct curl_slist *dav_headers;
512d632c 442 int rc = 0;
75187c9d 443
512d632c 444 lock->refreshing = 1;
75187c9d 445
b1c7d4aa 446 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF | DAV_HEADER_TIMEOUT);
75187c9d 447
512d632c
NH
448 slot = get_active_slot();
449 slot->results = &results;
ebaaf316 450 curl_setup_http_get(slot->curl, lock->url, DAV_LOCK);
512d632c 451 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
75187c9d 452
512d632c
NH
453 if (start_active_slot(slot)) {
454 run_active_slot(slot);
455 if (results.curl_result != CURLE_OK) {
456 fprintf(stderr, "LOCK HTTP error %ld\n",
457 results.http_code);
458 } else {
459 lock->start_time = time(NULL);
460 rc = 1;
461 }
462 }
aa1dbc98 463
512d632c
NH
464 lock->refreshing = 0;
465 curl_slist_free_all(dav_headers);
aa1dbc98 466
512d632c
NH
467 return rc;
468}
469
ec26b4d6 470static void check_locks(void)
512d632c 471{
7b5201a6 472 struct remote_lock *lock = repo->locks;
512d632c
NH
473 time_t current_time = time(NULL);
474 int time_remaining;
475
476 while (lock) {
477 time_remaining = lock->start_time + lock->timeout -
478 current_time;
479 if (!lock->refreshing && time_remaining < LOCK_REFRESH) {
480 if (!refresh_lock(lock)) {
481 fprintf(stderr,
482 "Unable to refresh lock for %s\n",
483 lock->url);
484 aborted = 1;
485 return;
aa1dbc98 486 }
75187c9d 487 }
512d632c 488 lock = lock->next;
75187c9d 489 }
aa1dbc98 490}
75187c9d 491
aa1dbc98
NH
492static void release_request(struct transfer_request *request)
493{
494 struct transfer_request *entry = request_queue_head;
495
496 if (request == request_queue_head) {
497 request_queue_head = request->next;
498 } else {
499 while (entry->next != NULL && entry->next != request)
500 entry = entry->next;
501 if (entry->next == request)
502 entry->next = entry->next->next;
503 }
504
8e0f7003 505 free(request->url);
aa1dbc98 506 free(request);
75187c9d
NH
507}
508
58e60dd2
NH
509static void finish_request(struct transfer_request *request)
510{
2264dfa5 511 struct http_pack_request *preq;
5424bc55 512 struct http_object_request *obj_req;
197e8951
NH
513
514 request->curl_result = request->slot->curl_result;
58e60dd2
NH
515 request->http_code = request->slot->http_code;
516 request->slot = NULL;
75187c9d 517
aa1dbc98 518 /* Keep locks active */
512d632c 519 check_locks();
75187c9d 520
58e60dd2
NH
521 if (request->headers != NULL)
522 curl_slist_free_all(request->headers);
7b899967
NH
523
524 /* URL is reused for MOVE after PUT */
525 if (request->state != RUN_PUT) {
6a83d902 526 FREE_AND_NULL(request->url);
aa1dbc98 527 }
7b899967 528
aa1dbc98 529 if (request->state == RUN_MKCOL) {
58e60dd2
NH
530 if (request->curl_result == CURLE_OK ||
531 request->http_code == 405) {
ed1c9977 532 remote_dir_exists[request->obj->oid.hash[0]] = 1;
58e60dd2
NH
533 start_put(request);
534 } else {
535 fprintf(stderr, "MKCOL %s failed, aborting (%d/%ld)\n",
f2fd0760 536 oid_to_hex(&request->obj->oid),
58e60dd2
NH
537 request->curl_result, request->http_code);
538 request->state = ABORTED;
539 aborted = 1;
540 }
541 } else if (request->state == RUN_PUT) {
542 if (request->curl_result == CURLE_OK) {
543 start_move(request);
544 } else {
545 fprintf(stderr, "PUT %s failed, aborting (%d/%ld)\n",
f2fd0760 546 oid_to_hex(&request->obj->oid),
58e60dd2
NH
547 request->curl_result, request->http_code);
548 request->state = ABORTED;
549 aborted = 1;
550 }
551 } else if (request->state == RUN_MOVE) {
552 if (request->curl_result == CURLE_OK) {
1a703cba
NH
553 if (push_verbosely)
554 fprintf(stderr, " sent %s\n",
f2fd0760 555 oid_to_hex(&request->obj->oid));
aa1dbc98
NH
556 request->obj->flags |= REMOTE;
557 release_request(request);
58e60dd2
NH
558 } else {
559 fprintf(stderr, "MOVE %s failed, aborting (%d/%ld)\n",
f2fd0760 560 oid_to_hex(&request->obj->oid),
58e60dd2
NH
561 request->curl_result, request->http_code);
562 request->state = ABORTED;
563 aborted = 1;
564 }
197e8951 565 } else if (request->state == RUN_FETCH_LOOSE) {
5424bc55 566 obj_req = (struct http_object_request *)request->userData;
197e8951 567
5424bc55
TRC
568 if (finish_http_object_request(obj_req) == 0)
569 if (obj_req->rename == 0)
570 request->obj->flags |= (LOCAL | REMOTE);
197e8951
NH
571
572 /* Try fetching packed if necessary */
5424bc55
TRC
573 if (request->obj->flags & LOCAL) {
574 release_http_object_request(obj_req);
197e8951 575 release_request(request);
5424bc55 576 } else
197e8951
NH
577 start_fetch_packed(request);
578
579 } else if (request->state == RUN_FETCH_PACKED) {
2264dfa5 580 int fail = 1;
197e8951
NH
581 if (request->curl_result != CURLE_OK) {
582 fprintf(stderr, "Unable to get pack file %s\n%s",
583 request->url, curl_errorstr);
197e8951 584 } else {
2264dfa5
TRC
585 preq = (struct http_pack_request *)request->userData;
586
587 if (preq) {
609621a4 588 if (finish_http_pack_request(preq) == 0)
2264dfa5
TRC
589 fail = 0;
590 release_http_pack_request(preq);
197e8951
NH
591 }
592 }
2264dfa5
TRC
593 if (fail)
594 repo->can_update_info_refs = 0;
197e8951 595 release_request(request);
58e60dd2
NH
596 }
597}
598
b3ca4e4e 599#ifdef USE_CURL_MULTI
4f66250d 600static int is_running_queue;
fc57b6aa 601static int fill_active_slot(void *unused)
58e60dd2 602{
8e24cbae 603 struct transfer_request *request;
58e60dd2 604
4f66250d 605 if (aborted || !is_running_queue)
45c17412 606 return 0;
58e60dd2 607
45c17412 608 for (request = request_queue_head; request; request = request->next) {
197e8951
NH
609 if (request->state == NEED_FETCH) {
610 start_fetch_loose(request);
45c17412 611 return 1;
197e8951 612 } else if (pushing && request->state == NEED_PUSH) {
ed1c9977 613 if (remote_dir_exists[request->obj->oid.hash[0]] == 1) {
0dd276b8 614 start_put(request);
aa1dbc98 615 } else {
0dd276b8 616 start_mkcol(request);
aa1dbc98 617 }
45c17412 618 return 1;
58e60dd2 619 }
aa1dbc98 620 }
45c17412 621 return 0;
58e60dd2 622}
b3ca4e4e 623#endif
58e60dd2 624
aa1dbc98
NH
625static void get_remote_object_list(unsigned char parent);
626
197e8951
NH
627static void add_fetch_request(struct object *obj)
628{
629 struct transfer_request *request;
630
631 check_locks();
632
633 /*
634 * Don't fetch the object if it's known to exist locally
635 * or is already in the request queue
636 */
ed1c9977 637 if (remote_dir_exists[obj->oid.hash[0]] == -1)
638 get_remote_object_list(obj->oid.hash[0]);
197e8951
NH
639 if (obj->flags & (LOCAL | FETCHING))
640 return;
641
642 obj->flags |= FETCHING;
643 request = xmalloc(sizeof(*request));
644 request->obj = obj;
645 request->url = NULL;
646 request->lock = NULL;
647 request->headers = NULL;
197e8951
NH
648 request->state = NEED_FETCH;
649 request->next = request_queue_head;
650 request_queue_head = request;
651
b3ca4e4e 652#ifdef USE_CURL_MULTI
197e8951
NH
653 fill_active_slots();
654 step_active_slots();
b3ca4e4e 655#endif
197e8951
NH
656}
657
1a703cba 658static int add_send_request(struct object *obj, struct remote_lock *lock)
58e60dd2 659{
3def06e6 660 struct transfer_request *request;
58e60dd2 661 struct packed_git *target;
58e60dd2 662
512d632c
NH
663 /* Keep locks active */
664 check_locks();
665
aa1dbc98
NH
666 /*
667 * Don't push the object if it's known to exist on the remote
668 * or is already in the request queue
669 */
ed1c9977 670 if (remote_dir_exists[obj->oid.hash[0]] == -1)
671 get_remote_object_list(obj->oid.hash[0]);
aa1dbc98 672 if (obj->flags & (REMOTE | PUSHING))
1a703cba 673 return 0;
ed1c9977 674 target = find_sha1_pack(obj->oid.hash, repo->packs);
aa1dbc98
NH
675 if (target) {
676 obj->flags |= REMOTE;
1a703cba 677 return 0;
aa1dbc98 678 }
58e60dd2 679
aa1dbc98 680 obj->flags |= PUSHING;
58e60dd2 681 request = xmalloc(sizeof(*request));
aa1dbc98 682 request->obj = obj;
58e60dd2 683 request->url = NULL;
26349b2e 684 request->lock = lock;
58e60dd2 685 request->headers = NULL;
aa1dbc98 686 request->state = NEED_PUSH;
c17fb6ee
NH
687 request->next = request_queue_head;
688 request_queue_head = request;
29508e1e 689
b3ca4e4e 690#ifdef USE_CURL_MULTI
29508e1e
NH
691 fill_active_slots();
692 step_active_slots();
b3ca4e4e 693#endif
1a703cba
NH
694
695 return 1;
58e60dd2
NH
696}
697
f4f440a0 698static int fetch_indices(void)
58e60dd2 699{
b8caac2b 700 int ret;
58e60dd2 701
58e60dd2
NH
702 if (push_verbosely)
703 fprintf(stderr, "Getting pack list\n");
1a703cba 704
b8caac2b
TRC
705 switch (http_get_info_packs(repo->url, &repo->packs)) {
706 case HTTP_OK:
707 case HTTP_MISSING_TARGET:
708 ret = 0;
709 break;
710 default:
711 ret = -1;
58e60dd2
NH
712 }
713
b8caac2b 714 return ret;
58e60dd2
NH
715}
716
1aa40df6 717static void one_remote_object(const struct object_id *oid)
aa1dbc98 718{
aa1dbc98
NH
719 struct object *obj;
720
1aa40df6 721 obj = lookup_object(oid->hash);
aa1dbc98 722 if (!obj)
c251c83d 723 obj = parse_object(oid);
aa1dbc98
NH
724
725 /* Ignore remote objects that don't exist locally */
726 if (!obj)
727 return;
728
729 obj->flags |= REMOTE;
730 if (!object_list_contains(objects, obj))
1f1e895f 731 object_list_insert(obj, &objects);
aa1dbc98
NH
732}
733
acf59575 734static void handle_lockprop_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 735{
acf59575
NH
736 int *lock_flags = (int *)ctx->userData;
737
738 if (tag_closed) {
739 if (!strcmp(ctx->name, DAV_CTX_LOCKENTRY)) {
740 if ((*lock_flags & DAV_PROP_LOCKEX) &&
741 (*lock_flags & DAV_PROP_LOCKWR)) {
742 *lock_flags |= DAV_LOCK_OK;
743 }
744 *lock_flags &= DAV_LOCK_OK;
745 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_WRITE)) {
746 *lock_flags |= DAV_PROP_LOCKWR;
747 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_EXCLUSIVE)) {
748 *lock_flags |= DAV_PROP_LOCKEX;
749 }
750 }
26349b2e
NH
751}
752
acf59575 753static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 754{
aa1dbc98 755 struct remote_lock *lock = (struct remote_lock *)ctx->userData;
dfab7c14
TRC
756 git_SHA_CTX sha_ctx;
757 unsigned char lock_token_sha1[20];
acf59575
NH
758
759 if (tag_closed && ctx->cdata) {
760 if (!strcmp(ctx->name, DAV_ACTIVELOCK_OWNER)) {
95244ae3 761 lock->owner = xstrdup(ctx->cdata);
acf59575 762 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TIMEOUT)) {
ae021d87
JK
763 const char *arg;
764 if (skip_prefix(ctx->cdata, "Second-", &arg))
765 lock->timeout = strtol(arg, NULL, 10);
acf59575 766 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
95244ae3 767 lock->token = xstrdup(ctx->cdata);
dfab7c14
TRC
768
769 git_SHA1_Init(&sha_ctx);
770 git_SHA1_Update(&sha_ctx, lock->token, strlen(lock->token));
771 git_SHA1_Final(lock_token_sha1, &sha_ctx);
772
773 lock->tmpfile_suffix[0] = '_';
774 memcpy(lock->tmpfile_suffix + 1, sha1_to_hex(lock_token_sha1), 40);
acf59575 775 }
26349b2e
NH
776 }
777}
778
2aab167a 779static void one_remote_ref(const char *refname);
aa1dbc98 780
26349b2e 781static void
acf59575 782xml_start_tag(void *userData, const char *name, const char **atts)
26349b2e 783{
acf59575 784 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 785 const char *c = strchr(name, ':');
0cc41428 786 int old_namelen, new_len;
acf59575
NH
787
788 if (c == NULL)
789 c = name;
790 else
791 c++;
792
0cc41428
JK
793 old_namelen = strlen(ctx->name);
794 new_len = old_namelen + strlen(c) + 2;
acf59575
NH
795
796 if (new_len > ctx->len) {
797 ctx->name = xrealloc(ctx->name, new_len);
798 ctx->len = new_len;
26349b2e 799 }
0cc41428 800 xsnprintf(ctx->name + old_namelen, ctx->len - old_namelen, ".%s", c);
26349b2e 801
6a83d902 802 FREE_AND_NULL(ctx->cdata);
acf59575
NH
803
804 ctx->userFunc(ctx, 0);
26349b2e
NH
805}
806
58e60dd2 807static void
acf59575 808xml_end_tag(void *userData, const char *name)
58e60dd2 809{
acf59575 810 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 811 const char *c = strchr(name, ':');
acf59575 812 char *ep;
58e60dd2 813
acf59575
NH
814 ctx->userFunc(ctx, 1);
815
816 if (c == NULL)
817 c = name;
818 else
819 c++;
820
821 ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
822 *ep = 0;
58e60dd2
NH
823}
824
825static void
acf59575 826xml_cdata(void *userData, const XML_Char *s, int len)
58e60dd2 827{
acf59575 828 struct xml_ctx *ctx = (struct xml_ctx *)userData;
4cac42b1 829 free(ctx->cdata);
182af834 830 ctx->cdata = xmemdupz(s, len);
58e60dd2
NH
831}
832
554fe20d 833static struct remote_lock *lock_remote(const char *path, long timeout)
58e60dd2
NH
834{
835 struct active_request_slot *slot;
baa7b67d 836 struct slot_results results;
028c2976
MH
837 struct buffer out_buffer = { STRBUF_INIT, 0 };
838 struct strbuf in_buffer = STRBUF_INIT;
58e60dd2 839 char *url;
0772b9a6 840 char *ep;
58e60dd2 841 char timeout_header[25];
512d632c 842 struct remote_lock *lock = NULL;
8cb01e2f 843 struct curl_slist *dav_headers = http_copy_default_headers();
acf59575 844 struct xml_ctx ctx;
519d05be 845 char *escaped;
58e60dd2 846
28310186 847 url = xstrfmt("%s%s", repo->url, path);
aa1dbc98 848
0772b9a6 849 /* Make sure leading directories exist for the remote ref */
7b5201a6 850 ep = strchr(url + strlen(repo->url) + 1, '/');
0772b9a6 851 while (ep) {
466ddf90
JS
852 char saved_character = ep[1];
853 ep[1] = '\0';
0772b9a6 854 slot = get_active_slot();
baa7b67d 855 slot->results = &results;
ebaaf316 856 curl_setup_http_get(slot->curl, url, DAV_MKCOL);
0772b9a6
NH
857 if (start_active_slot(slot)) {
858 run_active_slot(slot);
baa7b67d
NH
859 if (results.curl_result != CURLE_OK &&
860 results.http_code != 405) {
0772b9a6
NH
861 fprintf(stderr,
862 "Unable to create branch path %s\n",
863 url);
864 free(url);
865 return NULL;
866 }
867 } else {
1a703cba 868 fprintf(stderr, "Unable to start MKCOL request\n");
0772b9a6
NH
869 free(url);
870 return NULL;
871 }
466ddf90 872 ep[1] = saved_character;
0772b9a6
NH
873 ep = strchr(ep + 1, '/');
874 }
875
5cb2194a 876 escaped = xml_entities(ident_default_email());
519d05be
MH
877 strbuf_addf(&out_buffer.buf, LOCK_REQUEST, escaped);
878 free(escaped);
26349b2e 879
5096d490 880 xsnprintf(timeout_header, sizeof(timeout_header), "Timeout: Second-%ld", timeout);
58e60dd2
NH
881 dav_headers = curl_slist_append(dav_headers, timeout_header);
882 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
883
884 slot = get_active_slot();
baa7b67d 885 slot->results = &results;
ebaaf316 886 curl_setup_http(slot->curl, url, DAV_LOCK, &out_buffer, fwrite_buffer);
58e60dd2 887 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
ebaaf316 888 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
58e60dd2 889
aa1dbc98 890 lock = xcalloc(1, sizeof(*lock));
aa1dbc98 891 lock->timeout = -1;
acf59575 892
58e60dd2
NH
893 if (start_active_slot(slot)) {
894 run_active_slot(slot);
baa7b67d 895 if (results.curl_result == CURLE_OK) {
472b2570
MH
896 XML_Parser parser = XML_ParserCreate(NULL);
897 enum XML_Status result;
acf59575
NH
898 ctx.name = xcalloc(10, 1);
899 ctx.len = 0;
900 ctx.cdata = NULL;
901 ctx.userFunc = handle_new_lock_ctx;
aa1dbc98 902 ctx.userData = lock;
acf59575
NH
903 XML_SetUserData(parser, &ctx);
904 XML_SetElementHandler(parser, xml_start_tag,
905 xml_end_tag);
906 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
907 result = XML_Parse(parser, in_buffer.buf,
908 in_buffer.len, 1);
acf59575
NH
909 free(ctx.name);
910 if (result != XML_STATUS_OK) {
911 fprintf(stderr, "XML error: %s\n",
912 XML_ErrorString(
913 XML_GetErrorCode(parser)));
aa1dbc98 914 lock->timeout = -1;
acf59575 915 }
472b2570 916 XML_ParserFree(parser);
58e60dd2
NH
917 }
918 } else {
1a703cba 919 fprintf(stderr, "Unable to start LOCK request\n");
58e60dd2
NH
920 }
921
acf59575 922 curl_slist_free_all(dav_headers);
028c2976
MH
923 strbuf_release(&out_buffer.buf);
924 strbuf_release(&in_buffer);
26349b2e 925
aa1dbc98 926 if (lock->token == NULL || lock->timeout <= 0) {
8e0f7003
JM
927 free(lock->token);
928 free(lock->owner);
75187c9d 929 free(url);
6a83d902 930 FREE_AND_NULL(lock);
acf59575 931 } else {
aa1dbc98 932 lock->url = url;
aa1dbc98 933 lock->start_time = time(NULL);
7b5201a6
AK
934 lock->next = repo->locks;
935 repo->locks = lock;
26349b2e
NH
936 }
937
aa1dbc98 938 return lock;
58e60dd2
NH
939}
940
aa1dbc98 941static int unlock_remote(struct remote_lock *lock)
58e60dd2
NH
942{
943 struct active_request_slot *slot;
baa7b67d 944 struct slot_results results;
7b5201a6 945 struct remote_lock *prev = repo->locks;
b1c7d4aa 946 struct curl_slist *dav_headers;
58e60dd2
NH
947 int rc = 0;
948
b1c7d4aa 949 dav_headers = get_dav_token_headers(lock, DAV_HEADER_LOCK);
58e60dd2
NH
950
951 slot = get_active_slot();
baa7b67d 952 slot->results = &results;
ebaaf316 953 curl_setup_http_get(slot->curl, lock->url, DAV_UNLOCK);
58e60dd2
NH
954 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
955
956 if (start_active_slot(slot)) {
957 run_active_slot(slot);
baa7b67d 958 if (results.curl_result == CURLE_OK)
58e60dd2
NH
959 rc = 1;
960 else
512d632c 961 fprintf(stderr, "UNLOCK HTTP error %ld\n",
baa7b67d 962 results.http_code);
58e60dd2 963 } else {
512d632c 964 fprintf(stderr, "Unable to start UNLOCK request\n");
58e60dd2
NH
965 }
966
967 curl_slist_free_all(dav_headers);
75187c9d 968
7b5201a6
AK
969 if (repo->locks == lock) {
970 repo->locks = lock->next;
512d632c
NH
971 } else {
972 while (prev && prev->next != lock)
973 prev = prev->next;
974 if (prev)
975 prev->next = prev->next->next;
976 }
977
8e0f7003 978 free(lock->owner);
512d632c
NH
979 free(lock->url);
980 free(lock->token);
981 free(lock);
58e60dd2
NH
982
983 return rc;
984}
985
6a491a17
CB
986static void remove_locks(void)
987{
7b5201a6 988 struct remote_lock *lock = repo->locks;
6a491a17
CB
989
990 fprintf(stderr, "Removing remote locks...\n");
991 while (lock) {
6589ebf1 992 struct remote_lock *next = lock->next;
6a491a17 993 unlock_remote(lock);
6589ebf1 994 lock = next;
6a491a17
CB
995 }
996}
997
998static void remove_locks_on_signal(int signo)
999{
1000 remove_locks();
4a16d072 1001 sigchain_pop(signo);
6a491a17
CB
1002 raise(signo);
1003}
1004
3030baa7
NH
1005static void remote_ls(const char *path, int flags,
1006 void (*userFunc)(struct remote_ls_ctx *ls),
1007 void *userData);
aa1dbc98 1008
67a31f61 1009/* extract hex from sharded "xx/x{40}" filename */
1aa40df6 1010static int get_oid_hex_from_objpath(const char *path, struct object_id *oid)
67a31f61 1011{
1aa40df6 1012 char hex[GIT_MAX_HEXSZ];
67a31f61 1013
1aa40df6 1014 if (strlen(path) != GIT_SHA1_HEXSZ + 1)
67a31f61
JK
1015 return -1;
1016
1017 memcpy(hex, path, 2);
1018 path += 2;
1019 path++; /* skip '/' */
51bfb734 1020 memcpy(hex + 2, path, GIT_SHA1_HEXSZ - 2);
67a31f61 1021
1aa40df6 1022 return get_oid_hex(hex, oid);
67a31f61
JK
1023}
1024
3030baa7
NH
1025static void process_ls_object(struct remote_ls_ctx *ls)
1026{
1027 unsigned int *parent = (unsigned int *)ls->userData;
67a31f61 1028 const char *path = ls->dentry_name;
1aa40df6 1029 struct object_id oid;
aa1dbc98 1030
3030baa7
NH
1031 if (!strcmp(ls->path, ls->dentry_name) && (ls->flags & IS_DIR)) {
1032 remote_dir_exists[*parent] = 1;
1033 return;
1034 }
aa1dbc98 1035
67a31f61 1036 if (!skip_prefix(path, "objects/", &path) ||
1aa40df6 1037 get_oid_hex_from_objpath(path, &oid))
3030baa7 1038 return;
67a31f61 1039
1aa40df6 1040 one_remote_object(&oid);
3030baa7 1041}
aa1dbc98 1042
3030baa7
NH
1043static void process_ls_ref(struct remote_ls_ctx *ls)
1044{
1045 if (!strcmp(ls->path, ls->dentry_name) && (ls->dentry_flags & IS_DIR)) {
1046 fprintf(stderr, " %s\n", ls->dentry_name);
1047 return;
1048 }
aa1dbc98 1049
3030baa7
NH
1050 if (!(ls->dentry_flags & IS_DIR))
1051 one_remote_ref(ls->dentry_name);
1052}
aa1dbc98 1053
3030baa7
NH
1054static void handle_remote_ls_ctx(struct xml_ctx *ctx, int tag_closed)
1055{
1056 struct remote_ls_ctx *ls = (struct remote_ls_ctx *)ctx->userData;
aa1dbc98 1057
3030baa7
NH
1058 if (tag_closed) {
1059 if (!strcmp(ctx->name, DAV_PROPFIND_RESP) && ls->dentry_name) {
1060 if (ls->dentry_flags & IS_DIR) {
0fdadc50
TRC
1061
1062 /* ensure collection names end with slash */
1063 str_end_url_with_slash(ls->dentry_name, &ls->dentry_name);
1064
3030baa7
NH
1065 if (ls->flags & PROCESS_DIRS) {
1066 ls->userFunc(ls);
1067 }
1068 if (strcmp(ls->dentry_name, ls->path) &&
1069 ls->flags & RECURSIVE) {
1070 remote_ls(ls->dentry_name,
1071 ls->flags,
1072 ls->userFunc,
1073 ls->userData);
1074 }
1075 } else if (ls->flags & PROCESS_FILES) {
1076 ls->userFunc(ls);
aa1dbc98 1077 }
3030baa7 1078 } else if (!strcmp(ctx->name, DAV_PROPFIND_NAME) && ctx->cdata) {
e1f33efe
KK
1079 char *path = ctx->cdata;
1080 if (*ctx->cdata == 'h') {
1081 path = strstr(path, "//");
1082 if (path) {
1083 path = strchr(path+2, '/');
1084 }
1085 }
1086 if (path) {
dfc2dcd9
TRC
1087 const char *url = repo->url;
1088 if (repo->path)
1089 url = repo->path;
1090 if (strncmp(path, url, repo->path_len))
82247e9b 1091 error("Parsed path '%s' does not match url: '%s'",
dfc2dcd9
TRC
1092 path, url);
1093 else {
1094 path += repo->path_len;
1095 ls->dentry_name = xstrdup(path);
1096 }
e1f33efe 1097 }
3030baa7
NH
1098 } else if (!strcmp(ctx->name, DAV_PROPFIND_COLLECTION)) {
1099 ls->dentry_flags |= IS_DIR;
aa1dbc98 1100 }
3030baa7 1101 } else if (!strcmp(ctx->name, DAV_PROPFIND_RESP)) {
6a83d902 1102 FREE_AND_NULL(ls->dentry_name);
3030baa7 1103 ls->dentry_flags = 0;
aa1dbc98 1104 }
aa1dbc98
NH
1105}
1106
20642801
JS
1107/*
1108 * NEEDSWORK: remote_ls() ignores info/refs on the remote side. But it
1109 * should _only_ heed the information from that file, instead of trying to
1110 * determine the refs from the remote file system (badly: it does not even
1111 * know about packed-refs).
1112 */
3030baa7
NH
1113static void remote_ls(const char *path, int flags,
1114 void (*userFunc)(struct remote_ls_ctx *ls),
1115 void *userData)
aa1dbc98 1116{
28310186 1117 char *url = xstrfmt("%s%s", repo->url, path);
aa1dbc98 1118 struct active_request_slot *slot;
baa7b67d 1119 struct slot_results results;
028c2976
MH
1120 struct strbuf in_buffer = STRBUF_INIT;
1121 struct buffer out_buffer = { STRBUF_INIT, 0 };
8cb01e2f 1122 struct curl_slist *dav_headers = http_copy_default_headers();
aa1dbc98 1123 struct xml_ctx ctx;
3030baa7
NH
1124 struct remote_ls_ctx ls;
1125
1126 ls.flags = flags;
9befac47 1127 ls.path = xstrdup(path);
3030baa7
NH
1128 ls.dentry_name = NULL;
1129 ls.dentry_flags = 0;
1130 ls.userData = userData;
1131 ls.userFunc = userFunc;
aa1dbc98 1132
02962d36 1133 strbuf_addstr(&out_buffer.buf, PROPFIND_ALL_REQUEST);
aa1dbc98
NH
1134
1135 dav_headers = curl_slist_append(dav_headers, "Depth: 1");
1136 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1137
1138 slot = get_active_slot();
baa7b67d 1139 slot->results = &results;
ebaaf316
DM
1140 curl_setup_http(slot->curl, url, DAV_PROPFIND,
1141 &out_buffer, fwrite_buffer);
aa1dbc98 1142 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
ebaaf316 1143 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
aa1dbc98
NH
1144
1145 if (start_active_slot(slot)) {
1146 run_active_slot(slot);
baa7b67d 1147 if (results.curl_result == CURLE_OK) {
472b2570
MH
1148 XML_Parser parser = XML_ParserCreate(NULL);
1149 enum XML_Status result;
aa1dbc98
NH
1150 ctx.name = xcalloc(10, 1);
1151 ctx.len = 0;
1152 ctx.cdata = NULL;
3030baa7
NH
1153 ctx.userFunc = handle_remote_ls_ctx;
1154 ctx.userData = &ls;
aa1dbc98
NH
1155 XML_SetUserData(parser, &ctx);
1156 XML_SetElementHandler(parser, xml_start_tag,
1157 xml_end_tag);
1158 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
1159 result = XML_Parse(parser, in_buffer.buf,
1160 in_buffer.len, 1);
aa1dbc98
NH
1161 free(ctx.name);
1162
1163 if (result != XML_STATUS_OK) {
1164 fprintf(stderr, "XML error: %s\n",
1165 XML_ErrorString(
1166 XML_GetErrorCode(parser)));
1167 }
472b2570 1168 XML_ParserFree(parser);
aa1dbc98
NH
1169 }
1170 } else {
3030baa7 1171 fprintf(stderr, "Unable to start PROPFIND request\n");
aa1dbc98
NH
1172 }
1173
3030baa7 1174 free(ls.path);
aa1dbc98 1175 free(url);
028c2976
MH
1176 strbuf_release(&out_buffer.buf);
1177 strbuf_release(&in_buffer);
aa1dbc98
NH
1178 curl_slist_free_all(dav_headers);
1179}
1180
3030baa7
NH
1181static void get_remote_object_list(unsigned char parent)
1182{
1183 char path[] = "objects/XX/";
1184 static const char hex[] = "0123456789abcdef";
1185 unsigned int val = parent;
1186
1187 path[8] = hex[val >> 4];
1188 path[9] = hex[val & 0xf];
1189 remote_dir_exists[val] = 0;
1190 remote_ls(path, (PROCESS_FILES | PROCESS_DIRS),
1191 process_ls_object, &val);
1192}
1193
acf59575 1194static int locking_available(void)
58e60dd2
NH
1195{
1196 struct active_request_slot *slot;
baa7b67d 1197 struct slot_results results;
028c2976
MH
1198 struct strbuf in_buffer = STRBUF_INIT;
1199 struct buffer out_buffer = { STRBUF_INIT, 0 };
8cb01e2f 1200 struct curl_slist *dav_headers = http_copy_default_headers();
acf59575
NH
1201 struct xml_ctx ctx;
1202 int lock_flags = 0;
519d05be 1203 char *escaped;
58e60dd2 1204
519d05be
MH
1205 escaped = xml_entities(repo->url);
1206 strbuf_addf(&out_buffer.buf, PROPFIND_SUPPORTEDLOCK_REQUEST, escaped);
1207 free(escaped);
58e60dd2
NH
1208
1209 dav_headers = curl_slist_append(dav_headers, "Depth: 0");
1210 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
baa7b67d 1211
58e60dd2 1212 slot = get_active_slot();
baa7b67d 1213 slot->results = &results;
ebaaf316
DM
1214 curl_setup_http(slot->curl, repo->url, DAV_PROPFIND,
1215 &out_buffer, fwrite_buffer);
58e60dd2 1216 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
ebaaf316 1217 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
58e60dd2
NH
1218
1219 if (start_active_slot(slot)) {
1220 run_active_slot(slot);
baa7b67d 1221 if (results.curl_result == CURLE_OK) {
472b2570
MH
1222 XML_Parser parser = XML_ParserCreate(NULL);
1223 enum XML_Status result;
acf59575
NH
1224 ctx.name = xcalloc(10, 1);
1225 ctx.len = 0;
1226 ctx.cdata = NULL;
1227 ctx.userFunc = handle_lockprop_ctx;
1228 ctx.userData = &lock_flags;
1229 XML_SetUserData(parser, &ctx);
1230 XML_SetElementHandler(parser, xml_start_tag,
1231 xml_end_tag);
028c2976
MH
1232 result = XML_Parse(parser, in_buffer.buf,
1233 in_buffer.len, 1);
acf59575
NH
1234 free(ctx.name);
1235
1236 if (result != XML_STATUS_OK) {
1237 fprintf(stderr, "XML error: %s\n",
1238 XML_ErrorString(
1239 XML_GetErrorCode(parser)));
1240 lock_flags = 0;
1241 }
472b2570 1242 XML_ParserFree(parser);
325ce395 1243 if (!lock_flags)
d5c87cb4 1244 error("no DAV locking support on %s",
7b5201a6 1245 repo->url);
325ce395
JH
1246
1247 } else {
1248 error("Cannot access URL %s, return code %d",
7b5201a6 1249 repo->url, results.curl_result);
325ce395 1250 lock_flags = 0;
58e60dd2 1251 }
58e60dd2 1252 } else {
7b5201a6 1253 error("Unable to start PROPFIND request on %s", repo->url);
58e60dd2
NH
1254 }
1255
028c2976
MH
1256 strbuf_release(&out_buffer.buf);
1257 strbuf_release(&in_buffer);
acf59575
NH
1258 curl_slist_free_all(dav_headers);
1259
1260 return lock_flags;
58e60dd2
NH
1261}
1262
b5bf7cd6 1263static struct object_list **add_one_object(struct object *obj, struct object_list **p)
1f1e895f
LT
1264{
1265 struct object_list *entry = xmalloc(sizeof(struct object_list));
1266 entry->item = obj;
1267 entry->next = *p;
1268 *p = entry;
1269 return &entry->next;
1270}
1271
aa1dbc98 1272static struct object_list **process_blob(struct blob *blob,
41595938 1273 struct object_list **p)
58e60dd2 1274{
aa1dbc98 1275 struct object *obj = &blob->object;
58e60dd2 1276
aa1dbc98
NH
1277 obj->flags |= LOCAL;
1278
1279 if (obj->flags & (UNINTERESTING | SEEN))
1280 return p;
1281
1282 obj->flags |= SEEN;
1f1e895f 1283 return add_one_object(obj, p);
aa1dbc98
NH
1284}
1285
1286static struct object_list **process_tree(struct tree *tree,
41595938 1287 struct object_list **p)
aa1dbc98
NH
1288{
1289 struct object *obj = &tree->object;
2d9c58c6 1290 struct tree_desc desc;
4c068a98 1291 struct name_entry entry;
aa1dbc98
NH
1292
1293 obj->flags |= LOCAL;
1294
1295 if (obj->flags & (UNINTERESTING | SEEN))
1296 return p;
1297 if (parse_tree(tree) < 0)
f2fd0760 1298 die("bad tree object %s", oid_to_hex(&obj->oid));
aa1dbc98
NH
1299
1300 obj->flags |= SEEN;
1f1e895f 1301 p = add_one_object(obj, p);
2d9c58c6 1302
6fda5e51 1303 init_tree_desc(&desc, tree->buffer, tree->size);
2d9c58c6 1304
1bbeb4c6
JS
1305 while (tree_entry(&desc, &entry))
1306 switch (object_type(entry.mode)) {
1307 case OBJ_TREE:
740ee055 1308 p = process_tree(lookup_tree(entry.oid), p);
1bbeb4c6
JS
1309 break;
1310 case OBJ_BLOB:
3aca1fc6 1311 p = process_blob(lookup_blob(entry.oid), p);
1bbeb4c6
JS
1312 break;
1313 default:
1314 /* Subproject commit - not in this repository */
1315 break;
1316 }
1317
6e454b9a 1318 free_tree_buffer(tree);
aa1dbc98 1319 return p;
58e60dd2
NH
1320}
1321
1a703cba 1322static int get_delta(struct rev_info *revs, struct remote_lock *lock)
58e60dd2 1323{
1f1e895f 1324 int i;
58e60dd2 1325 struct commit *commit;
1f1e895f 1326 struct object_list **p = &objects;
1a703cba 1327 int count = 0;
58e60dd2 1328
aa1dbc98 1329 while ((commit = get_revision(revs)) != NULL) {
41595938 1330 p = process_tree(commit->tree, p);
aa1dbc98
NH
1331 commit->object.flags |= LOCAL;
1332 if (!(commit->object.flags & UNINTERESTING))
1a703cba 1333 count += add_send_request(&commit->object, lock);
aa1dbc98 1334 }
58e60dd2 1335
1f1e895f
LT
1336 for (i = 0; i < revs->pending.nr; i++) {
1337 struct object_array_entry *entry = revs->pending.objects + i;
1338 struct object *obj = entry->item;
1339 const char *name = entry->name;
58e60dd2 1340
aa1dbc98
NH
1341 if (obj->flags & (UNINTERESTING | SEEN))
1342 continue;
1974632c 1343 if (obj->type == OBJ_TAG) {
aa1dbc98 1344 obj->flags |= SEEN;
1f1e895f 1345 p = add_one_object(obj, p);
aa1dbc98 1346 continue;
58e60dd2 1347 }
1974632c 1348 if (obj->type == OBJ_TREE) {
41595938 1349 p = process_tree((struct tree *)obj, p);
aa1dbc98 1350 continue;
58e60dd2 1351 }
1974632c 1352 if (obj->type == OBJ_BLOB) {
41595938 1353 p = process_blob((struct blob *)obj, p);
aa1dbc98 1354 continue;
58e60dd2 1355 }
f2fd0760 1356 die("unknown pending object %s (%s)", oid_to_hex(&obj->oid), name);
aa1dbc98
NH
1357 }
1358
1359 while (objects) {
1360 if (!(objects->item->flags & UNINTERESTING))
1a703cba 1361 count += add_send_request(objects->item, lock);
aa1dbc98 1362 objects = objects->next;
58e60dd2 1363 }
1a703cba
NH
1364
1365 return count;
58e60dd2
NH
1366}
1367
aa1dbc98 1368static int update_remote(unsigned char *sha1, struct remote_lock *lock)
58e60dd2
NH
1369{
1370 struct active_request_slot *slot;
baa7b67d 1371 struct slot_results results;
028c2976 1372 struct buffer out_buffer = { STRBUF_INIT, 0 };
b1c7d4aa 1373 struct curl_slist *dav_headers;
58e60dd2 1374
b1c7d4aa 1375 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF);
58e60dd2 1376
028c2976 1377 strbuf_addf(&out_buffer.buf, "%s\n", sha1_to_hex(sha1));
58e60dd2
NH
1378
1379 slot = get_active_slot();
baa7b67d 1380 slot->results = &results;
ebaaf316
DM
1381 curl_setup_http(slot->curl, lock->url, DAV_PUT,
1382 &out_buffer, fwrite_null);
58e60dd2 1383 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
58e60dd2
NH
1384
1385 if (start_active_slot(slot)) {
1386 run_active_slot(slot);
028c2976 1387 strbuf_release(&out_buffer.buf);
baa7b67d 1388 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1389 fprintf(stderr,
1390 "PUT error: curl result=%d, HTTP code=%ld\n",
baa7b67d 1391 results.curl_result, results.http_code);
58e60dd2
NH
1392 /* We should attempt recovery? */
1393 return 0;
1394 }
1395 } else {
028c2976 1396 strbuf_release(&out_buffer.buf);
58e60dd2
NH
1397 fprintf(stderr, "Unable to start PUT request\n");
1398 return 0;
1399 }
1400
1401 return 1;
1402}
1403
6d2bf96e 1404static struct ref *remote_refs;
aa1dbc98 1405
2aab167a 1406static void one_remote_ref(const char *refname)
aa1dbc98
NH
1407{
1408 struct ref *ref;
197e8951 1409 struct object *obj;
aa1dbc98 1410
59c69c0c 1411 ref = alloc_ref(refname);
c13b2633 1412
7b5201a6 1413 if (http_fetch_ref(repo->url, ref) != 0) {
aa1dbc98
NH
1414 fprintf(stderr,
1415 "Unable to fetch ref %s from %s\n",
7b5201a6 1416 refname, repo->url);
c13b2633 1417 free(ref);
aa1dbc98
NH
1418 return;
1419 }
1420
197e8951
NH
1421 /*
1422 * Fetch a copy of the object if it doesn't exist locally - it
1423 * may be required for updating server info later.
1424 */
f4e54d02 1425 if (repo->can_update_info_refs && !has_object_file(&ref->old_oid)) {
1426 obj = lookup_unknown_object(ref->old_oid.hash);
e94eac49
RS
1427 fprintf(stderr, " fetch %s for %s\n",
1428 oid_to_hex(&ref->old_oid), refname);
1429 add_fetch_request(obj);
197e8951
NH
1430 }
1431
6d2bf96e
CB
1432 ref->next = remote_refs;
1433 remote_refs = ref;
aa1dbc98
NH
1434}
1435
aa1dbc98
NH
1436static void get_dav_remote_heads(void)
1437{
3030baa7 1438 remote_ls("refs/", (PROCESS_FILES | PROCESS_DIRS | RECURSIVE), process_ls_ref, NULL);
aa1dbc98
NH
1439}
1440
197e8951
NH
1441static void add_remote_info_ref(struct remote_ls_ctx *ls)
1442{
028c2976 1443 struct strbuf *buf = (struct strbuf *)ls->userData;
197e8951 1444 struct object *o;
c13b2633
DB
1445 struct ref *ref;
1446
59c69c0c 1447 ref = alloc_ref(ls->dentry_name);
197e8951 1448
7b5201a6 1449 if (http_fetch_ref(repo->url, ref) != 0) {
197e8951
NH
1450 fprintf(stderr,
1451 "Unable to fetch ref %s from %s\n",
7b5201a6 1452 ls->dentry_name, repo->url);
197e8951 1453 aborted = 1;
c13b2633 1454 free(ref);
197e8951
NH
1455 return;
1456 }
1457
c251c83d 1458 o = parse_object(&ref->old_oid);
197e8951
NH
1459 if (!o) {
1460 fprintf(stderr,
1461 "Unable to parse object %s for remote ref %s\n",
f4e54d02 1462 oid_to_hex(&ref->old_oid), ls->dentry_name);
197e8951 1463 aborted = 1;
c13b2633 1464 free(ref);
197e8951
NH
1465 return;
1466 }
1467
7d0581a9 1468 strbuf_addf(buf, "%s\t%s\n",
f4e54d02 1469 oid_to_hex(&ref->old_oid), ls->dentry_name);
197e8951 1470
1974632c 1471 if (o->type == OBJ_TAG) {
197e8951 1472 o = deref_tag(o, ls->dentry_name, 0);
7d0581a9
JK
1473 if (o)
1474 strbuf_addf(buf, "%s\t%s^{}\n",
f2fd0760 1475 oid_to_hex(&o->oid), ls->dentry_name);
197e8951 1476 }
c13b2633 1477 free(ref);
197e8951
NH
1478}
1479
1480static void update_remote_info_refs(struct remote_lock *lock)
1481{
028c2976 1482 struct buffer buffer = { STRBUF_INIT, 0 };
197e8951
NH
1483 struct active_request_slot *slot;
1484 struct slot_results results;
b1c7d4aa 1485 struct curl_slist *dav_headers;
197e8951 1486
197e8951 1487 remote_ls("refs/", (PROCESS_FILES | RECURSIVE),
028c2976 1488 add_remote_info_ref, &buffer.buf);
197e8951 1489 if (!aborted) {
b1c7d4aa 1490 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF);
197e8951
NH
1491
1492 slot = get_active_slot();
1493 slot->results = &results;
ebaaf316
DM
1494 curl_setup_http(slot->curl, lock->url, DAV_PUT,
1495 &buffer, fwrite_null);
197e8951 1496 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
197e8951 1497
197e8951
NH
1498 if (start_active_slot(slot)) {
1499 run_active_slot(slot);
1500 if (results.curl_result != CURLE_OK) {
1501 fprintf(stderr,
1502 "PUT error: curl result=%d, HTTP code=%ld\n",
1503 results.curl_result, results.http_code);
1504 }
1505 }
197e8951 1506 }
028c2976 1507 strbuf_release(&buffer.buf);
197e8951
NH
1508}
1509
1510static int remote_exists(const char *path)
1511{
28310186 1512 char *url = xstrfmt("%s%s", repo->url, path);
446b941a 1513 int ret;
197e8951 1514
197e8951 1515
1bbcc224 1516 switch (http_get_strbuf(url, NULL, NULL)) {
446b941a
MH
1517 case HTTP_OK:
1518 ret = 1;
1519 break;
1520 case HTTP_MISSING_TARGET:
1521 ret = 0;
1522 break;
1523 case HTTP_ERROR:
4df13f69 1524 error("unable to access '%s': %s", url, curl_errorstr);
446b941a
MH
1525 default:
1526 ret = -1;
197e8951 1527 }
3a462bc9
MH
1528 free(url);
1529 return ret;
197e8951
NH
1530}
1531
8eb94600 1532static void fetch_symref(const char *path, char **symref, struct object_id *oid)
3dfaf7bc 1533{
28310186 1534 char *url = xstrfmt("%s%s", repo->url, path);
028c2976 1535 struct strbuf buffer = STRBUF_INIT;
ae021d87 1536 const char *name;
3dfaf7bc 1537
1bbcc224 1538 if (http_get_strbuf(url, &buffer, NULL) != HTTP_OK)
9af5abd9
MH
1539 die("Couldn't get %s for remote symref\n%s", url,
1540 curl_errorstr);
3dfaf7bc
NH
1541 free(url);
1542
6a83d902 1543 FREE_AND_NULL(*symref);
8eb94600 1544 oidclr(oid);
3dfaf7bc 1545
028c2976 1546 if (buffer.len == 0)
3dfaf7bc
NH
1547 return;
1548
f6786c8d
JK
1549 /* Cut off trailing newline. */
1550 strbuf_rtrim(&buffer);
1551
3dfaf7bc 1552 /* If it's a symref, set the refname; otherwise try for a sha1 */
ae021d87
JK
1553 if (skip_prefix(buffer.buf, "ref: ", &name)) {
1554 *symref = xmemdupz(name, buffer.len - (name - buffer.buf));
3dfaf7bc 1555 } else {
8eb94600 1556 get_oid_hex(buffer.buf, oid);
3dfaf7bc
NH
1557 }
1558
028c2976 1559 strbuf_release(&buffer);
3dfaf7bc
NH
1560}
1561
8eb94600 1562static int verify_merge_base(struct object_id *head_oid, struct ref *remote)
3dfaf7bc 1563{
bc83266a 1564 struct commit *head = lookup_commit_or_die(head_oid, "HEAD");
1565 struct commit *branch = lookup_commit_or_die(&remote->old_oid,
1566 remote->name);
3dfaf7bc 1567
65712251 1568 return in_merge_bases(branch, head);
3dfaf7bc
NH
1569}
1570
2aab167a 1571static int delete_remote_branch(const char *pattern, int force)
3dfaf7bc
NH
1572{
1573 struct ref *refs = remote_refs;
1574 struct ref *remote_ref = NULL;
8eb94600 1575 struct object_id head_oid;
3dfaf7bc
NH
1576 char *symref = NULL;
1577 int match;
1578 int patlen = strlen(pattern);
1579 int i;
1580 struct active_request_slot *slot;
1581 struct slot_results results;
1582 char *url;
1583
1584 /* Find the remote branch(es) matching the specified branch name */
1585 for (match = 0; refs; refs = refs->next) {
1586 char *name = refs->name;
1587 int namelen = strlen(name);
1588 if (namelen < patlen ||
1589 memcmp(name + namelen - patlen, pattern, patlen))
1590 continue;
1591 if (namelen != patlen && name[namelen - patlen - 1] != '/')
1592 continue;
1593 match++;
1594 remote_ref = refs;
1595 }
1596 if (match == 0)
1597 return error("No remote branch matches %s", pattern);
1598 if (match != 1)
1599 return error("More than one remote branch matches %s",
1600 pattern);
1601
1602 /*
1603 * Remote HEAD must be a symref (not exactly foolproof; a remote
1604 * symlink to a symref will look like a symref)
1605 */
8eb94600 1606 fetch_symref("HEAD", &symref, &head_oid);
3dfaf7bc
NH
1607 if (!symref)
1608 return error("Remote HEAD is not a symref");
1609
1610 /* Remote branch must not be the remote HEAD */
cd2b8ae9 1611 for (i = 0; symref && i < MAXDEPTH; i++) {
3dfaf7bc
NH
1612 if (!strcmp(remote_ref->name, symref))
1613 return error("Remote branch %s is the current HEAD",
1614 remote_ref->name);
8eb94600 1615 fetch_symref(symref, &symref, &head_oid);
3dfaf7bc
NH
1616 }
1617
1618 /* Run extra sanity checks if delete is not forced */
1619 if (!force) {
1620 /* Remote HEAD must resolve to a known object */
1621 if (symref)
1622 return error("Remote HEAD symrefs too deep");
8eb94600 1623 if (is_null_oid(&head_oid))
3dfaf7bc 1624 return error("Unable to resolve remote HEAD");
8eb94600 1625 if (!has_object_file(&head_oid))
1626 return error("Remote HEAD resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", oid_to_hex(&head_oid));
3dfaf7bc
NH
1627
1628 /* Remote branch must resolve to a known object */
f4e54d02 1629 if (is_null_oid(&remote_ref->old_oid))
3dfaf7bc
NH
1630 return error("Unable to resolve remote branch %s",
1631 remote_ref->name);
f4e54d02 1632 if (!has_object_file(&remote_ref->old_oid))
1633 return error("Remote branch %s resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", remote_ref->name, oid_to_hex(&remote_ref->old_oid));
3dfaf7bc
NH
1634
1635 /* Remote branch must be an ancestor of remote HEAD */
8eb94600 1636 if (!verify_merge_base(&head_oid, remote_ref)) {
00ae8289
BF
1637 return error("The branch '%s' is not an ancestor "
1638 "of your current HEAD.\n"
1639 "If you are sure you want to delete it,"
1640 " run:\n\t'git http-push -D %s %s'",
7b5201a6 1641 remote_ref->name, repo->url, pattern);
3dfaf7bc
NH
1642 }
1643 }
1644
1645 /* Send delete request */
1646 fprintf(stderr, "Removing remote branch '%s'\n", remote_ref->name);
6eaf4060
CB
1647 if (dry_run)
1648 return 0;
28310186 1649 url = xstrfmt("%s%s", repo->url, remote_ref->name);
3dfaf7bc
NH
1650 slot = get_active_slot();
1651 slot->results = &results;
ebaaf316 1652 curl_setup_http_get(slot->curl, url, DAV_DELETE);
3dfaf7bc
NH
1653 if (start_active_slot(slot)) {
1654 run_active_slot(slot);
1655 free(url);
1656 if (results.curl_result != CURLE_OK)
82247e9b 1657 return error("DELETE request failed (%d/%ld)",
3dfaf7bc
NH
1658 results.curl_result, results.http_code);
1659 } else {
1660 free(url);
1661 return error("Unable to start DELETE request");
1662 }
1663
1664 return 0;
1665}
1666
2af202be 1667static void run_request_queue(void)
4f66250d
TRC
1668{
1669#ifdef USE_CURL_MULTI
1670 is_running_queue = 1;
1671 fill_active_slots();
1672 add_fill_function(NULL, fill_active_slot);
1673#endif
1674 do {
1675 finish_all_active_slots();
1676#ifdef USE_CURL_MULTI
1677 fill_active_slots();
1678#endif
1679 } while (request_queue_head && !aborted);
1680
1681#ifdef USE_CURL_MULTI
1682 is_running_queue = 0;
1683#endif
1684}
1685
3f2e2297 1686int cmd_main(int argc, const char **argv)
58e60dd2 1687{
58e60dd2
NH
1688 struct transfer_request *request;
1689 struct transfer_request *next_request;
1690 int nr_refspec = 0;
3f2e2297 1691 const char **refspec = NULL;
512d632c 1692 struct remote_lock *ref_lock = NULL;
197e8951 1693 struct remote_lock *info_ref_lock = NULL;
aa1dbc98 1694 struct rev_info revs;
3dfaf7bc
NH
1695 int delete_branch = 0;
1696 int force_delete = 0;
1a703cba 1697 int objects_to_send;
58e60dd2
NH
1698 int rc = 0;
1699 int i;
8c9e7947 1700 int new_refs;
454e2025 1701 struct ref *ref, *local_refs;
58e60dd2 1702
f3d51ffd 1703 repo = xcalloc(1, sizeof(*repo));
58e60dd2
NH
1704
1705 argv++;
1706 for (i = 1; i < argc; i++, argv++) {
3f2e2297 1707 const char *arg = *argv;
58e60dd2
NH
1708
1709 if (*arg == '-') {
aa1dbc98 1710 if (!strcmp(arg, "--all")) {
28b9d6e5 1711 push_all = MATCH_REFS_ALL;
58e60dd2
NH
1712 continue;
1713 }
1714 if (!strcmp(arg, "--force")) {
1715 force_all = 1;
1716 continue;
1717 }
fe5d1d3e
SP
1718 if (!strcmp(arg, "--dry-run")) {
1719 dry_run = 1;
1720 continue;
1721 }
ae4efe19
SP
1722 if (!strcmp(arg, "--helper-status")) {
1723 helper_status = 1;
1724 continue;
1725 }
58e60dd2
NH
1726 if (!strcmp(arg, "--verbose")) {
1727 push_verbosely = 1;
e9176745 1728 http_is_verbose = 1;
58e60dd2
NH
1729 continue;
1730 }
3dfaf7bc
NH
1731 if (!strcmp(arg, "-d")) {
1732 delete_branch = 1;
1733 continue;
1734 }
1735 if (!strcmp(arg, "-D")) {
1736 delete_branch = 1;
1737 force_delete = 1;
1738 continue;
1739 }
548d3464
JN
1740 if (!strcmp(arg, "-h"))
1741 usage(http_push_usage);
58e60dd2 1742 }
7b5201a6 1743 if (!repo->url) {
aa1dbc98 1744 char *path = strstr(arg, "//");
1462d1af
TRC
1745 str_end_url_with_slash(arg, &repo->url);
1746 repo->path_len = strlen(repo->url);
aa1dbc98 1747 if (path) {
7b5201a6
AK
1748 repo->path = strchr(path+2, '/');
1749 if (repo->path)
1750 repo->path_len = strlen(repo->path);
aa1dbc98 1751 }
58e60dd2
NH
1752 continue;
1753 }
1754 refspec = argv;
1755 nr_refspec = argc - i;
1756 break;
1757 }
1758
f854824b
GB
1759#ifndef USE_CURL_MULTI
1760 die("git-push is not available for http/https repository when not compiled with USE_CURL_MULTI");
1761#endif
1762
7b5201a6 1763 if (!repo->url)
3e9fabc8
NH
1764 usage(http_push_usage);
1765
3dfaf7bc
NH
1766 if (delete_branch && nr_refspec != 1)
1767 die("You must specify only one branch name when deleting a remote branch");
1768
548d3464
JN
1769 setup_git_directory();
1770
aa1dbc98 1771 memset(remote_dir_exists, -1, 256);
0dd276b8 1772
a4ddbc33 1773 http_init(NULL, repo->url, 1);
58e60dd2 1774
68862a31 1775#ifdef USE_CURL_MULTI
4f66250d 1776 is_running_queue = 0;
68862a31 1777#endif
4f66250d 1778
58e60dd2 1779 /* Verify DAV compliance/lock support */
acf59575 1780 if (!locking_available()) {
58e60dd2
NH
1781 rc = 1;
1782 goto cleanup;
1783 }
1784
57b235a4 1785 sigchain_push_common(remove_locks_on_signal);
6a491a17 1786
197e8951 1787 /* Check whether the remote has server info files */
7b5201a6
AK
1788 repo->can_update_info_refs = 0;
1789 repo->has_info_refs = remote_exists("info/refs");
1790 repo->has_info_packs = remote_exists("objects/info/packs");
1791 if (repo->has_info_refs) {
197e8951
NH
1792 info_ref_lock = lock_remote("info/refs", LOCK_TIME);
1793 if (info_ref_lock)
7b5201a6 1794 repo->can_update_info_refs = 1;
9bdbabad 1795 else {
d5c87cb4 1796 error("cannot lock existing info/refs");
9bdbabad
GB
1797 rc = 1;
1798 goto cleanup;
1799 }
197e8951 1800 }
7b5201a6 1801 if (repo->has_info_packs)
197e8951
NH
1802 fetch_indices();
1803
aa1dbc98 1804 /* Get a list of all local and remote heads to validate refspecs */
454e2025 1805 local_refs = get_local_heads();
aa1dbc98
NH
1806 fprintf(stderr, "Fetching remote heads...\n");
1807 get_dav_remote_heads();
4f66250d 1808 run_request_queue();
aa1dbc98 1809
3dfaf7bc
NH
1810 /* Remove a remote branch if -d or -D was specified */
1811 if (delete_branch) {
ae4efe19 1812 if (delete_remote_branch(refspec[0], force_delete) == -1) {
3dfaf7bc
NH
1813 fprintf(stderr, "Unable to delete remote branch %s\n",
1814 refspec[0]);
ae4efe19
SP
1815 if (helper_status)
1816 printf("error %s cannot remove\n", refspec[0]);
1817 }
3dfaf7bc
NH
1818 goto cleanup;
1819 }
1820
aa1dbc98 1821 /* match them up */
29753cdd
JH
1822 if (match_push_refs(local_refs, &remote_refs,
1823 nr_refspec, (const char **) refspec, push_all)) {
9116de59
GB
1824 rc = -1;
1825 goto cleanup;
1826 }
aa1dbc98
NH
1827 if (!remote_refs) {
1828 fprintf(stderr, "No refs in common and none specified; doing nothing.\n");
ae4efe19
SP
1829 if (helper_status)
1830 printf("error null no match\n");
9116de59
GB
1831 rc = 0;
1832 goto cleanup;
aa1dbc98
NH
1833 }
1834
8c9e7947 1835 new_refs = 0;
aa1dbc98 1836 for (ref = remote_refs; ref; ref = ref->next) {
a0355f6b 1837 struct argv_array commit_argv = ARGV_ARRAY_INIT;
8c9e7947 1838
aa1dbc98
NH
1839 if (!ref->peer_ref)
1840 continue;
6eaf4060 1841
f4e54d02 1842 if (is_null_oid(&ref->peer_ref->new_oid)) {
6eaf4060
CB
1843 if (delete_remote_branch(ref->name, 1) == -1) {
1844 error("Could not remove %s", ref->name);
ae4efe19
SP
1845 if (helper_status)
1846 printf("error %s cannot remove\n", ref->name);
6eaf4060
CB
1847 rc = -4;
1848 }
ae4efe19
SP
1849 else if (helper_status)
1850 printf("ok %s\n", ref->name);
6eaf4060
CB
1851 new_refs++;
1852 continue;
1853 }
1854
f4e54d02 1855 if (!oidcmp(&ref->old_oid, &ref->peer_ref->new_oid)) {
b5e59989 1856 if (push_verbosely)
aa1dbc98 1857 fprintf(stderr, "'%s': up-to-date\n", ref->name);
ae4efe19
SP
1858 if (helper_status)
1859 printf("ok %s up to date\n", ref->name);
aa1dbc98
NH
1860 continue;
1861 }
1862
1863 if (!force_all &&
f4e54d02 1864 !is_null_oid(&ref->old_oid) &&
aa1dbc98 1865 !ref->force) {
f4e54d02 1866 if (!has_object_file(&ref->old_oid) ||
6f3d57b6 1867 !ref_newer(&ref->peer_ref->new_oid,
1868 &ref->old_oid)) {
00ae8289
BF
1869 /*
1870 * We do not have the remote ref, or
aa1dbc98
NH
1871 * we know that the remote ref is not
1872 * an ancestor of what we are trying to
1873 * push. Either way this can be losing
1874 * commits at the remote end and likely
1875 * we were not up to date to begin with.
1876 */
00ae8289
BF
1877 error("remote '%s' is not an ancestor of\n"
1878 "local '%s'.\n"
1879 "Maybe you are not up-to-date and "
aa1dbc98
NH
1880 "need to pull first?",
1881 ref->name,
1882 ref->peer_ref->name);
ae4efe19
SP
1883 if (helper_status)
1884 printf("error %s non-fast forward\n", ref->name);
1a703cba 1885 rc = -2;
aa1dbc98
NH
1886 continue;
1887 }
58e60dd2 1888 }
f4e54d02 1889 oidcpy(&ref->new_oid, &ref->peer_ref->new_oid);
aa1dbc98 1890 new_refs++;
aa1dbc98
NH
1891
1892 fprintf(stderr, "updating '%s'", ref->name);
1893 if (strcmp(ref->name, ref->peer_ref->name))
1894 fprintf(stderr, " using '%s'", ref->peer_ref->name);
2b87d3a8 1895 fprintf(stderr, "\n from %s\n to %s\n",
f4e54d02 1896 oid_to_hex(&ref->old_oid), oid_to_hex(&ref->new_oid));
ae4efe19
SP
1897 if (dry_run) {
1898 if (helper_status)
1899 printf("ok %s\n", ref->name);
fe5d1d3e 1900 continue;
ae4efe19 1901 }
58e60dd2
NH
1902
1903 /* Lock remote branch ref */
aa1dbc98
NH
1904 ref_lock = lock_remote(ref->name, LOCK_TIME);
1905 if (ref_lock == NULL) {
58e60dd2 1906 fprintf(stderr, "Unable to lock remote branch %s\n",
aa1dbc98 1907 ref->name);
ae4efe19
SP
1908 if (helper_status)
1909 printf("error %s lock error\n", ref->name);
58e60dd2
NH
1910 rc = 1;
1911 continue;
1912 }
1913
aa1dbc98 1914 /* Set up revision info for this refspec */
a0355f6b
JK
1915 argv_array_push(&commit_argv, ""); /* ignored */
1916 argv_array_push(&commit_argv, "--objects");
f4e54d02 1917 argv_array_push(&commit_argv, oid_to_hex(&ref->new_oid));
1918 if (!push_all && !is_null_oid(&ref->old_oid))
a0355f6b 1919 argv_array_pushf(&commit_argv, "^%s",
f4e54d02 1920 oid_to_hex(&ref->old_oid));
db6296a5 1921 init_revisions(&revs, setup_git_directory());
a0355f6b 1922 setup_revisions(commit_argv.argc, commit_argv.argv, &revs, NULL);
d633c882 1923 revs.edge_hint = 0; /* just in case */
58e60dd2 1924
aa1dbc98 1925 /* Generate a list of objects that need to be pushed */
58e60dd2 1926 pushing = 0;
3d51e1b5
MK
1927 if (prepare_revision_walk(&revs))
1928 die("revision walk setup failed");
e76a5fb4 1929 mark_edges_uninteresting(&revs, NULL);
1a703cba 1930 objects_to_send = get_delta(&revs, ref_lock);
29508e1e 1931 finish_all_active_slots();
58e60dd2
NH
1932
1933 /* Push missing objects to remote, this would be a
1934 convenient time to pack them first if appropriate. */
1935 pushing = 1;
1a703cba
NH
1936 if (objects_to_send)
1937 fprintf(stderr, " sending %d objects\n",
1938 objects_to_send);
4f66250d
TRC
1939
1940 run_request_queue();
58e60dd2
NH
1941
1942 /* Update the remote branch if all went well */
f4e54d02 1943 if (aborted || !update_remote(ref->new_oid.hash, ref_lock))
aa1dbc98 1944 rc = 1;
58e60dd2 1945
aa1dbc98
NH
1946 if (!rc)
1947 fprintf(stderr, " done\n");
ae4efe19
SP
1948 if (helper_status)
1949 printf("%s %s\n", !rc ? "ok" : "error", ref->name);
aa1dbc98 1950 unlock_remote(ref_lock);
512d632c 1951 check_locks();
a0355f6b 1952 argv_array_clear(&commit_argv);
58e60dd2
NH
1953 }
1954
197e8951 1955 /* Update remote server info if appropriate */
7b5201a6
AK
1956 if (repo->has_info_refs && new_refs) {
1957 if (info_ref_lock && repo->can_update_info_refs) {
197e8951 1958 fprintf(stderr, "Updating remote server info\n");
fe5d1d3e
SP
1959 if (!dry_run)
1960 update_remote_info_refs(info_ref_lock);
197e8951
NH
1961 } else {
1962 fprintf(stderr, "Unable to update server info\n");
1963 }
1964 }
197e8951 1965
58e60dd2 1966 cleanup:
9116de59
GB
1967 if (info_ref_lock)
1968 unlock_remote(info_ref_lock);
7b5201a6 1969 free(repo);
58e60dd2 1970
29508e1e 1971 http_cleanup();
58e60dd2
NH
1972
1973 request = request_queue_head;
1974 while (request != NULL) {
1975 next_request = request->next;
1976 release_request(request);
58e60dd2
NH
1977 request = next_request;
1978 }
1979
58e60dd2
NH
1980 return rc;
1981}