]> git.ipfire.org Git - thirdparty/git.git/blame - http-push.c
Reset the signal being handled
[thirdparty/git.git] / http-push.c
CommitLineData
58e60dd2
NH
1#include "cache.h"
2#include "commit.h"
3#include "pack.h"
58e60dd2
NH
4#include "tag.h"
5#include "blob.h"
29508e1e 6#include "http.h"
aa1dbc98 7#include "refs.h"
c4e05b1a 8#include "diff.h"
aa1dbc98 9#include "revision.h"
3dfaf7bc 10#include "exec_cmd.h"
6b62816c 11#include "remote.h"
29508e1e 12
bee8e79d 13#include <expat.h>
58e60dd2
NH
14
15static const char http_push_usage[] =
fe5d1d3e 16"git-http-push [--all] [--dry-run] [--force] [--verbose] <remote> [<head>...]\n";
58e60dd2 17
92e2eb9c
JS
18#ifndef XML_STATUS_OK
19enum XML_Status {
20 XML_STATUS_OK = 1,
21 XML_STATUS_ERROR = 0
22};
23#define XML_STATUS_OK 1
24#define XML_STATUS_ERROR 0
25#endif
26
197e8951 27#define PREV_BUF_SIZE 4096
58e60dd2
NH
28#define RANGE_HEADER_SIZE 30
29
acf59575 30/* DAV methods */
58e60dd2
NH
31#define DAV_LOCK "LOCK"
32#define DAV_MKCOL "MKCOL"
33#define DAV_MOVE "MOVE"
34#define DAV_PROPFIND "PROPFIND"
35#define DAV_PUT "PUT"
36#define DAV_UNLOCK "UNLOCK"
3dfaf7bc 37#define DAV_DELETE "DELETE"
acf59575
NH
38
39/* DAV lock flags */
40#define DAV_PROP_LOCKWR (1u << 0)
41#define DAV_PROP_LOCKEX (1u << 1)
42#define DAV_LOCK_OK (1u << 2)
43
44/* DAV XML properties */
45#define DAV_CTX_LOCKENTRY ".multistatus.response.propstat.prop.supportedlock.lockentry"
46#define DAV_CTX_LOCKTYPE_WRITE ".multistatus.response.propstat.prop.supportedlock.lockentry.locktype.write"
47#define DAV_CTX_LOCKTYPE_EXCLUSIVE ".multistatus.response.propstat.prop.supportedlock.lockentry.lockscope.exclusive"
48#define DAV_ACTIVELOCK_OWNER ".prop.lockdiscovery.activelock.owner.href"
49#define DAV_ACTIVELOCK_TIMEOUT ".prop.lockdiscovery.activelock.timeout"
50#define DAV_ACTIVELOCK_TOKEN ".prop.lockdiscovery.activelock.locktoken.href"
aa1dbc98
NH
51#define DAV_PROPFIND_RESP ".multistatus.response"
52#define DAV_PROPFIND_NAME ".multistatus.response.href"
53#define DAV_PROPFIND_COLLECTION ".multistatus.response.propstat.prop.resourcetype.collection"
acf59575
NH
54
55/* DAV request body templates */
aa1dbc98
NH
56#define PROPFIND_SUPPORTEDLOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:prop xmlns:R=\"%s\">\n<D:supportedlock/>\n</D:prop>\n</D:propfind>"
57#define PROPFIND_ALL_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:allprop/>\n</D:propfind>"
58e60dd2
NH
58#define LOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:lockinfo xmlns:D=\"DAV:\">\n<D:lockscope><D:exclusive/></D:lockscope>\n<D:locktype><D:write/></D:locktype>\n<D:owner>\n<D:href>mailto:%s</D:href>\n</D:owner>\n</D:lockinfo>"
59
75187c9d
NH
60#define LOCK_TIME 600
61#define LOCK_REFRESH 30
62
1b65a5aa 63/* bits #0-15 in revision.h */
aa1dbc98 64
1b65a5aa
JH
65#define LOCAL (1u<<16)
66#define REMOTE (1u<<17)
67#define FETCHING (1u<<18)
68#define PUSHING (1u<<19)
aa1dbc98 69
3dfaf7bc
NH
70/* We allow "recursive" symbolic refs. Only within reason, though */
71#define MAXDEPTH 5
72
96f1e58f
DR
73static int pushing;
74static int aborted;
a3c57c9a 75static signed char remote_dir_exists[256];
58e60dd2 76
58e60dd2 77static struct curl_slist *no_pragma_header;
58e60dd2 78
96f1e58f 79static int push_verbosely;
28b9d6e5 80static int push_all = MATCH_REFS_NONE;
96f1e58f 81static int force_all;
fe5d1d3e 82static int dry_run;
58e60dd2 83
96f1e58f 84static struct object_list *objects;
aa1dbc98 85
58e60dd2
NH
86struct repo
87{
88 char *url;
aa1dbc98 89 int path_len;
197e8951
NH
90 int has_info_refs;
91 int can_update_info_refs;
92 int has_info_packs;
58e60dd2 93 struct packed_git *packs;
512d632c 94 struct remote_lock *locks;
58e60dd2
NH
95};
96
96f1e58f 97static struct repo *remote;
58e60dd2
NH
98
99enum transfer_state {
197e8951
NH
100 NEED_FETCH,
101 RUN_FETCH_LOOSE,
102 RUN_FETCH_PACKED,
58e60dd2
NH
103 NEED_PUSH,
104 RUN_MKCOL,
105 RUN_PUT,
106 RUN_MOVE,
107 ABORTED,
108 COMPLETE,
109};
110
111struct transfer_request
112{
aa1dbc98 113 struct object *obj;
58e60dd2
NH
114 char *url;
115 char *dest;
aa1dbc98 116 struct remote_lock *lock;
58e60dd2
NH
117 struct curl_slist *headers;
118 struct buffer buffer;
119 char filename[PATH_MAX];
120 char tmpfile[PATH_MAX];
197e8951
NH
121 int local_fileno;
122 FILE *local_stream;
58e60dd2
NH
123 enum transfer_state state;
124 CURLcode curl_result;
125 char errorstr[CURL_ERROR_SIZE];
126 long http_code;
127 unsigned char real_sha1[20];
128 SHA_CTX c;
129 z_stream stream;
130 int zret;
131 int rename;
197e8951 132 void *userData;
58e60dd2
NH
133 struct active_request_slot *slot;
134 struct transfer_request *next;
135};
136
96f1e58f 137static struct transfer_request *request_queue_head;
58e60dd2 138
acf59575
NH
139struct xml_ctx
140{
141 char *name;
142 int len;
143 char *cdata;
144 void (*userFunc)(struct xml_ctx *ctx, int tag_closed);
145 void *userData;
146};
147
aa1dbc98 148struct remote_lock
26349b2e 149{
75187c9d 150 char *url;
26349b2e 151 char *owner;
75187c9d 152 char *token;
26349b2e
NH
153 time_t start_time;
154 long timeout;
75187c9d 155 int refreshing;
aa1dbc98
NH
156 struct remote_lock *next;
157};
158
3030baa7
NH
159/* Flags that control remote_ls processing */
160#define PROCESS_FILES (1u << 0)
161#define PROCESS_DIRS (1u << 1)
162#define RECURSIVE (1u << 2)
163
164/* Flags that remote_ls passes to callback functions */
165#define IS_DIR (1u << 0)
166
167struct remote_ls_ctx
aa1dbc98 168{
3030baa7
NH
169 char *path;
170 void (*userFunc)(struct remote_ls_ctx *ls);
171 void *userData;
172 int flags;
173 char *dentry_name;
174 int dentry_flags;
175 struct remote_ls_ctx *parent;
26349b2e
NH
176};
177
29508e1e 178static void finish_request(struct transfer_request *request);
197e8951 179static void release_request(struct transfer_request *request);
58e60dd2 180
29508e1e 181static void process_response(void *callback_data)
58e60dd2 182{
29508e1e
NH
183 struct transfer_request *request =
184 (struct transfer_request *)callback_data;
58e60dd2 185
29508e1e 186 finish_request(request);
58e60dd2
NH
187}
188
dd8239f9 189#ifdef USE_CURL_MULTI
197e8951
NH
190static size_t fwrite_sha1_file(void *ptr, size_t eltsize, size_t nmemb,
191 void *data)
192{
193 unsigned char expn[4096];
194 size_t size = eltsize * nmemb;
195 int posn = 0;
196 struct transfer_request *request = (struct transfer_request *)data;
197 do {
93822c22 198 ssize_t retval = xwrite(request->local_fileno,
1d7f171c 199 (char *) ptr + posn, size - posn);
197e8951
NH
200 if (retval < 0)
201 return posn;
202 posn += retval;
203 } while (posn < size);
204
205 request->stream.avail_in = size;
206 request->stream.next_in = ptr;
207 do {
208 request->stream.next_out = expn;
209 request->stream.avail_out = sizeof(expn);
210 request->zret = inflate(&request->stream, Z_SYNC_FLUSH);
211 SHA1_Update(&request->c, expn,
212 sizeof(expn) - request->stream.avail_out);
213 } while (request->stream.avail_in && request->zret == Z_OK);
214 data_received++;
215 return size;
216}
217
218static void start_fetch_loose(struct transfer_request *request)
219{
220 char *hex = sha1_to_hex(request->obj->sha1);
221 char *filename;
222 char prevfile[PATH_MAX];
223 char *url;
224 char *posn;
225 int prevlocal;
226 unsigned char prev_buf[PREV_BUF_SIZE];
227 ssize_t prev_read = 0;
228 long prev_posn = 0;
229 char range[RANGE_HEADER_SIZE];
230 struct curl_slist *range_header = NULL;
231 struct active_request_slot *slot;
232
233 filename = sha1_file_name(request->obj->sha1);
234 snprintf(request->filename, sizeof(request->filename), "%s", filename);
235 snprintf(request->tmpfile, sizeof(request->tmpfile),
236 "%s.temp", filename);
237
238 snprintf(prevfile, sizeof(prevfile), "%s.prev", request->filename);
239 unlink(prevfile);
240 rename(request->tmpfile, prevfile);
241 unlink(request->tmpfile);
242
243 if (request->local_fileno != -1)
244 error("fd leakage in start: %d", request->local_fileno);
245 request->local_fileno = open(request->tmpfile,
246 O_WRONLY | O_CREAT | O_EXCL, 0666);
247 /* This could have failed due to the "lazy directory creation";
248 * try to mkdir the last path component.
249 */
250 if (request->local_fileno < 0 && errno == ENOENT) {
251 char *dir = strrchr(request->tmpfile, '/');
252 if (dir) {
253 *dir = 0;
254 mkdir(request->tmpfile, 0777);
255 *dir = '/';
256 }
257 request->local_fileno = open(request->tmpfile,
258 O_WRONLY | O_CREAT | O_EXCL, 0666);
259 }
260
261 if (request->local_fileno < 0) {
262 request->state = ABORTED;
263 error("Couldn't create temporary file %s for %s: %s",
264 request->tmpfile, request->filename, strerror(errno));
265 return;
266 }
267
268 memset(&request->stream, 0, sizeof(request->stream));
269
270 inflateInit(&request->stream);
271
272 SHA1_Init(&request->c);
273
274 url = xmalloc(strlen(remote->url) + 50);
275 request->url = xmalloc(strlen(remote->url) + 50);
276 strcpy(url, remote->url);
277 posn = url + strlen(remote->url);
278 strcpy(posn, "objects/");
279 posn += 8;
280 memcpy(posn, hex, 2);
281 posn += 2;
282 *(posn++) = '/';
283 strcpy(posn, hex + 2);
284 strcpy(request->url, url);
285
286 /* If a previous temp file is present, process what was already
287 fetched. */
288 prevlocal = open(prevfile, O_RDONLY);
289 if (prevlocal != -1) {
290 do {
93d26e4c 291 prev_read = xread(prevlocal, prev_buf, PREV_BUF_SIZE);
197e8951
NH
292 if (prev_read>0) {
293 if (fwrite_sha1_file(prev_buf,
294 1,
295 prev_read,
296 request) == prev_read) {
297 prev_posn += prev_read;
298 } else {
299 prev_read = -1;
300 }
301 }
302 } while (prev_read > 0);
303 close(prevlocal);
304 }
305 unlink(prevfile);
306
307 /* Reset inflate/SHA1 if there was an error reading the previous temp
308 file; also rewind to the beginning of the local file. */
309 if (prev_read == -1) {
310 memset(&request->stream, 0, sizeof(request->stream));
311 inflateInit(&request->stream);
312 SHA1_Init(&request->c);
313 if (prev_posn>0) {
314 prev_posn = 0;
b5da2467 315 lseek(request->local_fileno, 0, SEEK_SET);
197e8951
NH
316 ftruncate(request->local_fileno, 0);
317 }
318 }
319
320 slot = get_active_slot();
321 slot->callback_func = process_response;
322 slot->callback_data = request;
323 request->slot = slot;
324
325 curl_easy_setopt(slot->curl, CURLOPT_FILE, request);
326 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_sha1_file);
327 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
328 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
329 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
330
331 /* If we have successfully processed data from a previous fetch
332 attempt, only fetch the data we don't already have. */
333 if (prev_posn>0) {
334 if (push_verbosely)
335 fprintf(stderr,
336 "Resuming fetch of object %s at byte %ld\n",
337 hex, prev_posn);
338 sprintf(range, "Range: bytes=%ld-", prev_posn);
339 range_header = curl_slist_append(range_header, range);
340 curl_easy_setopt(slot->curl,
341 CURLOPT_HTTPHEADER, range_header);
342 }
343
344 /* Try to get the request started, abort the request on error */
345 request->state = RUN_FETCH_LOOSE;
346 if (!start_active_slot(slot)) {
347 fprintf(stderr, "Unable to start GET request\n");
348 remote->can_update_info_refs = 0;
349 release_request(request);
350 }
351}
352
dd8239f9
JH
353static void start_mkcol(struct transfer_request *request)
354{
355 char *hex = sha1_to_hex(request->obj->sha1);
356 struct active_request_slot *slot;
357 char *posn;
358
359 request->url = xmalloc(strlen(remote->url) + 13);
360 strcpy(request->url, remote->url);
361 posn = request->url + strlen(remote->url);
362 strcpy(posn, "objects/");
363 posn += 8;
364 memcpy(posn, hex, 2);
365 posn += 2;
366 strcpy(posn, "/");
367
368 slot = get_active_slot();
369 slot->callback_func = process_response;
370 slot->callback_data = request;
371 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
372 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
373 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
374 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
375 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
376
377 if (start_active_slot(slot)) {
378 request->slot = slot;
379 request->state = RUN_MKCOL;
380 } else {
381 request->state = ABORTED;
382 free(request->url);
383 request->url = NULL;
384 }
385}
386#endif
387
197e8951
NH
388static void start_fetch_packed(struct transfer_request *request)
389{
390 char *url;
391 struct packed_git *target;
392 FILE *packfile;
393 char *filename;
394 long prev_posn = 0;
395 char range[RANGE_HEADER_SIZE];
396 struct curl_slist *range_header = NULL;
397
398 struct transfer_request *check_request = request_queue_head;
399 struct active_request_slot *slot;
400
401 target = find_sha1_pack(request->obj->sha1, remote->packs);
402 if (!target) {
403 fprintf(stderr, "Unable to fetch %s, will not be able to update server info refs\n", sha1_to_hex(request->obj->sha1));
404 remote->can_update_info_refs = 0;
405 release_request(request);
406 return;
407 }
408
409 fprintf(stderr, "Fetching pack %s\n", sha1_to_hex(target->sha1));
410 fprintf(stderr, " which contains %s\n", sha1_to_hex(request->obj->sha1));
411
412 filename = sha1_pack_name(target->sha1);
413 snprintf(request->filename, sizeof(request->filename), "%s", filename);
414 snprintf(request->tmpfile, sizeof(request->tmpfile),
415 "%s.temp", filename);
416
417 url = xmalloc(strlen(remote->url) + 64);
418 sprintf(url, "%sobjects/pack/pack-%s.pack",
419 remote->url, sha1_to_hex(target->sha1));
420
421 /* Make sure there isn't another open request for this pack */
422 while (check_request) {
423 if (check_request->state == RUN_FETCH_PACKED &&
424 !strcmp(check_request->url, url)) {
425 free(url);
426 release_request(request);
427 return;
428 }
429 check_request = check_request->next;
430 }
431
432 packfile = fopen(request->tmpfile, "a");
433 if (!packfile) {
434 fprintf(stderr, "Unable to open local file %s for pack",
84ef0338 435 request->tmpfile);
197e8951
NH
436 remote->can_update_info_refs = 0;
437 free(url);
438 return;
439 }
440
441 slot = get_active_slot();
442 slot->callback_func = process_response;
443 slot->callback_data = request;
444 request->slot = slot;
445 request->local_stream = packfile;
446 request->userData = target;
447
448 request->url = url;
449 curl_easy_setopt(slot->curl, CURLOPT_FILE, packfile);
450 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
451 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
452 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
453 slot->local = packfile;
454
455 /* If there is data present from a previous transfer attempt,
456 resume where it left off */
457 prev_posn = ftell(packfile);
458 if (prev_posn>0) {
459 if (push_verbosely)
460 fprintf(stderr,
461 "Resuming fetch of pack %s at byte %ld\n",
462 sha1_to_hex(target->sha1), prev_posn);
463 sprintf(range, "Range: bytes=%ld-", prev_posn);
464 range_header = curl_slist_append(range_header, range);
465 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
466 }
467
468 /* Try to get the request started, abort the request on error */
469 request->state = RUN_FETCH_PACKED;
470 if (!start_active_slot(slot)) {
471 fprintf(stderr, "Unable to start GET request\n");
472 remote->can_update_info_refs = 0;
473 release_request(request);
474 }
475}
476
58e60dd2
NH
477static void start_put(struct transfer_request *request)
478{
aa1dbc98 479 char *hex = sha1_to_hex(request->obj->sha1);
58e60dd2
NH
480 struct active_request_slot *slot;
481 char *posn;
21666f1a 482 enum object_type type;
58e60dd2
NH
483 char hdr[50];
484 void *unpacked;
485 unsigned long len;
486 int hdrlen;
487 ssize_t size;
488 z_stream stream;
489
21666f1a
NP
490 unpacked = read_sha1_file(request->obj->sha1, &type, &len);
491 hdrlen = sprintf(hdr, "%s %lu", typename(type), len) + 1;
58e60dd2
NH
492
493 /* Set it up */
494 memset(&stream, 0, sizeof(stream));
12f6c308 495 deflateInit(&stream, zlib_compression_level);
58e60dd2 496 size = deflateBound(&stream, len + hdrlen);
028c2976
MH
497 strbuf_init(&request->buffer.buf, size);
498 request->buffer.posn = 0;
58e60dd2
NH
499
500 /* Compress it */
028c2976 501 stream.next_out = (unsigned char *)request->buffer.buf.buf;
58e60dd2
NH
502 stream.avail_out = size;
503
504 /* First header.. */
505 stream.next_in = (void *)hdr;
506 stream.avail_in = hdrlen;
507 while (deflate(&stream, 0) == Z_OK)
508 /* nothing */;
509
510 /* Then the data itself.. */
511 stream.next_in = unpacked;
512 stream.avail_in = len;
513 while (deflate(&stream, Z_FINISH) == Z_OK)
514 /* nothing */;
515 deflateEnd(&stream);
516 free(unpacked);
517
028c2976 518 request->buffer.buf.len = stream.total_out;
58e60dd2 519
a6080a0a 520 request->url = xmalloc(strlen(remote->url) +
26349b2e 521 strlen(request->lock->token) + 51);
58e60dd2
NH
522 strcpy(request->url, remote->url);
523 posn = request->url + strlen(remote->url);
524 strcpy(posn, "objects/");
525 posn += 8;
526 memcpy(posn, hex, 2);
527 posn += 2;
528 *(posn++) = '/';
529 strcpy(posn, hex + 2);
530 request->dest = xmalloc(strlen(request->url) + 14);
531 sprintf(request->dest, "Destination: %s", request->url);
532 posn += 38;
1e8d3045 533 *(posn++) = '_';
26349b2e 534 strcpy(posn, request->lock->token);
58e60dd2
NH
535
536 slot = get_active_slot();
29508e1e
NH
537 slot->callback_func = process_response;
538 slot->callback_data = request;
58e60dd2 539 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &request->buffer);
028c2976 540 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, request->buffer.buf.len);
58e60dd2
NH
541 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
542 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
543 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
544 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
545 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
546 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
547 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
548
549 if (start_active_slot(slot)) {
550 request->slot = slot;
551 request->state = RUN_PUT;
552 } else {
553 request->state = ABORTED;
554 free(request->url);
7b899967 555 request->url = NULL;
58e60dd2
NH
556 }
557}
558
559static void start_move(struct transfer_request *request)
560{
561 struct active_request_slot *slot;
562 struct curl_slist *dav_headers = NULL;
563
564 slot = get_active_slot();
29508e1e
NH
565 slot->callback_func = process_response;
566 slot->callback_data = request;
58e60dd2
NH
567 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
568 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MOVE);
569 dav_headers = curl_slist_append(dav_headers, request->dest);
570 dav_headers = curl_slist_append(dav_headers, "Overwrite: T");
571 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
572 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
573 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
574
575 if (start_active_slot(slot)) {
576 request->slot = slot;
577 request->state = RUN_MOVE;
578 } else {
579 request->state = ABORTED;
580 free(request->url);
7b899967 581 request->url = NULL;
58e60dd2
NH
582 }
583}
584
512d632c 585static int refresh_lock(struct remote_lock *lock)
75187c9d
NH
586{
587 struct active_request_slot *slot;
baa7b67d 588 struct slot_results results;
75187c9d
NH
589 char *if_header;
590 char timeout_header[25];
591 struct curl_slist *dav_headers = NULL;
512d632c 592 int rc = 0;
75187c9d 593
512d632c 594 lock->refreshing = 1;
75187c9d 595
512d632c
NH
596 if_header = xmalloc(strlen(lock->token) + 25);
597 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
598 sprintf(timeout_header, "Timeout: Second-%ld", lock->timeout);
599 dav_headers = curl_slist_append(dav_headers, if_header);
600 dav_headers = curl_slist_append(dav_headers, timeout_header);
75187c9d 601
512d632c
NH
602 slot = get_active_slot();
603 slot->results = &results;
604 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
605 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
606 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
607 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
608 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
75187c9d 609
512d632c
NH
610 if (start_active_slot(slot)) {
611 run_active_slot(slot);
612 if (results.curl_result != CURLE_OK) {
613 fprintf(stderr, "LOCK HTTP error %ld\n",
614 results.http_code);
615 } else {
616 lock->start_time = time(NULL);
617 rc = 1;
618 }
619 }
aa1dbc98 620
512d632c
NH
621 lock->refreshing = 0;
622 curl_slist_free_all(dav_headers);
623 free(if_header);
aa1dbc98 624
512d632c
NH
625 return rc;
626}
627
ec26b4d6 628static void check_locks(void)
512d632c
NH
629{
630 struct remote_lock *lock = remote->locks;
631 time_t current_time = time(NULL);
632 int time_remaining;
633
634 while (lock) {
635 time_remaining = lock->start_time + lock->timeout -
636 current_time;
637 if (!lock->refreshing && time_remaining < LOCK_REFRESH) {
638 if (!refresh_lock(lock)) {
639 fprintf(stderr,
640 "Unable to refresh lock for %s\n",
641 lock->url);
642 aborted = 1;
643 return;
aa1dbc98 644 }
75187c9d 645 }
512d632c 646 lock = lock->next;
75187c9d 647 }
aa1dbc98 648}
75187c9d 649
aa1dbc98
NH
650static void release_request(struct transfer_request *request)
651{
652 struct transfer_request *entry = request_queue_head;
653
654 if (request == request_queue_head) {
655 request_queue_head = request->next;
656 } else {
657 while (entry->next != NULL && entry->next != request)
658 entry = entry->next;
659 if (entry->next == request)
660 entry->next = entry->next->next;
661 }
662
197e8951
NH
663 if (request->local_fileno != -1)
664 close(request->local_fileno);
665 if (request->local_stream)
666 fclose(request->local_stream);
8e0f7003 667 free(request->url);
aa1dbc98 668 free(request);
75187c9d
NH
669}
670
58e60dd2
NH
671static void finish_request(struct transfer_request *request)
672{
197e8951
NH
673 struct stat st;
674 struct packed_git *target;
675 struct packed_git **lst;
676
677 request->curl_result = request->slot->curl_result;
58e60dd2
NH
678 request->http_code = request->slot->http_code;
679 request->slot = NULL;
75187c9d 680
aa1dbc98 681 /* Keep locks active */
512d632c 682 check_locks();
75187c9d 683
58e60dd2
NH
684 if (request->headers != NULL)
685 curl_slist_free_all(request->headers);
7b899967
NH
686
687 /* URL is reused for MOVE after PUT */
688 if (request->state != RUN_PUT) {
689 free(request->url);
690 request->url = NULL;
aa1dbc98 691 }
7b899967 692
aa1dbc98 693 if (request->state == RUN_MKCOL) {
58e60dd2
NH
694 if (request->curl_result == CURLE_OK ||
695 request->http_code == 405) {
aa1dbc98 696 remote_dir_exists[request->obj->sha1[0]] = 1;
58e60dd2
NH
697 start_put(request);
698 } else {
699 fprintf(stderr, "MKCOL %s failed, aborting (%d/%ld)\n",
aa1dbc98 700 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
701 request->curl_result, request->http_code);
702 request->state = ABORTED;
703 aborted = 1;
704 }
705 } else if (request->state == RUN_PUT) {
706 if (request->curl_result == CURLE_OK) {
707 start_move(request);
708 } else {
709 fprintf(stderr, "PUT %s failed, aborting (%d/%ld)\n",
aa1dbc98 710 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
711 request->curl_result, request->http_code);
712 request->state = ABORTED;
713 aborted = 1;
714 }
715 } else if (request->state == RUN_MOVE) {
716 if (request->curl_result == CURLE_OK) {
1a703cba
NH
717 if (push_verbosely)
718 fprintf(stderr, " sent %s\n",
719 sha1_to_hex(request->obj->sha1));
aa1dbc98
NH
720 request->obj->flags |= REMOTE;
721 release_request(request);
58e60dd2
NH
722 } else {
723 fprintf(stderr, "MOVE %s failed, aborting (%d/%ld)\n",
aa1dbc98 724 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
725 request->curl_result, request->http_code);
726 request->state = ABORTED;
727 aborted = 1;
728 }
197e8951
NH
729 } else if (request->state == RUN_FETCH_LOOSE) {
730 fchmod(request->local_fileno, 0444);
731 close(request->local_fileno); request->local_fileno = -1;
732
733 if (request->curl_result != CURLE_OK &&
734 request->http_code != 416) {
735 if (stat(request->tmpfile, &st) == 0) {
736 if (st.st_size == 0)
737 unlink(request->tmpfile);
738 }
739 } else {
740 if (request->http_code == 416)
741 fprintf(stderr, "Warning: requested range invalid; we may already have all the data.\n");
742
743 inflateEnd(&request->stream);
744 SHA1_Final(request->real_sha1, &request->c);
745 if (request->zret != Z_STREAM_END) {
746 unlink(request->tmpfile);
a89fccd2 747 } else if (hashcmp(request->obj->sha1, request->real_sha1)) {
197e8951
NH
748 unlink(request->tmpfile);
749 } else {
750 request->rename =
751 move_temp_to_file(
752 request->tmpfile,
753 request->filename);
754 if (request->rename == 0) {
755 request->obj->flags |= (LOCAL | REMOTE);
756 }
757 }
758 }
759
760 /* Try fetching packed if necessary */
761 if (request->obj->flags & LOCAL)
762 release_request(request);
763 else
764 start_fetch_packed(request);
765
766 } else if (request->state == RUN_FETCH_PACKED) {
767 if (request->curl_result != CURLE_OK) {
768 fprintf(stderr, "Unable to get pack file %s\n%s",
769 request->url, curl_errorstr);
770 remote->can_update_info_refs = 0;
771 } else {
1c23d794
SP
772 off_t pack_size = ftell(request->local_stream);
773
197e8951
NH
774 fclose(request->local_stream);
775 request->local_stream = NULL;
776 if (!move_temp_to_file(request->tmpfile,
777 request->filename)) {
778 target = (struct packed_git *)request->userData;
1c23d794 779 target->pack_size = pack_size;
197e8951
NH
780 lst = &remote->packs;
781 while (*lst != target)
782 lst = &((*lst)->next);
783 *lst = (*lst)->next;
784
785 if (!verify_pack(target, 0))
786 install_packed_git(target);
787 else
788 remote->can_update_info_refs = 0;
789 }
790 }
791 release_request(request);
58e60dd2
NH
792 }
793}
794
b3ca4e4e 795#ifdef USE_CURL_MULTI
fc57b6aa 796static int fill_active_slot(void *unused)
58e60dd2
NH
797{
798 struct transfer_request *request = request_queue_head;
58e60dd2
NH
799
800 if (aborted)
45c17412 801 return 0;
58e60dd2 802
45c17412 803 for (request = request_queue_head; request; request = request->next) {
197e8951
NH
804 if (request->state == NEED_FETCH) {
805 start_fetch_loose(request);
45c17412 806 return 1;
197e8951 807 } else if (pushing && request->state == NEED_PUSH) {
aa1dbc98 808 if (remote_dir_exists[request->obj->sha1[0]] == 1) {
0dd276b8 809 start_put(request);
aa1dbc98 810 } else {
0dd276b8 811 start_mkcol(request);
aa1dbc98 812 }
45c17412 813 return 1;
58e60dd2 814 }
aa1dbc98 815 }
45c17412 816 return 0;
58e60dd2 817}
b3ca4e4e 818#endif
58e60dd2 819
aa1dbc98
NH
820static void get_remote_object_list(unsigned char parent);
821
197e8951
NH
822static void add_fetch_request(struct object *obj)
823{
824 struct transfer_request *request;
825
826 check_locks();
827
828 /*
829 * Don't fetch the object if it's known to exist locally
830 * or is already in the request queue
831 */
832 if (remote_dir_exists[obj->sha1[0]] == -1)
833 get_remote_object_list(obj->sha1[0]);
834 if (obj->flags & (LOCAL | FETCHING))
835 return;
836
837 obj->flags |= FETCHING;
838 request = xmalloc(sizeof(*request));
839 request->obj = obj;
840 request->url = NULL;
841 request->lock = NULL;
842 request->headers = NULL;
843 request->local_fileno = -1;
844 request->local_stream = NULL;
845 request->state = NEED_FETCH;
846 request->next = request_queue_head;
847 request_queue_head = request;
848
b3ca4e4e 849#ifdef USE_CURL_MULTI
197e8951
NH
850 fill_active_slots();
851 step_active_slots();
b3ca4e4e 852#endif
197e8951
NH
853}
854
1a703cba 855static int add_send_request(struct object *obj, struct remote_lock *lock)
58e60dd2
NH
856{
857 struct transfer_request *request = request_queue_head;
58e60dd2 858 struct packed_git *target;
58e60dd2 859
512d632c
NH
860 /* Keep locks active */
861 check_locks();
862
aa1dbc98
NH
863 /*
864 * Don't push the object if it's known to exist on the remote
865 * or is already in the request queue
866 */
867 if (remote_dir_exists[obj->sha1[0]] == -1)
868 get_remote_object_list(obj->sha1[0]);
869 if (obj->flags & (REMOTE | PUSHING))
1a703cba 870 return 0;
aa1dbc98
NH
871 target = find_sha1_pack(obj->sha1, remote->packs);
872 if (target) {
873 obj->flags |= REMOTE;
1a703cba 874 return 0;
aa1dbc98 875 }
58e60dd2 876
aa1dbc98 877 obj->flags |= PUSHING;
58e60dd2 878 request = xmalloc(sizeof(*request));
aa1dbc98 879 request->obj = obj;
58e60dd2 880 request->url = NULL;
26349b2e 881 request->lock = lock;
58e60dd2 882 request->headers = NULL;
197e8951
NH
883 request->local_fileno = -1;
884 request->local_stream = NULL;
aa1dbc98 885 request->state = NEED_PUSH;
c17fb6ee
NH
886 request->next = request_queue_head;
887 request_queue_head = request;
29508e1e 888
b3ca4e4e 889#ifdef USE_CURL_MULTI
29508e1e
NH
890 fill_active_slots();
891 step_active_slots();
b3ca4e4e 892#endif
1a703cba
NH
893
894 return 1;
58e60dd2
NH
895}
896
897static int fetch_index(unsigned char *sha1)
898{
899 char *hex = sha1_to_hex(sha1);
900 char *filename;
901 char *url;
902 char tmpfile[PATH_MAX];
903 long prev_posn = 0;
904 char range[RANGE_HEADER_SIZE];
905 struct curl_slist *range_header = NULL;
906
907 FILE *indexfile;
908 struct active_request_slot *slot;
baa7b67d 909 struct slot_results results;
58e60dd2 910
c17fb6ee 911 /* Don't use the index if the pack isn't there */
1a703cba
NH
912 url = xmalloc(strlen(remote->url) + 64);
913 sprintf(url, "%sobjects/pack/pack-%s.pack", remote->url, hex);
c17fb6ee 914 slot = get_active_slot();
baa7b67d 915 slot->results = &results;
c17fb6ee
NH
916 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
917 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
918 if (start_active_slot(slot)) {
919 run_active_slot(slot);
baa7b67d 920 if (results.curl_result != CURLE_OK) {
c17fb6ee
NH
921 free(url);
922 return error("Unable to verify pack %s is available",
923 hex);
924 }
925 } else {
3b683b91 926 free(url);
c17fb6ee
NH
927 return error("Unable to start request");
928 }
929
3b683b91
MH
930 if (has_pack_index(sha1)) {
931 free(url);
58e60dd2 932 return 0;
3b683b91 933 }
58e60dd2
NH
934
935 if (push_verbosely)
936 fprintf(stderr, "Getting index for pack %s\n", hex);
1a703cba
NH
937
938 sprintf(url, "%sobjects/pack/pack-%s.idx", remote->url, hex);
939
58e60dd2
NH
940 filename = sha1_pack_index_name(sha1);
941 snprintf(tmpfile, sizeof(tmpfile), "%s.temp", filename);
942 indexfile = fopen(tmpfile, "a");
3b683b91
MH
943 if (!indexfile) {
944 free(url);
58e60dd2 945 return error("Unable to open local file %s for pack index",
84ef0338 946 tmpfile);
3b683b91 947 }
58e60dd2
NH
948
949 slot = get_active_slot();
baa7b67d 950 slot->results = &results;
c17fb6ee
NH
951 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
952 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
58e60dd2
NH
953 curl_easy_setopt(slot->curl, CURLOPT_FILE, indexfile);
954 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
955 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
956 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
957 slot->local = indexfile;
958
959 /* If there is data present from a previous transfer attempt,
960 resume where it left off */
961 prev_posn = ftell(indexfile);
962 if (prev_posn>0) {
963 if (push_verbosely)
964 fprintf(stderr,
965 "Resuming fetch of index for pack %s at byte %ld\n",
966 hex, prev_posn);
967 sprintf(range, "Range: bytes=%ld-", prev_posn);
968 range_header = curl_slist_append(range_header, range);
969 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
970 }
971
972 if (start_active_slot(slot)) {
973 run_active_slot(slot);
baa7b67d 974 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
975 free(url);
976 fclose(indexfile);
977 return error("Unable to get pack index %s\n%s", url,
978 curl_errorstr);
979 }
980 } else {
981 free(url);
7b899967 982 fclose(indexfile);
58e60dd2
NH
983 return error("Unable to start request");
984 }
985
986 free(url);
987 fclose(indexfile);
988
989 return move_temp_to_file(tmpfile, filename);
990}
991
992static int setup_index(unsigned char *sha1)
993{
994 struct packed_git *new_pack;
58e60dd2
NH
995
996 if (fetch_index(sha1))
997 return -1;
998
999 new_pack = parse_pack_index(sha1);
1000 new_pack->next = remote->packs;
1001 remote->packs = new_pack;
1002 return 0;
1003}
1004
f4f440a0 1005static int fetch_indices(void)
58e60dd2
NH
1006{
1007 unsigned char sha1[20];
1008 char *url;
028c2976 1009 struct strbuf buffer = STRBUF_INIT;
58e60dd2
NH
1010 char *data;
1011 int i = 0;
1012
1013 struct active_request_slot *slot;
baa7b67d 1014 struct slot_results results;
58e60dd2 1015
58e60dd2
NH
1016 if (push_verbosely)
1017 fprintf(stderr, "Getting pack list\n");
1a703cba
NH
1018
1019 url = xmalloc(strlen(remote->url) + 20);
1020 sprintf(url, "%sobjects/info/packs", remote->url);
58e60dd2
NH
1021
1022 slot = get_active_slot();
baa7b67d 1023 slot->results = &results;
58e60dd2 1024 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
29508e1e 1025 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1026 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1027 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
1028 if (start_active_slot(slot)) {
1029 run_active_slot(slot);
baa7b67d 1030 if (results.curl_result != CURLE_OK) {
028c2976 1031 strbuf_release(&buffer);
58e60dd2 1032 free(url);
baa7b67d 1033 if (results.http_code == 404)
58e60dd2
NH
1034 return 0;
1035 else
1036 return error("%s", curl_errorstr);
1037 }
1038 } else {
028c2976 1039 strbuf_release(&buffer);
58e60dd2
NH
1040 free(url);
1041 return error("Unable to start request");
1042 }
1043 free(url);
1044
028c2976
MH
1045 data = buffer.buf;
1046 while (i < buffer.len) {
58e60dd2
NH
1047 switch (data[i]) {
1048 case 'P':
1049 i++;
028c2976 1050 if (i + 52 < buffer.len &&
cc44c765 1051 !prefixcmp(data + i, " pack-") &&
1968d77d 1052 !prefixcmp(data + i + 46, ".pack\n")) {
58e60dd2
NH
1053 get_sha1_hex(data + i + 6, sha1);
1054 setup_index(sha1);
1055 i += 51;
1056 break;
1057 }
1058 default:
1059 while (data[i] != '\n')
1060 i++;
1061 }
1062 i++;
1063 }
1064
028c2976 1065 strbuf_release(&buffer);
58e60dd2
NH
1066 return 0;
1067}
1068
aa1dbc98
NH
1069static void one_remote_object(const char *hex)
1070{
1071 unsigned char sha1[20];
1072 struct object *obj;
1073
1074 if (get_sha1_hex(hex, sha1) != 0)
1075 return;
1076
1077 obj = lookup_object(sha1);
1078 if (!obj)
1079 obj = parse_object(sha1);
1080
1081 /* Ignore remote objects that don't exist locally */
1082 if (!obj)
1083 return;
1084
1085 obj->flags |= REMOTE;
1086 if (!object_list_contains(objects, obj))
1f1e895f 1087 object_list_insert(obj, &objects);
aa1dbc98
NH
1088}
1089
acf59575 1090static void handle_lockprop_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1091{
acf59575
NH
1092 int *lock_flags = (int *)ctx->userData;
1093
1094 if (tag_closed) {
1095 if (!strcmp(ctx->name, DAV_CTX_LOCKENTRY)) {
1096 if ((*lock_flags & DAV_PROP_LOCKEX) &&
1097 (*lock_flags & DAV_PROP_LOCKWR)) {
1098 *lock_flags |= DAV_LOCK_OK;
1099 }
1100 *lock_flags &= DAV_LOCK_OK;
1101 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_WRITE)) {
1102 *lock_flags |= DAV_PROP_LOCKWR;
1103 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_EXCLUSIVE)) {
1104 *lock_flags |= DAV_PROP_LOCKEX;
1105 }
1106 }
26349b2e
NH
1107}
1108
acf59575 1109static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1110{
aa1dbc98 1111 struct remote_lock *lock = (struct remote_lock *)ctx->userData;
acf59575
NH
1112
1113 if (tag_closed && ctx->cdata) {
1114 if (!strcmp(ctx->name, DAV_ACTIVELOCK_OWNER)) {
1115 lock->owner = xmalloc(strlen(ctx->cdata) + 1);
1116 strcpy(lock->owner, ctx->cdata);
1117 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TIMEOUT)) {
cc44c765 1118 if (!prefixcmp(ctx->cdata, "Second-"))
acf59575
NH
1119 lock->timeout =
1120 strtol(ctx->cdata + 7, NULL, 10);
1121 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
cc44c765 1122 if (!prefixcmp(ctx->cdata, "opaquelocktoken:")) {
3e2f62be 1123 lock->token = xmalloc(strlen(ctx->cdata) - 15);
acf59575
NH
1124 strcpy(lock->token, ctx->cdata + 16);
1125 }
1126 }
26349b2e
NH
1127 }
1128}
1129
aa1dbc98 1130static void one_remote_ref(char *refname);
aa1dbc98 1131
26349b2e 1132static void
acf59575 1133xml_start_tag(void *userData, const char *name, const char **atts)
26349b2e 1134{
acf59575 1135 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1136 const char *c = strchr(name, ':');
acf59575
NH
1137 int new_len;
1138
1139 if (c == NULL)
1140 c = name;
1141 else
1142 c++;
1143
1144 new_len = strlen(ctx->name) + strlen(c) + 2;
1145
1146 if (new_len > ctx->len) {
1147 ctx->name = xrealloc(ctx->name, new_len);
1148 ctx->len = new_len;
26349b2e 1149 }
acf59575
NH
1150 strcat(ctx->name, ".");
1151 strcat(ctx->name, c);
26349b2e 1152
4cac42b1
JH
1153 free(ctx->cdata);
1154 ctx->cdata = NULL;
acf59575
NH
1155
1156 ctx->userFunc(ctx, 0);
26349b2e
NH
1157}
1158
58e60dd2 1159static void
acf59575 1160xml_end_tag(void *userData, const char *name)
58e60dd2 1161{
acf59575 1162 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1163 const char *c = strchr(name, ':');
acf59575 1164 char *ep;
58e60dd2 1165
acf59575
NH
1166 ctx->userFunc(ctx, 1);
1167
1168 if (c == NULL)
1169 c = name;
1170 else
1171 c++;
1172
1173 ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
1174 *ep = 0;
58e60dd2
NH
1175}
1176
1177static void
acf59575 1178xml_cdata(void *userData, const XML_Char *s, int len)
58e60dd2 1179{
acf59575 1180 struct xml_ctx *ctx = (struct xml_ctx *)userData;
4cac42b1 1181 free(ctx->cdata);
182af834 1182 ctx->cdata = xmemdupz(s, len);
58e60dd2
NH
1183}
1184
554fe20d 1185static struct remote_lock *lock_remote(const char *path, long timeout)
58e60dd2
NH
1186{
1187 struct active_request_slot *slot;
baa7b67d 1188 struct slot_results results;
028c2976
MH
1189 struct buffer out_buffer = { STRBUF_INIT, 0 };
1190 struct strbuf in_buffer = STRBUF_INIT;
58e60dd2 1191 char *url;
0772b9a6 1192 char *ep;
58e60dd2 1193 char timeout_header[25];
512d632c 1194 struct remote_lock *lock = NULL;
58e60dd2 1195 struct curl_slist *dav_headers = NULL;
acf59575 1196 struct xml_ctx ctx;
58e60dd2 1197
aa1dbc98
NH
1198 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
1199 sprintf(url, "%s%s", remote->url, path);
1200
0772b9a6 1201 /* Make sure leading directories exist for the remote ref */
2c46759d 1202 ep = strchr(url + strlen(remote->url) + 1, '/');
0772b9a6
NH
1203 while (ep) {
1204 *ep = 0;
1205 slot = get_active_slot();
baa7b67d 1206 slot->results = &results;
0772b9a6
NH
1207 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
1208 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1209 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
1210 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1211 if (start_active_slot(slot)) {
1212 run_active_slot(slot);
baa7b67d
NH
1213 if (results.curl_result != CURLE_OK &&
1214 results.http_code != 405) {
0772b9a6
NH
1215 fprintf(stderr,
1216 "Unable to create branch path %s\n",
1217 url);
1218 free(url);
1219 return NULL;
1220 }
1221 } else {
1a703cba 1222 fprintf(stderr, "Unable to start MKCOL request\n");
0772b9a6
NH
1223 free(url);
1224 return NULL;
1225 }
1226 *ep = '/';
1227 ep = strchr(ep + 1, '/');
1228 }
1229
028c2976 1230 strbuf_addf(&out_buffer.buf, LOCK_REQUEST, git_default_email);
26349b2e 1231
75187c9d 1232 sprintf(timeout_header, "Timeout: Second-%ld", timeout);
58e60dd2
NH
1233 dav_headers = curl_slist_append(dav_headers, timeout_header);
1234 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1235
1236 slot = get_active_slot();
baa7b67d 1237 slot->results = &results;
58e60dd2 1238 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1239 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2 1240 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
26349b2e 1241 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1242 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1243 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1244 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1245 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
1246 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1247
aa1dbc98 1248 lock = xcalloc(1, sizeof(*lock));
aa1dbc98 1249 lock->timeout = -1;
acf59575 1250
58e60dd2
NH
1251 if (start_active_slot(slot)) {
1252 run_active_slot(slot);
baa7b67d 1253 if (results.curl_result == CURLE_OK) {
472b2570
MH
1254 XML_Parser parser = XML_ParserCreate(NULL);
1255 enum XML_Status result;
acf59575
NH
1256 ctx.name = xcalloc(10, 1);
1257 ctx.len = 0;
1258 ctx.cdata = NULL;
1259 ctx.userFunc = handle_new_lock_ctx;
aa1dbc98 1260 ctx.userData = lock;
acf59575
NH
1261 XML_SetUserData(parser, &ctx);
1262 XML_SetElementHandler(parser, xml_start_tag,
1263 xml_end_tag);
1264 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
1265 result = XML_Parse(parser, in_buffer.buf,
1266 in_buffer.len, 1);
acf59575
NH
1267 free(ctx.name);
1268 if (result != XML_STATUS_OK) {
1269 fprintf(stderr, "XML error: %s\n",
1270 XML_ErrorString(
1271 XML_GetErrorCode(parser)));
aa1dbc98 1272 lock->timeout = -1;
acf59575 1273 }
472b2570 1274 XML_ParserFree(parser);
58e60dd2
NH
1275 }
1276 } else {
1a703cba 1277 fprintf(stderr, "Unable to start LOCK request\n");
58e60dd2
NH
1278 }
1279
acf59575 1280 curl_slist_free_all(dav_headers);
028c2976
MH
1281 strbuf_release(&out_buffer.buf);
1282 strbuf_release(&in_buffer);
26349b2e 1283
aa1dbc98 1284 if (lock->token == NULL || lock->timeout <= 0) {
8e0f7003
JM
1285 free(lock->token);
1286 free(lock->owner);
75187c9d 1287 free(url);
aa1dbc98
NH
1288 free(lock);
1289 lock = NULL;
acf59575 1290 } else {
aa1dbc98 1291 lock->url = url;
aa1dbc98 1292 lock->start_time = time(NULL);
512d632c
NH
1293 lock->next = remote->locks;
1294 remote->locks = lock;
26349b2e
NH
1295 }
1296
aa1dbc98 1297 return lock;
58e60dd2
NH
1298}
1299
aa1dbc98 1300static int unlock_remote(struct remote_lock *lock)
58e60dd2
NH
1301{
1302 struct active_request_slot *slot;
baa7b67d 1303 struct slot_results results;
512d632c 1304 struct remote_lock *prev = remote->locks;
58e60dd2
NH
1305 char *lock_token_header;
1306 struct curl_slist *dav_headers = NULL;
1307 int rc = 0;
1308
26349b2e 1309 lock_token_header = xmalloc(strlen(lock->token) + 31);
58e60dd2 1310 sprintf(lock_token_header, "Lock-Token: <opaquelocktoken:%s>",
26349b2e 1311 lock->token);
58e60dd2
NH
1312 dav_headers = curl_slist_append(dav_headers, lock_token_header);
1313
1314 slot = get_active_slot();
baa7b67d 1315 slot->results = &results;
58e60dd2 1316 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
75187c9d 1317 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1318 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_UNLOCK);
1319 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1320
1321 if (start_active_slot(slot)) {
1322 run_active_slot(slot);
baa7b67d 1323 if (results.curl_result == CURLE_OK)
58e60dd2
NH
1324 rc = 1;
1325 else
512d632c 1326 fprintf(stderr, "UNLOCK HTTP error %ld\n",
baa7b67d 1327 results.http_code);
58e60dd2 1328 } else {
512d632c 1329 fprintf(stderr, "Unable to start UNLOCK request\n");
58e60dd2
NH
1330 }
1331
1332 curl_slist_free_all(dav_headers);
1333 free(lock_token_header);
75187c9d 1334
512d632c
NH
1335 if (remote->locks == lock) {
1336 remote->locks = lock->next;
1337 } else {
1338 while (prev && prev->next != lock)
1339 prev = prev->next;
1340 if (prev)
1341 prev->next = prev->next->next;
1342 }
1343
8e0f7003 1344 free(lock->owner);
512d632c
NH
1345 free(lock->url);
1346 free(lock->token);
1347 free(lock);
58e60dd2
NH
1348
1349 return rc;
1350}
1351
3030baa7
NH
1352static void remote_ls(const char *path, int flags,
1353 void (*userFunc)(struct remote_ls_ctx *ls),
1354 void *userData);
aa1dbc98 1355
3030baa7
NH
1356static void process_ls_object(struct remote_ls_ctx *ls)
1357{
1358 unsigned int *parent = (unsigned int *)ls->userData;
1359 char *path = ls->dentry_name;
1360 char *obj_hex;
aa1dbc98 1361
3030baa7
NH
1362 if (!strcmp(ls->path, ls->dentry_name) && (ls->flags & IS_DIR)) {
1363 remote_dir_exists[*parent] = 1;
1364 return;
1365 }
aa1dbc98 1366
3030baa7
NH
1367 if (strlen(path) != 49)
1368 return;
1369 path += 8;
1370 obj_hex = xmalloc(strlen(path));
eecc8367
ER
1371 /* NB: path is not null-terminated, can not use strlcpy here */
1372 memcpy(obj_hex, path, 2);
3030baa7
NH
1373 strcpy(obj_hex + 2, path + 3);
1374 one_remote_object(obj_hex);
1375 free(obj_hex);
1376}
aa1dbc98 1377
3030baa7
NH
1378static void process_ls_ref(struct remote_ls_ctx *ls)
1379{
1380 if (!strcmp(ls->path, ls->dentry_name) && (ls->dentry_flags & IS_DIR)) {
1381 fprintf(stderr, " %s\n", ls->dentry_name);
1382 return;
1383 }
aa1dbc98 1384
3030baa7
NH
1385 if (!(ls->dentry_flags & IS_DIR))
1386 one_remote_ref(ls->dentry_name);
1387}
aa1dbc98 1388
3030baa7
NH
1389static void handle_remote_ls_ctx(struct xml_ctx *ctx, int tag_closed)
1390{
1391 struct remote_ls_ctx *ls = (struct remote_ls_ctx *)ctx->userData;
aa1dbc98 1392
3030baa7
NH
1393 if (tag_closed) {
1394 if (!strcmp(ctx->name, DAV_PROPFIND_RESP) && ls->dentry_name) {
1395 if (ls->dentry_flags & IS_DIR) {
1396 if (ls->flags & PROCESS_DIRS) {
1397 ls->userFunc(ls);
1398 }
1399 if (strcmp(ls->dentry_name, ls->path) &&
1400 ls->flags & RECURSIVE) {
1401 remote_ls(ls->dentry_name,
1402 ls->flags,
1403 ls->userFunc,
1404 ls->userData);
1405 }
1406 } else if (ls->flags & PROCESS_FILES) {
1407 ls->userFunc(ls);
aa1dbc98 1408 }
3030baa7
NH
1409 } else if (!strcmp(ctx->name, DAV_PROPFIND_NAME) && ctx->cdata) {
1410 ls->dentry_name = xmalloc(strlen(ctx->cdata) -
1411 remote->path_len + 1);
1412 strcpy(ls->dentry_name, ctx->cdata + remote->path_len);
1413 } else if (!strcmp(ctx->name, DAV_PROPFIND_COLLECTION)) {
1414 ls->dentry_flags |= IS_DIR;
aa1dbc98 1415 }
3030baa7 1416 } else if (!strcmp(ctx->name, DAV_PROPFIND_RESP)) {
4cac42b1 1417 free(ls->dentry_name);
3030baa7
NH
1418 ls->dentry_name = NULL;
1419 ls->dentry_flags = 0;
aa1dbc98 1420 }
aa1dbc98
NH
1421}
1422
3030baa7
NH
1423static void remote_ls(const char *path, int flags,
1424 void (*userFunc)(struct remote_ls_ctx *ls),
1425 void *userData)
aa1dbc98 1426{
3030baa7 1427 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
aa1dbc98 1428 struct active_request_slot *slot;
baa7b67d 1429 struct slot_results results;
028c2976
MH
1430 struct strbuf in_buffer = STRBUF_INIT;
1431 struct buffer out_buffer = { STRBUF_INIT, 0 };
aa1dbc98
NH
1432 struct curl_slist *dav_headers = NULL;
1433 struct xml_ctx ctx;
3030baa7
NH
1434 struct remote_ls_ctx ls;
1435
1436 ls.flags = flags;
9befac47 1437 ls.path = xstrdup(path);
3030baa7
NH
1438 ls.dentry_name = NULL;
1439 ls.dentry_flags = 0;
1440 ls.userData = userData;
1441 ls.userFunc = userFunc;
aa1dbc98 1442
aa1dbc98
NH
1443 sprintf(url, "%s%s", remote->url, path);
1444
028c2976 1445 strbuf_addf(&out_buffer.buf, PROPFIND_ALL_REQUEST);
aa1dbc98
NH
1446
1447 dav_headers = curl_slist_append(dav_headers, "Depth: 1");
1448 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1449
1450 slot = get_active_slot();
baa7b67d 1451 slot->results = &results;
aa1dbc98 1452 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1453 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
aa1dbc98
NH
1454 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1455 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
1456 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
1457 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1458 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1459 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1460 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1461
1462 if (start_active_slot(slot)) {
1463 run_active_slot(slot);
baa7b67d 1464 if (results.curl_result == CURLE_OK) {
472b2570
MH
1465 XML_Parser parser = XML_ParserCreate(NULL);
1466 enum XML_Status result;
aa1dbc98
NH
1467 ctx.name = xcalloc(10, 1);
1468 ctx.len = 0;
1469 ctx.cdata = NULL;
3030baa7
NH
1470 ctx.userFunc = handle_remote_ls_ctx;
1471 ctx.userData = &ls;
aa1dbc98
NH
1472 XML_SetUserData(parser, &ctx);
1473 XML_SetElementHandler(parser, xml_start_tag,
1474 xml_end_tag);
1475 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
1476 result = XML_Parse(parser, in_buffer.buf,
1477 in_buffer.len, 1);
aa1dbc98
NH
1478 free(ctx.name);
1479
1480 if (result != XML_STATUS_OK) {
1481 fprintf(stderr, "XML error: %s\n",
1482 XML_ErrorString(
1483 XML_GetErrorCode(parser)));
1484 }
472b2570 1485 XML_ParserFree(parser);
aa1dbc98
NH
1486 }
1487 } else {
3030baa7 1488 fprintf(stderr, "Unable to start PROPFIND request\n");
aa1dbc98
NH
1489 }
1490
3030baa7 1491 free(ls.path);
aa1dbc98 1492 free(url);
028c2976
MH
1493 strbuf_release(&out_buffer.buf);
1494 strbuf_release(&in_buffer);
aa1dbc98
NH
1495 curl_slist_free_all(dav_headers);
1496}
1497
3030baa7
NH
1498static void get_remote_object_list(unsigned char parent)
1499{
1500 char path[] = "objects/XX/";
1501 static const char hex[] = "0123456789abcdef";
1502 unsigned int val = parent;
1503
1504 path[8] = hex[val >> 4];
1505 path[9] = hex[val & 0xf];
1506 remote_dir_exists[val] = 0;
1507 remote_ls(path, (PROCESS_FILES | PROCESS_DIRS),
1508 process_ls_object, &val);
1509}
1510
acf59575 1511static int locking_available(void)
58e60dd2
NH
1512{
1513 struct active_request_slot *slot;
baa7b67d 1514 struct slot_results results;
028c2976
MH
1515 struct strbuf in_buffer = STRBUF_INIT;
1516 struct buffer out_buffer = { STRBUF_INIT, 0 };
58e60dd2 1517 struct curl_slist *dav_headers = NULL;
acf59575
NH
1518 struct xml_ctx ctx;
1519 int lock_flags = 0;
58e60dd2 1520
028c2976 1521 strbuf_addf(&out_buffer.buf, PROPFIND_SUPPORTEDLOCK_REQUEST, remote->url);
58e60dd2
NH
1522
1523 dav_headers = curl_slist_append(dav_headers, "Depth: 0");
1524 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
baa7b67d 1525
58e60dd2 1526 slot = get_active_slot();
baa7b67d 1527 slot->results = &results;
58e60dd2 1528 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1529 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2
NH
1530 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1531 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1532 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1533 curl_easy_setopt(slot->curl, CURLOPT_URL, remote->url);
1534 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1535 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1536 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1537
1538 if (start_active_slot(slot)) {
1539 run_active_slot(slot);
baa7b67d 1540 if (results.curl_result == CURLE_OK) {
472b2570
MH
1541 XML_Parser parser = XML_ParserCreate(NULL);
1542 enum XML_Status result;
acf59575
NH
1543 ctx.name = xcalloc(10, 1);
1544 ctx.len = 0;
1545 ctx.cdata = NULL;
1546 ctx.userFunc = handle_lockprop_ctx;
1547 ctx.userData = &lock_flags;
1548 XML_SetUserData(parser, &ctx);
1549 XML_SetElementHandler(parser, xml_start_tag,
1550 xml_end_tag);
028c2976
MH
1551 result = XML_Parse(parser, in_buffer.buf,
1552 in_buffer.len, 1);
acf59575
NH
1553 free(ctx.name);
1554
1555 if (result != XML_STATUS_OK) {
1556 fprintf(stderr, "XML error: %s\n",
1557 XML_ErrorString(
1558 XML_GetErrorCode(parser)));
1559 lock_flags = 0;
1560 }
472b2570 1561 XML_ParserFree(parser);
325ce395
JH
1562 if (!lock_flags)
1563 error("Error: no DAV locking support on %s",
1564 remote->url);
1565
1566 } else {
1567 error("Cannot access URL %s, return code %d",
1568 remote->url, results.curl_result);
1569 lock_flags = 0;
58e60dd2 1570 }
58e60dd2 1571 } else {
325ce395 1572 error("Unable to start PROPFIND request on %s", remote->url);
58e60dd2
NH
1573 }
1574
028c2976
MH
1575 strbuf_release(&out_buffer.buf);
1576 strbuf_release(&in_buffer);
acf59575
NH
1577 curl_slist_free_all(dav_headers);
1578
1579 return lock_flags;
58e60dd2
NH
1580}
1581
b5bf7cd6 1582static struct object_list **add_one_object(struct object *obj, struct object_list **p)
1f1e895f
LT
1583{
1584 struct object_list *entry = xmalloc(sizeof(struct object_list));
1585 entry->item = obj;
1586 entry->next = *p;
1587 *p = entry;
1588 return &entry->next;
1589}
1590
aa1dbc98
NH
1591static struct object_list **process_blob(struct blob *blob,
1592 struct object_list **p,
1593 struct name_path *path,
1594 const char *name)
58e60dd2 1595{
aa1dbc98 1596 struct object *obj = &blob->object;
58e60dd2 1597
aa1dbc98
NH
1598 obj->flags |= LOCAL;
1599
1600 if (obj->flags & (UNINTERESTING | SEEN))
1601 return p;
1602
1603 obj->flags |= SEEN;
1f1e895f 1604 return add_one_object(obj, p);
aa1dbc98
NH
1605}
1606
1607static struct object_list **process_tree(struct tree *tree,
1608 struct object_list **p,
1609 struct name_path *path,
1610 const char *name)
1611{
1612 struct object *obj = &tree->object;
2d9c58c6 1613 struct tree_desc desc;
4c068a98 1614 struct name_entry entry;
aa1dbc98
NH
1615 struct name_path me;
1616
1617 obj->flags |= LOCAL;
1618
1619 if (obj->flags & (UNINTERESTING | SEEN))
1620 return p;
1621 if (parse_tree(tree) < 0)
1622 die("bad tree object %s", sha1_to_hex(obj->sha1));
1623
1624 obj->flags |= SEEN;
9befac47 1625 name = xstrdup(name);
1f1e895f 1626 p = add_one_object(obj, p);
aa1dbc98
NH
1627 me.up = path;
1628 me.elem = name;
1629 me.elem_len = strlen(name);
2d9c58c6 1630
6fda5e51 1631 init_tree_desc(&desc, tree->buffer, tree->size);
2d9c58c6 1632
1bbeb4c6
JS
1633 while (tree_entry(&desc, &entry))
1634 switch (object_type(entry.mode)) {
1635 case OBJ_TREE:
4c068a98 1636 p = process_tree(lookup_tree(entry.sha1), p, &me, name);
1bbeb4c6
JS
1637 break;
1638 case OBJ_BLOB:
4c068a98 1639 p = process_blob(lookup_blob(entry.sha1), p, &me, name);
1bbeb4c6
JS
1640 break;
1641 default:
1642 /* Subproject commit - not in this repository */
1643 break;
1644 }
1645
2d9c58c6
LT
1646 free(tree->buffer);
1647 tree->buffer = NULL;
aa1dbc98 1648 return p;
58e60dd2
NH
1649}
1650
1a703cba 1651static int get_delta(struct rev_info *revs, struct remote_lock *lock)
58e60dd2 1652{
1f1e895f 1653 int i;
58e60dd2 1654 struct commit *commit;
1f1e895f 1655 struct object_list **p = &objects;
1a703cba 1656 int count = 0;
58e60dd2 1657
aa1dbc98
NH
1658 while ((commit = get_revision(revs)) != NULL) {
1659 p = process_tree(commit->tree, p, NULL, "");
1660 commit->object.flags |= LOCAL;
1661 if (!(commit->object.flags & UNINTERESTING))
1a703cba 1662 count += add_send_request(&commit->object, lock);
aa1dbc98 1663 }
58e60dd2 1664
1f1e895f
LT
1665 for (i = 0; i < revs->pending.nr; i++) {
1666 struct object_array_entry *entry = revs->pending.objects + i;
1667 struct object *obj = entry->item;
1668 const char *name = entry->name;
58e60dd2 1669
aa1dbc98
NH
1670 if (obj->flags & (UNINTERESTING | SEEN))
1671 continue;
1974632c 1672 if (obj->type == OBJ_TAG) {
aa1dbc98 1673 obj->flags |= SEEN;
1f1e895f 1674 p = add_one_object(obj, p);
aa1dbc98 1675 continue;
58e60dd2 1676 }
1974632c 1677 if (obj->type == OBJ_TREE) {
aa1dbc98
NH
1678 p = process_tree((struct tree *)obj, p, NULL, name);
1679 continue;
58e60dd2 1680 }
1974632c 1681 if (obj->type == OBJ_BLOB) {
aa1dbc98
NH
1682 p = process_blob((struct blob *)obj, p, NULL, name);
1683 continue;
58e60dd2 1684 }
aa1dbc98
NH
1685 die("unknown pending object %s (%s)", sha1_to_hex(obj->sha1), name);
1686 }
1687
1688 while (objects) {
1689 if (!(objects->item->flags & UNINTERESTING))
1a703cba 1690 count += add_send_request(objects->item, lock);
aa1dbc98 1691 objects = objects->next;
58e60dd2 1692 }
1a703cba
NH
1693
1694 return count;
58e60dd2
NH
1695}
1696
aa1dbc98 1697static int update_remote(unsigned char *sha1, struct remote_lock *lock)
58e60dd2
NH
1698{
1699 struct active_request_slot *slot;
baa7b67d 1700 struct slot_results results;
58e60dd2 1701 char *if_header;
028c2976 1702 struct buffer out_buffer = { STRBUF_INIT, 0 };
58e60dd2 1703 struct curl_slist *dav_headers = NULL;
58e60dd2 1704
26349b2e
NH
1705 if_header = xmalloc(strlen(lock->token) + 25);
1706 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
58e60dd2
NH
1707 dav_headers = curl_slist_append(dav_headers, if_header);
1708
028c2976 1709 strbuf_addf(&out_buffer.buf, "%s\n", sha1_to_hex(sha1));
58e60dd2
NH
1710
1711 slot = get_active_slot();
baa7b67d 1712 slot->results = &results;
58e60dd2 1713 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1714 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2
NH
1715 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1716 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1717 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1718 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1719 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1720 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
75187c9d 1721 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1722
1723 if (start_active_slot(slot)) {
1724 run_active_slot(slot);
028c2976 1725 strbuf_release(&out_buffer.buf);
58e60dd2 1726 free(if_header);
baa7b67d 1727 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1728 fprintf(stderr,
1729 "PUT error: curl result=%d, HTTP code=%ld\n",
baa7b67d 1730 results.curl_result, results.http_code);
58e60dd2
NH
1731 /* We should attempt recovery? */
1732 return 0;
1733 }
1734 } else {
028c2976 1735 strbuf_release(&out_buffer.buf);
58e60dd2 1736 free(if_header);
58e60dd2
NH
1737 fprintf(stderr, "Unable to start PUT request\n");
1738 return 0;
1739 }
1740
1741 return 1;
1742}
1743
aa1dbc98
NH
1744static struct ref *local_refs, **local_tail;
1745static struct ref *remote_refs, **remote_tail;
1746
8da19775 1747static int one_local_ref(const char *refname, const unsigned char *sha1, int flag, void *cb_data)
aa1dbc98
NH
1748{
1749 struct ref *ref;
1750 int len = strlen(refname) + 1;
1751 ref = xcalloc(1, sizeof(*ref) + len);
e702496e 1752 hashcpy(ref->new_sha1, sha1);
aa1dbc98
NH
1753 memcpy(ref->name, refname, len);
1754 *local_tail = ref;
1755 local_tail = &ref->next;
1756 return 0;
1757}
1758
1759static void one_remote_ref(char *refname)
1760{
1761 struct ref *ref;
197e8951 1762 struct object *obj;
aa1dbc98 1763
737922aa 1764 ref = alloc_ref_from_str(refname);
c13b2633
DB
1765
1766 if (http_fetch_ref(remote->url, ref) != 0) {
aa1dbc98
NH
1767 fprintf(stderr,
1768 "Unable to fetch ref %s from %s\n",
1769 refname, remote->url);
c13b2633 1770 free(ref);
aa1dbc98
NH
1771 return;
1772 }
1773
197e8951
NH
1774 /*
1775 * Fetch a copy of the object if it doesn't exist locally - it
1776 * may be required for updating server info later.
1777 */
c13b2633
DB
1778 if (remote->can_update_info_refs && !has_sha1_file(ref->old_sha1)) {
1779 obj = lookup_unknown_object(ref->old_sha1);
197e8951
NH
1780 if (obj) {
1781 fprintf(stderr, " fetch %s for %s\n",
c13b2633 1782 sha1_to_hex(ref->old_sha1), refname);
197e8951
NH
1783 add_fetch_request(obj);
1784 }
1785 }
1786
aa1dbc98
NH
1787 *remote_tail = ref;
1788 remote_tail = &ref->next;
1789}
1790
1791static void get_local_heads(void)
1792{
1793 local_tail = &local_refs;
cb5d709f 1794 for_each_ref(one_local_ref, NULL);
aa1dbc98
NH
1795}
1796
1797static void get_dav_remote_heads(void)
1798{
1799 remote_tail = &remote_refs;
3030baa7 1800 remote_ls("refs/", (PROCESS_FILES | PROCESS_DIRS | RECURSIVE), process_ls_ref, NULL);
aa1dbc98
NH
1801}
1802
1803static int is_zero_sha1(const unsigned char *sha1)
1804{
1805 int i;
1806
1807 for (i = 0; i < 20; i++) {
1808 if (*sha1++)
1809 return 0;
1810 }
1811 return 1;
1812}
1813
1814static void unmark_and_free(struct commit_list *list, unsigned int mark)
1815{
1816 while (list) {
1817 struct commit_list *temp = list;
1818 temp->item->object.flags &= ~mark;
1819 list = temp->next;
1820 free(temp);
1821 }
1822}
1823
1824static int ref_newer(const unsigned char *new_sha1,
1825 const unsigned char *old_sha1)
1826{
1827 struct object *o;
1828 struct commit *old, *new;
1829 struct commit_list *list, *used;
1830 int found = 0;
1831
1832 /* Both new and old must be commit-ish and new is descendant of
1833 * old. Otherwise we require --force.
1834 */
1835 o = deref_tag(parse_object(old_sha1), NULL, 0);
1974632c 1836 if (!o || o->type != OBJ_COMMIT)
aa1dbc98
NH
1837 return 0;
1838 old = (struct commit *) o;
1839
1840 o = deref_tag(parse_object(new_sha1), NULL, 0);
1974632c 1841 if (!o || o->type != OBJ_COMMIT)
aa1dbc98
NH
1842 return 0;
1843 new = (struct commit *) o;
1844
1845 if (parse_commit(new) < 0)
1846 return 0;
1847
1848 used = list = NULL;
1849 commit_list_insert(new, &list);
1850 while (list) {
1851 new = pop_most_recent_commit(&list, TMP_MARK);
1852 commit_list_insert(new, &used);
1853 if (new == old) {
1854 found = 1;
1855 break;
1856 }
1857 }
1858 unmark_and_free(list, TMP_MARK);
1859 unmark_and_free(used, TMP_MARK);
1860 return found;
1861}
1862
1863static void mark_edge_parents_uninteresting(struct commit *commit)
1864{
1865 struct commit_list *parents;
1866
1867 for (parents = commit->parents; parents; parents = parents->next) {
1868 struct commit *parent = parents->item;
1869 if (!(parent->object.flags & UNINTERESTING))
1870 continue;
1871 mark_tree_uninteresting(parent->tree);
1872 }
1873}
1874
1875static void mark_edges_uninteresting(struct commit_list *list)
1876{
1877 for ( ; list; list = list->next) {
1878 struct commit *commit = list->item;
1879
1880 if (commit->object.flags & UNINTERESTING) {
1881 mark_tree_uninteresting(commit->tree);
1882 continue;
1883 }
1884 mark_edge_parents_uninteresting(commit);
1885 }
1886}
1887
197e8951
NH
1888static void add_remote_info_ref(struct remote_ls_ctx *ls)
1889{
028c2976 1890 struct strbuf *buf = (struct strbuf *)ls->userData;
197e8951
NH
1891 struct object *o;
1892 int len;
1893 char *ref_info;
c13b2633
DB
1894 struct ref *ref;
1895
737922aa 1896 ref = alloc_ref_from_str(ls->dentry_name);
197e8951 1897
c13b2633 1898 if (http_fetch_ref(remote->url, ref) != 0) {
197e8951
NH
1899 fprintf(stderr,
1900 "Unable to fetch ref %s from %s\n",
1901 ls->dentry_name, remote->url);
1902 aborted = 1;
c13b2633 1903 free(ref);
197e8951
NH
1904 return;
1905 }
1906
c13b2633 1907 o = parse_object(ref->old_sha1);
197e8951
NH
1908 if (!o) {
1909 fprintf(stderr,
1910 "Unable to parse object %s for remote ref %s\n",
c13b2633 1911 sha1_to_hex(ref->old_sha1), ls->dentry_name);
197e8951 1912 aborted = 1;
c13b2633 1913 free(ref);
197e8951
NH
1914 return;
1915 }
1916
1917 len = strlen(ls->dentry_name) + 42;
1918 ref_info = xcalloc(len + 1, 1);
1919 sprintf(ref_info, "%s %s\n",
c13b2633 1920 sha1_to_hex(ref->old_sha1), ls->dentry_name);
197e8951
NH
1921 fwrite_buffer(ref_info, 1, len, buf);
1922 free(ref_info);
1923
1974632c 1924 if (o->type == OBJ_TAG) {
197e8951
NH
1925 o = deref_tag(o, ls->dentry_name, 0);
1926 if (o) {
1927 len = strlen(ls->dentry_name) + 45;
1928 ref_info = xcalloc(len + 1, 1);
1929 sprintf(ref_info, "%s %s^{}\n",
1930 sha1_to_hex(o->sha1), ls->dentry_name);
1931 fwrite_buffer(ref_info, 1, len, buf);
1932 free(ref_info);
1933 }
1934 }
c13b2633 1935 free(ref);
197e8951
NH
1936}
1937
1938static void update_remote_info_refs(struct remote_lock *lock)
1939{
028c2976 1940 struct buffer buffer = { STRBUF_INIT, 0 };
197e8951
NH
1941 struct active_request_slot *slot;
1942 struct slot_results results;
1943 char *if_header;
1944 struct curl_slist *dav_headers = NULL;
1945
197e8951 1946 remote_ls("refs/", (PROCESS_FILES | RECURSIVE),
028c2976 1947 add_remote_info_ref, &buffer.buf);
197e8951
NH
1948 if (!aborted) {
1949 if_header = xmalloc(strlen(lock->token) + 25);
1950 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
1951 dav_headers = curl_slist_append(dav_headers, if_header);
1952
1953 slot = get_active_slot();
1954 slot->results = &results;
1955 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &buffer);
028c2976 1956 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, buffer.buf.len);
197e8951
NH
1957 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1958 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1959 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1960 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1961 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1962 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
1963 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
1964
197e8951
NH
1965 if (start_active_slot(slot)) {
1966 run_active_slot(slot);
1967 if (results.curl_result != CURLE_OK) {
1968 fprintf(stderr,
1969 "PUT error: curl result=%d, HTTP code=%ld\n",
1970 results.curl_result, results.http_code);
1971 }
1972 }
1973 free(if_header);
1974 }
028c2976 1975 strbuf_release(&buffer.buf);
197e8951
NH
1976}
1977
1978static int remote_exists(const char *path)
1979{
1980 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
1981 struct active_request_slot *slot;
1982 struct slot_results results;
3a462bc9 1983 int ret = -1;
197e8951
NH
1984
1985 sprintf(url, "%s%s", remote->url, path);
1986
028c2976 1987 slot = get_active_slot();
197e8951 1988 slot->results = &results;
028c2976
MH
1989 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1990 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
197e8951 1991
028c2976 1992 if (start_active_slot(slot)) {
197e8951
NH
1993 run_active_slot(slot);
1994 if (results.http_code == 404)
3a462bc9 1995 ret = 0;
197e8951 1996 else if (results.curl_result == CURLE_OK)
3a462bc9 1997 ret = 1;
197e8951
NH
1998 else
1999 fprintf(stderr, "HEAD HTTP error %ld\n", results.http_code);
2000 } else {
2001 fprintf(stderr, "Unable to start HEAD request\n");
2002 }
2003
3a462bc9
MH
2004 free(url);
2005 return ret;
197e8951
NH
2006}
2007
554fe20d 2008static void fetch_symref(const char *path, char **symref, unsigned char *sha1)
3dfaf7bc
NH
2009{
2010 char *url;
028c2976 2011 struct strbuf buffer = STRBUF_INIT;
3dfaf7bc
NH
2012 struct active_request_slot *slot;
2013 struct slot_results results;
2014
2015 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
2016 sprintf(url, "%s%s", remote->url, path);
2017
3dfaf7bc
NH
2018 slot = get_active_slot();
2019 slot->results = &results;
2020 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
2021 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
2022 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
2023 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2024 if (start_active_slot(slot)) {
2025 run_active_slot(slot);
2026 if (results.curl_result != CURLE_OK) {
2027 die("Couldn't get %s for remote symref\n%s",
2028 url, curl_errorstr);
2029 }
2030 } else {
2031 die("Unable to start remote symref request");
2032 }
2033 free(url);
2034
8e0f7003 2035 free(*symref);
3dfaf7bc 2036 *symref = NULL;
a8e0d16d 2037 hashclr(sha1);
3dfaf7bc 2038
028c2976 2039 if (buffer.len == 0)
3dfaf7bc
NH
2040 return;
2041
2042 /* If it's a symref, set the refname; otherwise try for a sha1 */
028c2976
MH
2043 if (!prefixcmp((char *)buffer.buf, "ref: ")) {
2044 *symref = xmemdupz((char *)buffer.buf + 5, buffer.len - 6);
3dfaf7bc 2045 } else {
028c2976 2046 get_sha1_hex(buffer.buf, sha1);
3dfaf7bc
NH
2047 }
2048
028c2976 2049 strbuf_release(&buffer);
3dfaf7bc
NH
2050}
2051
2052static int verify_merge_base(unsigned char *head_sha1, unsigned char *branch_sha1)
2053{
61ffbcb9
JS
2054 struct commit *head = lookup_commit(head_sha1);
2055 struct commit *branch = lookup_commit(branch_sha1);
2056 struct commit_list *merge_bases = get_merge_bases(head, branch, 1);
3dfaf7bc 2057
0bc87ffb 2058 return (merge_bases && !merge_bases->next && merge_bases->item == branch);
3dfaf7bc
NH
2059}
2060
2061static int delete_remote_branch(char *pattern, int force)
2062{
2063 struct ref *refs = remote_refs;
2064 struct ref *remote_ref = NULL;
2065 unsigned char head_sha1[20];
2066 char *symref = NULL;
2067 int match;
2068 int patlen = strlen(pattern);
2069 int i;
2070 struct active_request_slot *slot;
2071 struct slot_results results;
2072 char *url;
2073
2074 /* Find the remote branch(es) matching the specified branch name */
2075 for (match = 0; refs; refs = refs->next) {
2076 char *name = refs->name;
2077 int namelen = strlen(name);
2078 if (namelen < patlen ||
2079 memcmp(name + namelen - patlen, pattern, patlen))
2080 continue;
2081 if (namelen != patlen && name[namelen - patlen - 1] != '/')
2082 continue;
2083 match++;
2084 remote_ref = refs;
2085 }
2086 if (match == 0)
2087 return error("No remote branch matches %s", pattern);
2088 if (match != 1)
2089 return error("More than one remote branch matches %s",
2090 pattern);
2091
2092 /*
2093 * Remote HEAD must be a symref (not exactly foolproof; a remote
2094 * symlink to a symref will look like a symref)
2095 */
2096 fetch_symref("HEAD", &symref, head_sha1);
2097 if (!symref)
2098 return error("Remote HEAD is not a symref");
2099
2100 /* Remote branch must not be the remote HEAD */
2101 for (i=0; symref && i<MAXDEPTH; i++) {
2102 if (!strcmp(remote_ref->name, symref))
2103 return error("Remote branch %s is the current HEAD",
2104 remote_ref->name);
2105 fetch_symref(symref, &symref, head_sha1);
2106 }
2107
2108 /* Run extra sanity checks if delete is not forced */
2109 if (!force) {
2110 /* Remote HEAD must resolve to a known object */
2111 if (symref)
2112 return error("Remote HEAD symrefs too deep");
2113 if (is_zero_sha1(head_sha1))
2114 return error("Unable to resolve remote HEAD");
2115 if (!has_sha1_file(head_sha1))
2116 return error("Remote HEAD resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", sha1_to_hex(head_sha1));
2117
2118 /* Remote branch must resolve to a known object */
2119 if (is_zero_sha1(remote_ref->old_sha1))
2120 return error("Unable to resolve remote branch %s",
2121 remote_ref->name);
2122 if (!has_sha1_file(remote_ref->old_sha1))
2123 return error("Remote branch %s resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", remote_ref->name, sha1_to_hex(remote_ref->old_sha1));
2124
2125 /* Remote branch must be an ancestor of remote HEAD */
2126 if (!verify_merge_base(head_sha1, remote_ref->old_sha1)) {
00ae8289
BF
2127 return error("The branch '%s' is not an ancestor "
2128 "of your current HEAD.\n"
2129 "If you are sure you want to delete it,"
2130 " run:\n\t'git http-push -D %s %s'",
2131 remote_ref->name, remote->url, pattern);
3dfaf7bc
NH
2132 }
2133 }
2134
2135 /* Send delete request */
2136 fprintf(stderr, "Removing remote branch '%s'\n", remote_ref->name);
6eaf4060
CB
2137 if (dry_run)
2138 return 0;
3dfaf7bc
NH
2139 url = xmalloc(strlen(remote->url) + strlen(remote_ref->name) + 1);
2140 sprintf(url, "%s%s", remote->url, remote_ref->name);
2141 slot = get_active_slot();
2142 slot->results = &results;
2143 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
2144 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
2145 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2146 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_DELETE);
2147 if (start_active_slot(slot)) {
2148 run_active_slot(slot);
2149 free(url);
2150 if (results.curl_result != CURLE_OK)
2151 return error("DELETE request failed (%d/%ld)\n",
2152 results.curl_result, results.http_code);
2153 } else {
2154 free(url);
2155 return error("Unable to start DELETE request");
2156 }
2157
2158 return 0;
2159}
2160
58e60dd2
NH
2161int main(int argc, char **argv)
2162{
58e60dd2
NH
2163 struct transfer_request *request;
2164 struct transfer_request *next_request;
2165 int nr_refspec = 0;
2166 char **refspec = NULL;
512d632c 2167 struct remote_lock *ref_lock = NULL;
197e8951 2168 struct remote_lock *info_ref_lock = NULL;
aa1dbc98 2169 struct rev_info revs;
3dfaf7bc
NH
2170 int delete_branch = 0;
2171 int force_delete = 0;
1a703cba 2172 int objects_to_send;
58e60dd2
NH
2173 int rc = 0;
2174 int i;
8c9e7947
JH
2175 int new_refs;
2176 struct ref *ref;
3057ded0 2177 char *rewritten_url = NULL;
58e60dd2 2178
5a327713 2179 setup_git_directory();
58e60dd2 2180
512d632c 2181 remote = xcalloc(sizeof(*remote), 1);
58e60dd2
NH
2182
2183 argv++;
2184 for (i = 1; i < argc; i++, argv++) {
2185 char *arg = *argv;
2186
2187 if (*arg == '-') {
aa1dbc98 2188 if (!strcmp(arg, "--all")) {
28b9d6e5 2189 push_all = MATCH_REFS_ALL;
58e60dd2
NH
2190 continue;
2191 }
2192 if (!strcmp(arg, "--force")) {
2193 force_all = 1;
2194 continue;
2195 }
fe5d1d3e
SP
2196 if (!strcmp(arg, "--dry-run")) {
2197 dry_run = 1;
2198 continue;
2199 }
58e60dd2
NH
2200 if (!strcmp(arg, "--verbose")) {
2201 push_verbosely = 1;
2202 continue;
2203 }
3dfaf7bc
NH
2204 if (!strcmp(arg, "-d")) {
2205 delete_branch = 1;
2206 continue;
2207 }
2208 if (!strcmp(arg, "-D")) {
2209 delete_branch = 1;
2210 force_delete = 1;
2211 continue;
2212 }
58e60dd2
NH
2213 }
2214 if (!remote->url) {
aa1dbc98 2215 char *path = strstr(arg, "//");
8c9e7947 2216 remote->url = arg;
aa1dbc98 2217 if (path) {
ef9e58c8 2218 path = strchr(path+2, '/');
aa1dbc98
NH
2219 if (path)
2220 remote->path_len = strlen(path);
2221 }
58e60dd2
NH
2222 continue;
2223 }
2224 refspec = argv;
2225 nr_refspec = argc - i;
2226 break;
2227 }
2228
f854824b
GB
2229#ifndef USE_CURL_MULTI
2230 die("git-push is not available for http/https repository when not compiled with USE_CURL_MULTI");
2231#endif
2232
3e9fabc8
NH
2233 if (!remote->url)
2234 usage(http_push_usage);
2235
3dfaf7bc
NH
2236 if (delete_branch && nr_refspec != 1)
2237 die("You must specify only one branch name when deleting a remote branch");
2238
aa1dbc98 2239 memset(remote_dir_exists, -1, 256);
0dd276b8 2240
9fc6440d 2241 http_init(NULL);
58e60dd2
NH
2242
2243 no_pragma_header = curl_slist_append(no_pragma_header, "Pragma:");
58e60dd2 2244
3057ded0
GB
2245 if (remote->url && remote->url[strlen(remote->url)-1] != '/') {
2246 rewritten_url = malloc(strlen(remote->url)+2);
2247 strcpy(rewritten_url, remote->url);
2248 strcat(rewritten_url, "/");
2249 remote->url = rewritten_url;
2250 ++remote->path_len;
2251 }
2252
58e60dd2 2253 /* Verify DAV compliance/lock support */
acf59575 2254 if (!locking_available()) {
58e60dd2
NH
2255 rc = 1;
2256 goto cleanup;
2257 }
2258
197e8951
NH
2259 /* Check whether the remote has server info files */
2260 remote->can_update_info_refs = 0;
2261 remote->has_info_refs = remote_exists("info/refs");
2262 remote->has_info_packs = remote_exists("objects/info/packs");
2263 if (remote->has_info_refs) {
2264 info_ref_lock = lock_remote("info/refs", LOCK_TIME);
2265 if (info_ref_lock)
2266 remote->can_update_info_refs = 1;
9bdbabad
GB
2267 else {
2268 fprintf(stderr, "Error: cannot lock existing info/refs\n");
2269 rc = 1;
2270 goto cleanup;
2271 }
197e8951
NH
2272 }
2273 if (remote->has_info_packs)
2274 fetch_indices();
2275
aa1dbc98
NH
2276 /* Get a list of all local and remote heads to validate refspecs */
2277 get_local_heads();
2278 fprintf(stderr, "Fetching remote heads...\n");
2279 get_dav_remote_heads();
2280
3dfaf7bc
NH
2281 /* Remove a remote branch if -d or -D was specified */
2282 if (delete_branch) {
2283 if (delete_remote_branch(refspec[0], force_delete) == -1)
2284 fprintf(stderr, "Unable to delete remote branch %s\n",
2285 refspec[0]);
2286 goto cleanup;
2287 }
2288
aa1dbc98
NH
2289 /* match them up */
2290 if (!remote_tail)
2291 remote_tail = &remote_refs;
2292 if (match_refs(local_refs, remote_refs, &remote_tail,
9116de59
GB
2293 nr_refspec, (const char **) refspec, push_all)) {
2294 rc = -1;
2295 goto cleanup;
2296 }
aa1dbc98
NH
2297 if (!remote_refs) {
2298 fprintf(stderr, "No refs in common and none specified; doing nothing.\n");
9116de59
GB
2299 rc = 0;
2300 goto cleanup;
aa1dbc98
NH
2301 }
2302
8c9e7947 2303 new_refs = 0;
aa1dbc98
NH
2304 for (ref = remote_refs; ref; ref = ref->next) {
2305 char old_hex[60], *new_hex;
8c9e7947
JH
2306 const char *commit_argv[4];
2307 int commit_argc;
2308 char *new_sha1_hex, *old_sha1_hex;
2309
aa1dbc98
NH
2310 if (!ref->peer_ref)
2311 continue;
6eaf4060
CB
2312
2313 if (is_zero_sha1(ref->peer_ref->new_sha1)) {
2314 if (delete_remote_branch(ref->name, 1) == -1) {
2315 error("Could not remove %s", ref->name);
2316 rc = -4;
2317 }
2318 new_refs++;
2319 continue;
2320 }
2321
a89fccd2 2322 if (!hashcmp(ref->old_sha1, ref->peer_ref->new_sha1)) {
aa1dbc98
NH
2323 if (push_verbosely || 1)
2324 fprintf(stderr, "'%s': up-to-date\n", ref->name);
2325 continue;
2326 }
2327
2328 if (!force_all &&
2329 !is_zero_sha1(ref->old_sha1) &&
2330 !ref->force) {
2331 if (!has_sha1_file(ref->old_sha1) ||
2332 !ref_newer(ref->peer_ref->new_sha1,
2333 ref->old_sha1)) {
00ae8289
BF
2334 /*
2335 * We do not have the remote ref, or
aa1dbc98
NH
2336 * we know that the remote ref is not
2337 * an ancestor of what we are trying to
2338 * push. Either way this can be losing
2339 * commits at the remote end and likely
2340 * we were not up to date to begin with.
2341 */
00ae8289
BF
2342 error("remote '%s' is not an ancestor of\n"
2343 "local '%s'.\n"
2344 "Maybe you are not up-to-date and "
aa1dbc98
NH
2345 "need to pull first?",
2346 ref->name,
2347 ref->peer_ref->name);
1a703cba 2348 rc = -2;
aa1dbc98
NH
2349 continue;
2350 }
58e60dd2 2351 }
e702496e 2352 hashcpy(ref->new_sha1, ref->peer_ref->new_sha1);
aa1dbc98
NH
2353 new_refs++;
2354 strcpy(old_hex, sha1_to_hex(ref->old_sha1));
2355 new_hex = sha1_to_hex(ref->new_sha1);
2356
2357 fprintf(stderr, "updating '%s'", ref->name);
2358 if (strcmp(ref->name, ref->peer_ref->name))
2359 fprintf(stderr, " using '%s'", ref->peer_ref->name);
2360 fprintf(stderr, "\n from %s\n to %s\n", old_hex, new_hex);
fe5d1d3e
SP
2361 if (dry_run)
2362 continue;
58e60dd2
NH
2363
2364 /* Lock remote branch ref */
aa1dbc98
NH
2365 ref_lock = lock_remote(ref->name, LOCK_TIME);
2366 if (ref_lock == NULL) {
58e60dd2 2367 fprintf(stderr, "Unable to lock remote branch %s\n",
aa1dbc98 2368 ref->name);
58e60dd2
NH
2369 rc = 1;
2370 continue;
2371 }
2372
aa1dbc98 2373 /* Set up revision info for this refspec */
8c9e7947 2374 commit_argc = 3;
9befac47 2375 new_sha1_hex = xstrdup(sha1_to_hex(ref->new_sha1));
8c9e7947 2376 old_sha1_hex = NULL;
5241bfe6
NH
2377 commit_argv[1] = "--objects";
2378 commit_argv[2] = new_sha1_hex;
aa1dbc98
NH
2379 if (!push_all && !is_zero_sha1(ref->old_sha1)) {
2380 old_sha1_hex = xmalloc(42);
2381 sprintf(old_sha1_hex, "^%s",
2382 sha1_to_hex(ref->old_sha1));
5241bfe6 2383 commit_argv[3] = old_sha1_hex;
aa1dbc98 2384 commit_argc++;
58e60dd2 2385 }
db6296a5 2386 init_revisions(&revs, setup_git_directory());
aa1dbc98 2387 setup_revisions(commit_argc, commit_argv, &revs, NULL);
aa1dbc98
NH
2388 free(new_sha1_hex);
2389 if (old_sha1_hex) {
2390 free(old_sha1_hex);
2391 commit_argv[1] = NULL;
58e60dd2
NH
2392 }
2393
aa1dbc98 2394 /* Generate a list of objects that need to be pushed */
58e60dd2 2395 pushing = 0;
3d51e1b5
MK
2396 if (prepare_revision_walk(&revs))
2397 die("revision walk setup failed");
aa1dbc98 2398 mark_edges_uninteresting(revs.commits);
1a703cba 2399 objects_to_send = get_delta(&revs, ref_lock);
29508e1e 2400 finish_all_active_slots();
58e60dd2
NH
2401
2402 /* Push missing objects to remote, this would be a
2403 convenient time to pack them first if appropriate. */
2404 pushing = 1;
1a703cba
NH
2405 if (objects_to_send)
2406 fprintf(stderr, " sending %d objects\n",
2407 objects_to_send);
b3ca4e4e 2408#ifdef USE_CURL_MULTI
29508e1e 2409 fill_active_slots();
fc57b6aa 2410 add_fill_function(NULL, fill_active_slot);
b3ca4e4e 2411#endif
add8e8ce
JS
2412 do {
2413 finish_all_active_slots();
2414#ifdef USE_CURL_MULTI
2415 fill_active_slots();
2416#endif
2417 } while (request_queue_head && !aborted);
58e60dd2
NH
2418
2419 /* Update the remote branch if all went well */
7fea9c55 2420 if (aborted || !update_remote(ref->new_sha1, ref_lock))
aa1dbc98 2421 rc = 1;
58e60dd2 2422
aa1dbc98
NH
2423 if (!rc)
2424 fprintf(stderr, " done\n");
2425 unlock_remote(ref_lock);
512d632c 2426 check_locks();
58e60dd2
NH
2427 }
2428
197e8951
NH
2429 /* Update remote server info if appropriate */
2430 if (remote->has_info_refs && new_refs) {
2431 if (info_ref_lock && remote->can_update_info_refs) {
2432 fprintf(stderr, "Updating remote server info\n");
fe5d1d3e
SP
2433 if (!dry_run)
2434 update_remote_info_refs(info_ref_lock);
197e8951
NH
2435 } else {
2436 fprintf(stderr, "Unable to update server info\n");
2437 }
2438 }
197e8951 2439
58e60dd2 2440 cleanup:
8e0f7003 2441 free(rewritten_url);
9116de59
GB
2442 if (info_ref_lock)
2443 unlock_remote(info_ref_lock);
58e60dd2
NH
2444 free(remote);
2445
2446 curl_slist_free_all(no_pragma_header);
58e60dd2 2447
29508e1e 2448 http_cleanup();
58e60dd2
NH
2449
2450 request = request_queue_head;
2451 while (request != NULL) {
2452 next_request = request->next;
2453 release_request(request);
58e60dd2
NH
2454 request = next_request;
2455 }
2456
58e60dd2
NH
2457 return rc;
2458}