]> git.ipfire.org Git - thirdparty/git.git/blame - http.c
config: add generic callback wrapper to parse section.<url>.key
[thirdparty/git.git] / http.c
CommitLineData
29508e1e 1#include "http.h"
2264dfa5 2#include "pack.h"
de1a2fdd 3#include "sideband.h"
fe72d420 4#include "run-command.h"
f39f72d8 5#include "url.h"
148bb6a7 6#include "credential.h"
745c7c8e 7#include "version.h"
047ec602 8#include "pkt-line.h"
29508e1e 9
4251ccbd 10int active_requests;
e9176745 11int http_is_verbose;
de1a2fdd 12size_t http_post_buffer = 16 * LARGE_PACKET_MAX;
29508e1e 13
b8ac9230
MS
14#if LIBCURL_VERSION_NUM >= 0x070a06
15#define LIBCURL_CAN_HANDLE_AUTH_ANY
16#endif
17
ad75ebe5
TRC
18static int min_curl_sessions = 1;
19static int curl_session_count;
29508e1e 20#ifdef USE_CURL_MULTI
cc3530e8
MH
21static int max_requests = -1;
22static CURLM *curlm;
29508e1e
NH
23#endif
24#ifndef NO_CURL_EASY_DUPHANDLE
cc3530e8 25static CURL *curl_default;
29508e1e 26#endif
5424bc55
TRC
27
28#define PREV_BUF_SIZE 4096
29#define RANGE_HEADER_SIZE 30
30
29508e1e
NH
31char curl_errorstr[CURL_ERROR_SIZE];
32
cc3530e8 33static int curl_ssl_verify = -1;
4bc444eb 34static int curl_ssl_try;
4251ccbd 35static const char *ssl_cert;
ef52aafa 36#if LIBCURL_VERSION_NUM >= 0x070903
4251ccbd 37static const char *ssl_key;
29508e1e
NH
38#endif
39#if LIBCURL_VERSION_NUM >= 0x070908
4251ccbd 40static const char *ssl_capath;
29508e1e 41#endif
4251ccbd 42static const char *ssl_cainfo;
cc3530e8
MH
43static long curl_low_speed_limit = -1;
44static long curl_low_speed_time = -1;
4251ccbd
JH
45static int curl_ftp_no_epsv;
46static const char *curl_http_proxy;
bcfb95dd 47static const char *curl_cookie_file;
148bb6a7 48static struct credential http_auth = CREDENTIAL_INIT;
a4ddbc33 49static int http_proactive_auth;
b1d1058c 50static const char *user_agent;
29508e1e 51
30dd9163
ML
52#if LIBCURL_VERSION_NUM >= 0x071700
53/* Use CURLOPT_KEYPASSWD as is */
54#elif LIBCURL_VERSION_NUM >= 0x070903
55#define CURLOPT_KEYPASSWD CURLOPT_SSLKEYPASSWD
56#else
57#define CURLOPT_KEYPASSWD CURLOPT_SSLCERTPASSWD
58#endif
59
148bb6a7 60static struct credential cert_auth = CREDENTIAL_INIT;
30dd9163
ML
61static int ssl_cert_password_required;
62
cc3530e8 63static struct curl_slist *pragma_header;
5424bc55 64static struct curl_slist *no_pragma_header;
e9176745 65
4251ccbd 66static struct active_request_slot *active_queue_head;
29508e1e 67
a04ff3ec 68size_t fread_buffer(char *ptr, size_t eltsize, size_t nmemb, void *buffer_)
29508e1e
NH
69{
70 size_t size = eltsize * nmemb;
f444e528
JH
71 struct buffer *buffer = buffer_;
72
028c2976
MH
73 if (size > buffer->buf.len - buffer->posn)
74 size = buffer->buf.len - buffer->posn;
75 memcpy(ptr, buffer->buf.buf + buffer->posn, size);
29508e1e 76 buffer->posn += size;
028c2976 77
29508e1e
NH
78 return size;
79}
80
3944ba0c
MS
81#ifndef NO_CURL_IOCTL
82curlioerr ioctl_buffer(CURL *handle, int cmd, void *clientp)
83{
84 struct buffer *buffer = clientp;
85
86 switch (cmd) {
87 case CURLIOCMD_NOP:
88 return CURLIOE_OK;
89
90 case CURLIOCMD_RESTARTREAD:
91 buffer->posn = 0;
92 return CURLIOE_OK;
93
94 default:
95 return CURLIOE_UNKNOWNCMD;
96 }
97}
98#endif
99
a04ff3ec 100size_t fwrite_buffer(char *ptr, size_t eltsize, size_t nmemb, void *buffer_)
29508e1e
NH
101{
102 size_t size = eltsize * nmemb;
f444e528
JH
103 struct strbuf *buffer = buffer_;
104
028c2976 105 strbuf_add(buffer, ptr, size);
29508e1e
NH
106 return size;
107}
108
a04ff3ec 109size_t fwrite_null(char *ptr, size_t eltsize, size_t nmemb, void *strbuf)
29508e1e 110{
29508e1e
NH
111 return eltsize * nmemb;
112}
113
29508e1e
NH
114#ifdef USE_CURL_MULTI
115static void process_curl_messages(void)
116{
117 int num_messages;
118 struct active_request_slot *slot;
119 CURLMsg *curl_message = curl_multi_info_read(curlm, &num_messages);
120
121 while (curl_message != NULL) {
122 if (curl_message->msg == CURLMSG_DONE) {
123 int curl_result = curl_message->data.result;
124 slot = active_queue_head;
125 while (slot != NULL &&
126 slot->curl != curl_message->easy_handle)
127 slot = slot->next;
128 if (slot != NULL) {
129 curl_multi_remove_handle(curlm, slot->curl);
130 slot->curl_result = curl_result;
131 finish_active_slot(slot);
132 } else {
133 fprintf(stderr, "Received DONE message for unknown request!\n");
134 }
135 } else {
136 fprintf(stderr, "Unknown CURL message received: %d\n",
137 (int)curl_message->msg);
138 }
139 curl_message = curl_multi_info_read(curlm, &num_messages);
140 }
141}
142#endif
143
ef90d6d4 144static int http_options(const char *var, const char *value, void *cb)
29508e1e
NH
145{
146 if (!strcmp("http.sslverify", var)) {
7059cd99 147 curl_ssl_verify = git_config_bool(var, value);
29508e1e
NH
148 return 0;
149 }
7059cd99
JH
150 if (!strcmp("http.sslcert", var))
151 return git_config_string(&ssl_cert, var, value);
ef52aafa 152#if LIBCURL_VERSION_NUM >= 0x070903
7059cd99
JH
153 if (!strcmp("http.sslkey", var))
154 return git_config_string(&ssl_key, var, value);
29508e1e
NH
155#endif
156#if LIBCURL_VERSION_NUM >= 0x070908
7059cd99
JH
157 if (!strcmp("http.sslcapath", var))
158 return git_config_string(&ssl_capath, var, value);
29508e1e 159#endif
7059cd99
JH
160 if (!strcmp("http.sslcainfo", var))
161 return git_config_string(&ssl_cainfo, var, value);
754ae192 162 if (!strcmp("http.sslcertpasswordprotected", var)) {
3f4ccd2b 163 ssl_cert_password_required = git_config_bool(var, value);
754ae192
ML
164 return 0;
165 }
4bc444eb
MV
166 if (!strcmp("http.ssltry", var)) {
167 curl_ssl_try = git_config_bool(var, value);
168 return 0;
169 }
ad75ebe5
TRC
170 if (!strcmp("http.minsessions", var)) {
171 min_curl_sessions = git_config_int(var, value);
172#ifndef USE_CURL_MULTI
173 if (min_curl_sessions > 1)
174 min_curl_sessions = 1;
175#endif
176 return 0;
177 }
a6080a0a 178#ifdef USE_CURL_MULTI
29508e1e 179 if (!strcmp("http.maxrequests", var)) {
7059cd99 180 max_requests = git_config_int(var, value);
29508e1e
NH
181 return 0;
182 }
183#endif
29508e1e 184 if (!strcmp("http.lowspeedlimit", var)) {
7059cd99 185 curl_low_speed_limit = (long)git_config_int(var, value);
29508e1e
NH
186 return 0;
187 }
188 if (!strcmp("http.lowspeedtime", var)) {
7059cd99 189 curl_low_speed_time = (long)git_config_int(var, value);
29508e1e
NH
190 return 0;
191 }
192
3ea099d4
SK
193 if (!strcmp("http.noepsv", var)) {
194 curl_ftp_no_epsv = git_config_bool(var, value);
195 return 0;
196 }
7059cd99
JH
197 if (!strcmp("http.proxy", var))
198 return git_config_string(&curl_http_proxy, var, value);
3ea099d4 199
bcfb95dd
DB
200 if (!strcmp("http.cookiefile", var))
201 return git_config_string(&curl_cookie_file, var, value);
202
de1a2fdd
SP
203 if (!strcmp("http.postbuffer", var)) {
204 http_post_buffer = git_config_int(var, value);
205 if (http_post_buffer < LARGE_PACKET_MAX)
206 http_post_buffer = LARGE_PACKET_MAX;
207 return 0;
208 }
209
b1d1058c
SO
210 if (!strcmp("http.useragent", var))
211 return git_config_string(&user_agent, var, value);
212
29508e1e 213 /* Fall back on the default ones */
ef90d6d4 214 return git_default_config(var, value, cb);
29508e1e
NH
215}
216
c33976cb
JH
217static void init_curl_http_auth(CURL *result)
218{
6f4c347c
JK
219 if (!http_auth.username)
220 return;
221
222 credential_fill(&http_auth);
223
224#if LIBCURL_VERSION_NUM >= 0x071301
225 curl_easy_setopt(result, CURLOPT_USERNAME, http_auth.username);
226 curl_easy_setopt(result, CURLOPT_PASSWORD, http_auth.password);
227#else
228 {
aa0834a0 229 static struct strbuf up = STRBUF_INIT;
aa0834a0 230 strbuf_reset(&up);
148bb6a7
JK
231 strbuf_addf(&up, "%s:%s",
232 http_auth.username, http_auth.password);
aa0834a0 233 curl_easy_setopt(result, CURLOPT_USERPWD, up.buf);
c33976cb 234 }
6f4c347c 235#endif
c33976cb
JH
236}
237
30dd9163
ML
238static int has_cert_password(void)
239{
30dd9163
ML
240 if (ssl_cert == NULL || ssl_cert_password_required != 1)
241 return 0;
148bb6a7
JK
242 if (!cert_auth.password) {
243 cert_auth.protocol = xstrdup("cert");
75e9a405 244 cert_auth.username = xstrdup("");
148bb6a7
JK
245 cert_auth.path = xstrdup(ssl_cert);
246 credential_fill(&cert_auth);
247 }
248 return 1;
30dd9163
ML
249}
250
4251ccbd 251static CURL *get_curl_handle(void)
11979b98 252{
4251ccbd 253 CURL *result = curl_easy_init();
11979b98 254
a5ccc597
JH
255 if (!curl_ssl_verify) {
256 curl_easy_setopt(result, CURLOPT_SSL_VERIFYPEER, 0);
257 curl_easy_setopt(result, CURLOPT_SSL_VERIFYHOST, 0);
258 } else {
259 /* Verify authenticity of the peer's certificate */
260 curl_easy_setopt(result, CURLOPT_SSL_VERIFYPEER, 1);
261 /* The name in the cert must match whom we tried to connect */
262 curl_easy_setopt(result, CURLOPT_SSL_VERIFYHOST, 2);
263 }
264
11979b98
JH
265#if LIBCURL_VERSION_NUM >= 0x070907
266 curl_easy_setopt(result, CURLOPT_NETRC, CURL_NETRC_OPTIONAL);
267#endif
b8ac9230 268#ifdef LIBCURL_CAN_HANDLE_AUTH_ANY
525ecd26 269 curl_easy_setopt(result, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
b8ac9230 270#endif
11979b98 271
a4ddbc33
JK
272 if (http_proactive_auth)
273 init_curl_http_auth(result);
274
11979b98
JH
275 if (ssl_cert != NULL)
276 curl_easy_setopt(result, CURLOPT_SSLCERT, ssl_cert);
30dd9163 277 if (has_cert_password())
148bb6a7 278 curl_easy_setopt(result, CURLOPT_KEYPASSWD, cert_auth.password);
ef52aafa 279#if LIBCURL_VERSION_NUM >= 0x070903
11979b98
JH
280 if (ssl_key != NULL)
281 curl_easy_setopt(result, CURLOPT_SSLKEY, ssl_key);
282#endif
283#if LIBCURL_VERSION_NUM >= 0x070908
284 if (ssl_capath != NULL)
285 curl_easy_setopt(result, CURLOPT_CAPATH, ssl_capath);
286#endif
287 if (ssl_cainfo != NULL)
288 curl_easy_setopt(result, CURLOPT_CAINFO, ssl_cainfo);
11979b98
JH
289
290 if (curl_low_speed_limit > 0 && curl_low_speed_time > 0) {
291 curl_easy_setopt(result, CURLOPT_LOW_SPEED_LIMIT,
292 curl_low_speed_limit);
293 curl_easy_setopt(result, CURLOPT_LOW_SPEED_TIME,
294 curl_low_speed_time);
295 }
296
297 curl_easy_setopt(result, CURLOPT_FOLLOWLOCATION, 1);
311e2ea0
TRC
298#if LIBCURL_VERSION_NUM >= 0x071301
299 curl_easy_setopt(result, CURLOPT_POSTREDIR, CURL_REDIR_POST_ALL);
300#elif LIBCURL_VERSION_NUM >= 0x071101
301 curl_easy_setopt(result, CURLOPT_POST301, 1);
302#endif
11979b98 303
7982d74e
MW
304 if (getenv("GIT_CURL_VERBOSE"))
305 curl_easy_setopt(result, CURLOPT_VERBOSE, 1);
306
b1d1058c 307 curl_easy_setopt(result, CURLOPT_USERAGENT,
745c7c8e 308 user_agent ? user_agent : git_user_agent());
20fc9bc5 309
3ea099d4
SK
310 if (curl_ftp_no_epsv)
311 curl_easy_setopt(result, CURLOPT_FTP_USE_EPSV, 0);
312
4bc444eb
MV
313#ifdef CURLOPT_USE_SSL
314 if (curl_ssl_try)
315 curl_easy_setopt(result, CURLOPT_USE_SSL, CURLUSESSL_TRY);
316#endif
317
dd613997 318 if (curl_http_proxy) {
9c5665aa 319 curl_easy_setopt(result, CURLOPT_PROXY, curl_http_proxy);
dd613997
NBL
320 curl_easy_setopt(result, CURLOPT_PROXYAUTH, CURLAUTH_ANY);
321 }
9c5665aa 322
11979b98
JH
323 return result;
324}
325
7059cd99
JH
326static void set_from_env(const char **var, const char *envname)
327{
328 const char *val = getenv(envname);
329 if (val)
330 *var = val;
331}
332
a4ddbc33 333void http_init(struct remote *remote, const char *url, int proactive_auth)
29508e1e
NH
334{
335 char *low_speed_limit;
336 char *low_speed_time;
337
e9176745
TRC
338 http_is_verbose = 0;
339
7059cd99
JH
340 git_config(http_options, NULL);
341
29508e1e
NH
342 curl_global_init(CURL_GLOBAL_ALL);
343
a4ddbc33
JK
344 http_proactive_auth = proactive_auth;
345
9fc6440d
MH
346 if (remote && remote->http_proxy)
347 curl_http_proxy = xstrdup(remote->http_proxy);
348
29508e1e 349 pragma_header = curl_slist_append(pragma_header, "Pragma: no-cache");
e9176745 350 no_pragma_header = curl_slist_append(no_pragma_header, "Pragma:");
29508e1e
NH
351
352#ifdef USE_CURL_MULTI
353 {
354 char *http_max_requests = getenv("GIT_HTTP_MAX_REQUESTS");
355 if (http_max_requests != NULL)
356 max_requests = atoi(http_max_requests);
357 }
358
359 curlm = curl_multi_init();
360 if (curlm == NULL) {
361 fprintf(stderr, "Error creating curl multi handle.\n");
362 exit(1);
363 }
364#endif
365
366 if (getenv("GIT_SSL_NO_VERIFY"))
367 curl_ssl_verify = 0;
368
7059cd99 369 set_from_env(&ssl_cert, "GIT_SSL_CERT");
ef52aafa 370#if LIBCURL_VERSION_NUM >= 0x070903
7059cd99 371 set_from_env(&ssl_key, "GIT_SSL_KEY");
29508e1e
NH
372#endif
373#if LIBCURL_VERSION_NUM >= 0x070908
7059cd99 374 set_from_env(&ssl_capath, "GIT_SSL_CAPATH");
29508e1e 375#endif
7059cd99 376 set_from_env(&ssl_cainfo, "GIT_SSL_CAINFO");
29508e1e 377
b1d1058c
SO
378 set_from_env(&user_agent, "GIT_HTTP_USER_AGENT");
379
29508e1e
NH
380 low_speed_limit = getenv("GIT_HTTP_LOW_SPEED_LIMIT");
381 if (low_speed_limit != NULL)
382 curl_low_speed_limit = strtol(low_speed_limit, NULL, 10);
383 low_speed_time = getenv("GIT_HTTP_LOW_SPEED_TIME");
384 if (low_speed_time != NULL)
385 curl_low_speed_time = strtol(low_speed_time, NULL, 10);
386
29508e1e
NH
387 if (curl_ssl_verify == -1)
388 curl_ssl_verify = 1;
389
ad75ebe5 390 curl_session_count = 0;
29508e1e
NH
391#ifdef USE_CURL_MULTI
392 if (max_requests < 1)
393 max_requests = DEFAULT_MAX_REQUESTS;
394#endif
395
3ea099d4
SK
396 if (getenv("GIT_CURL_FTP_NO_EPSV"))
397 curl_ftp_no_epsv = 1;
398
deba4937 399 if (url) {
148bb6a7 400 credential_from_url(&http_auth, url);
754ae192
ML
401 if (!ssl_cert_password_required &&
402 getenv("GIT_SSL_CERT_PASSWORD_PROTECTED") &&
deba4937 403 !prefixcmp(url, "https://"))
30dd9163
ML
404 ssl_cert_password_required = 1;
405 }
c33976cb 406
29508e1e
NH
407#ifndef NO_CURL_EASY_DUPHANDLE
408 curl_default = get_curl_handle();
409#endif
410}
411
412void http_cleanup(void)
413{
414 struct active_request_slot *slot = active_queue_head;
29508e1e
NH
415
416 while (slot != NULL) {
3278cd0a 417 struct active_request_slot *next = slot->next;
f23d1f76 418 if (slot->curl != NULL) {
29508e1e 419#ifdef USE_CURL_MULTI
f23d1f76 420 curl_multi_remove_handle(curlm, slot->curl);
29508e1e 421#endif
29508e1e 422 curl_easy_cleanup(slot->curl);
f23d1f76 423 }
3278cd0a
SP
424 free(slot);
425 slot = next;
29508e1e 426 }
3278cd0a 427 active_queue_head = NULL;
29508e1e
NH
428
429#ifndef NO_CURL_EASY_DUPHANDLE
430 curl_easy_cleanup(curl_default);
431#endif
432
433#ifdef USE_CURL_MULTI
434 curl_multi_cleanup(curlm);
435#endif
436 curl_global_cleanup();
b3ca4e4e
NH
437
438 curl_slist_free_all(pragma_header);
3278cd0a 439 pragma_header = NULL;
9fc6440d 440
e9176745
TRC
441 curl_slist_free_all(no_pragma_header);
442 no_pragma_header = NULL;
443
9fc6440d 444 if (curl_http_proxy) {
e4a80ecf 445 free((void *)curl_http_proxy);
9fc6440d
MH
446 curl_http_proxy = NULL;
447 }
30dd9163 448
148bb6a7
JK
449 if (cert_auth.password != NULL) {
450 memset(cert_auth.password, 0, strlen(cert_auth.password));
451 free(cert_auth.password);
452 cert_auth.password = NULL;
30dd9163
ML
453 }
454 ssl_cert_password_required = 0;
29508e1e
NH
455}
456
29508e1e
NH
457struct active_request_slot *get_active_slot(void)
458{
459 struct active_request_slot *slot = active_queue_head;
460 struct active_request_slot *newslot;
461
462#ifdef USE_CURL_MULTI
463 int num_transfers;
464
465 /* Wait for a slot to open up if the queue is full */
466 while (active_requests >= max_requests) {
467 curl_multi_perform(curlm, &num_transfers);
4251ccbd 468 if (num_transfers < active_requests)
29508e1e 469 process_curl_messages();
29508e1e
NH
470 }
471#endif
472
4251ccbd 473 while (slot != NULL && slot->in_use)
29508e1e 474 slot = slot->next;
4251ccbd 475
29508e1e
NH
476 if (slot == NULL) {
477 newslot = xmalloc(sizeof(*newslot));
478 newslot->curl = NULL;
479 newslot->in_use = 0;
480 newslot->next = NULL;
481
482 slot = active_queue_head;
483 if (slot == NULL) {
484 active_queue_head = newslot;
485 } else {
4251ccbd 486 while (slot->next != NULL)
29508e1e 487 slot = slot->next;
29508e1e
NH
488 slot->next = newslot;
489 }
490 slot = newslot;
491 }
492
493 if (slot->curl == NULL) {
494#ifdef NO_CURL_EASY_DUPHANDLE
495 slot->curl = get_curl_handle();
496#else
497 slot->curl = curl_easy_duphandle(curl_default);
498#endif
ad75ebe5 499 curl_session_count++;
29508e1e
NH
500 }
501
502 active_requests++;
503 slot->in_use = 1;
c8568e13 504 slot->results = NULL;
baa7b67d 505 slot->finished = NULL;
29508e1e
NH
506 slot->callback_data = NULL;
507 slot->callback_func = NULL;
bcfb95dd 508 curl_easy_setopt(slot->curl, CURLOPT_COOKIEFILE, curl_cookie_file);
29508e1e 509 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, pragma_header);
29508e1e 510 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, curl_errorstr);
9094950d
NH
511 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, NULL);
512 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, NULL);
513 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, NULL);
1e41827d 514 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, NULL);
9094950d
NH
515 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 0);
516 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
b793acf1 517 curl_easy_setopt(slot->curl, CURLOPT_FAILONERROR, 1);
dfa1725a
JK
518 if (http_auth.password)
519 init_curl_http_auth(slot->curl);
29508e1e
NH
520
521 return slot;
522}
523
524int start_active_slot(struct active_request_slot *slot)
525{
526#ifdef USE_CURL_MULTI
527 CURLMcode curlm_result = curl_multi_add_handle(curlm, slot->curl);
45c17412 528 int num_transfers;
29508e1e
NH
529
530 if (curlm_result != CURLM_OK &&
531 curlm_result != CURLM_CALL_MULTI_PERFORM) {
532 active_requests--;
533 slot->in_use = 0;
534 return 0;
535 }
45c17412
DB
536
537 /*
538 * We know there must be something to do, since we just added
539 * something.
540 */
541 curl_multi_perform(curlm, &num_transfers);
29508e1e
NH
542#endif
543 return 1;
544}
545
546#ifdef USE_CURL_MULTI
fc57b6aa
DB
547struct fill_chain {
548 void *data;
549 int (*fill)(void *);
550 struct fill_chain *next;
551};
552
4251ccbd 553static struct fill_chain *fill_cfg;
fc57b6aa
DB
554
555void add_fill_function(void *data, int (*fill)(void *))
556{
e8eec71d 557 struct fill_chain *new = xmalloc(sizeof(*new));
fc57b6aa
DB
558 struct fill_chain **linkp = &fill_cfg;
559 new->data = data;
560 new->fill = fill;
561 new->next = NULL;
562 while (*linkp)
563 linkp = &(*linkp)->next;
564 *linkp = new;
565}
566
45c17412
DB
567void fill_active_slots(void)
568{
569 struct active_request_slot *slot = active_queue_head;
570
fc57b6aa
DB
571 while (active_requests < max_requests) {
572 struct fill_chain *fill;
573 for (fill = fill_cfg; fill; fill = fill->next)
574 if (fill->fill(fill->data))
575 break;
576
577 if (!fill)
45c17412 578 break;
fc57b6aa 579 }
45c17412
DB
580
581 while (slot != NULL) {
ad75ebe5
TRC
582 if (!slot->in_use && slot->curl != NULL
583 && curl_session_count > min_curl_sessions) {
45c17412
DB
584 curl_easy_cleanup(slot->curl);
585 slot->curl = NULL;
ad75ebe5 586 curl_session_count--;
45c17412
DB
587 }
588 slot = slot->next;
589 }
590}
591
29508e1e
NH
592void step_active_slots(void)
593{
594 int num_transfers;
595 CURLMcode curlm_result;
596
597 do {
598 curlm_result = curl_multi_perform(curlm, &num_transfers);
599 } while (curlm_result == CURLM_CALL_MULTI_PERFORM);
600 if (num_transfers < active_requests) {
601 process_curl_messages();
602 fill_active_slots();
603 }
604}
605#endif
606
607void run_active_slot(struct active_request_slot *slot)
608{
609#ifdef USE_CURL_MULTI
29508e1e
NH
610 fd_set readfds;
611 fd_set writefds;
612 fd_set excfds;
613 int max_fd;
614 struct timeval select_timeout;
baa7b67d 615 int finished = 0;
29508e1e 616
baa7b67d
NH
617 slot->finished = &finished;
618 while (!finished) {
29508e1e
NH
619 step_active_slots();
620
df26c471 621 if (slot->in_use) {
eb56c821
MF
622#if LIBCURL_VERSION_NUM >= 0x070f04
623 long curl_timeout;
624 curl_multi_timeout(curlm, &curl_timeout);
625 if (curl_timeout == 0) {
626 continue;
627 } else if (curl_timeout == -1) {
628 select_timeout.tv_sec = 0;
629 select_timeout.tv_usec = 50000;
630 } else {
631 select_timeout.tv_sec = curl_timeout / 1000;
632 select_timeout.tv_usec = (curl_timeout % 1000) * 1000;
633 }
634#else
635 select_timeout.tv_sec = 0;
636 select_timeout.tv_usec = 50000;
637#endif
29508e1e 638
6f9dd67f 639 max_fd = -1;
29508e1e
NH
640 FD_ZERO(&readfds);
641 FD_ZERO(&writefds);
642 FD_ZERO(&excfds);
6f9dd67f 643 curl_multi_fdset(curlm, &readfds, &writefds, &excfds, &max_fd);
eb56c821 644
7202b81f
SZ
645 /*
646 * It can happen that curl_multi_timeout returns a pathologically
647 * long timeout when curl_multi_fdset returns no file descriptors
648 * to read. See commit message for more details.
649 */
650 if (max_fd < 0 &&
651 (select_timeout.tv_sec > 0 ||
652 select_timeout.tv_usec > 50000)) {
653 select_timeout.tv_sec = 0;
654 select_timeout.tv_usec = 50000;
655 }
656
6f9dd67f 657 select(max_fd+1, &readfds, &writefds, &excfds, &select_timeout);
29508e1e
NH
658 }
659 }
660#else
661 while (slot->in_use) {
662 slot->curl_result = curl_easy_perform(slot->curl);
663 finish_active_slot(slot);
664 }
665#endif
666}
667
53f31389 668static void closedown_active_slot(struct active_request_slot *slot)
29508e1e 669{
028c2976
MH
670 active_requests--;
671 slot->in_use = 0;
53f31389
MW
672}
673
83e41e2e 674static void release_active_slot(struct active_request_slot *slot)
53f31389
MW
675{
676 closedown_active_slot(slot);
ad75ebe5 677 if (slot->curl && curl_session_count > min_curl_sessions) {
b3ca4e4e 678#ifdef USE_CURL_MULTI
53f31389 679 curl_multi_remove_handle(curlm, slot->curl);
b3ca4e4e 680#endif
53f31389
MW
681 curl_easy_cleanup(slot->curl);
682 slot->curl = NULL;
ad75ebe5 683 curl_session_count--;
53f31389 684 }
b3ca4e4e 685#ifdef USE_CURL_MULTI
53f31389 686 fill_active_slots();
b3ca4e4e 687#endif
53f31389
MW
688}
689
de1a2fdd 690void finish_active_slot(struct active_request_slot *slot)
53f31389
MW
691{
692 closedown_active_slot(slot);
028c2976 693 curl_easy_getinfo(slot->curl, CURLINFO_HTTP_CODE, &slot->http_code);
c8568e13 694
baa7b67d
NH
695 if (slot->finished != NULL)
696 (*slot->finished) = 1;
697
c8568e13
NH
698 /* Store slot results so they can be read after the slot is reused */
699 if (slot->results != NULL) {
700 slot->results->curl_result = slot->curl_result;
701 slot->results->http_code = slot->http_code;
702 }
703
028c2976 704 /* Run callback if appropriate */
4251ccbd 705 if (slot->callback_func != NULL)
028c2976 706 slot->callback_func(slot->callback_data);
29508e1e
NH
707}
708
709void finish_all_active_slots(void)
710{
711 struct active_request_slot *slot = active_queue_head;
712
713 while (slot != NULL)
714 if (slot->in_use) {
715 run_active_slot(slot);
716 slot = active_queue_head;
717 } else {
718 slot = slot->next;
719 }
720}
d7e92806 721
5ace994f 722/* Helpers for modifying and creating URLs */
d7e92806
MH
723static inline int needs_quote(int ch)
724{
725 if (((ch >= 'A') && (ch <= 'Z'))
726 || ((ch >= 'a') && (ch <= 'z'))
727 || ((ch >= '0') && (ch <= '9'))
728 || (ch == '/')
729 || (ch == '-')
730 || (ch == '.'))
731 return 0;
732 return 1;
733}
734
d7e92806
MH
735static char *quote_ref_url(const char *base, const char *ref)
736{
113106e0 737 struct strbuf buf = STRBUF_INIT;
d7e92806 738 const char *cp;
113106e0 739 int ch;
d7e92806 740
5ace994f 741 end_url_with_slash(&buf, base);
113106e0
TRC
742
743 for (cp = ref; (ch = *cp) != 0; cp++)
d7e92806 744 if (needs_quote(ch))
113106e0 745 strbuf_addf(&buf, "%%%02x", ch);
d7e92806 746 else
113106e0 747 strbuf_addch(&buf, *cp);
d7e92806 748
113106e0 749 return strbuf_detach(&buf, NULL);
d7e92806
MH
750}
751
5424bc55
TRC
752void append_remote_object_url(struct strbuf *buf, const char *url,
753 const char *hex,
754 int only_two_digit_prefix)
755{
800324c3
TRC
756 end_url_with_slash(buf, url);
757
758 strbuf_addf(buf, "objects/%.*s/", 2, hex);
5424bc55
TRC
759 if (!only_two_digit_prefix)
760 strbuf_addf(buf, "%s", hex+2);
761}
762
763char *get_remote_object_url(const char *url, const char *hex,
764 int only_two_digit_prefix)
765{
766 struct strbuf buf = STRBUF_INIT;
767 append_remote_object_url(&buf, url, hex, only_two_digit_prefix);
768 return strbuf_detach(&buf, NULL);
769}
770
1960897e 771int handle_curl_result(struct slot_results *results)
88097030 772{
6d052d78
JK
773 /*
774 * If we see a failing http code with CURLE_OK, we have turned off
775 * FAILONERROR (to keep the server's custom error response), and should
776 * translate the code into failure here.
777 */
778 if (results->curl_result == CURLE_OK &&
779 results->http_code >= 400) {
780 results->curl_result = CURLE_HTTP_RETURNED_ERROR;
781 /*
782 * Normally curl will already have put the "reason phrase"
783 * from the server into curl_errorstr; unfortunately without
784 * FAILONERROR it is lost, so we can give only the numeric
785 * status code.
786 */
787 snprintf(curl_errorstr, sizeof(curl_errorstr),
788 "The requested URL returned error: %ld",
789 results->http_code);
790 }
791
88097030
JK
792 if (results->curl_result == CURLE_OK) {
793 credential_approve(&http_auth);
794 return HTTP_OK;
795 } else if (missing_target(results))
796 return HTTP_MISSING_TARGET;
797 else if (results->http_code == 401) {
798 if (http_auth.username && http_auth.password) {
799 credential_reject(&http_auth);
800 return HTTP_NOAUTH;
801 } else {
802 credential_fill(&http_auth);
88097030
JK
803 return HTTP_REAUTH;
804 }
805 } else {
3503e9ab 806#if LIBCURL_VERSION_NUM >= 0x070c00
88097030
JK
807 if (!curl_errorstr[0])
808 strlcpy(curl_errorstr,
809 curl_easy_strerror(results->curl_result),
810 sizeof(curl_errorstr));
3503e9ab 811#endif
88097030
JK
812 return HTTP_ERROR;
813 }
814}
815
e929cd20
MH
816/* http_request() targets */
817#define HTTP_REQUEST_STRBUF 0
818#define HTTP_REQUEST_FILE 1
819
4656bf47
SP
820static int http_request(const char *url, struct strbuf *type,
821 void *result, int target, int options)
e929cd20
MH
822{
823 struct active_request_slot *slot;
824 struct slot_results results;
825 struct curl_slist *headers = NULL;
826 struct strbuf buf = STRBUF_INIT;
827 int ret;
828
829 slot = get_active_slot();
830 slot->results = &results;
831 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
832
833 if (result == NULL) {
834 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
835 } else {
836 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
837 curl_easy_setopt(slot->curl, CURLOPT_FILE, result);
838
839 if (target == HTTP_REQUEST_FILE) {
840 long posn = ftell(result);
841 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION,
842 fwrite);
843 if (posn > 0) {
844 strbuf_addf(&buf, "Range: bytes=%ld-", posn);
845 headers = curl_slist_append(headers, buf.buf);
846 strbuf_reset(&buf);
847 }
e929cd20
MH
848 } else
849 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION,
850 fwrite_buffer);
851 }
852
853 strbuf_addstr(&buf, "Pragma:");
854 if (options & HTTP_NO_CACHE)
855 strbuf_addstr(&buf, " no-cache");
6d052d78
JK
856 if (options & HTTP_KEEP_ERROR)
857 curl_easy_setopt(slot->curl, CURLOPT_FAILONERROR, 0);
e929cd20
MH
858
859 headers = curl_slist_append(headers, buf.buf);
860
861 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
862 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
aa90b969 863 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "gzip");
e929cd20
MH
864
865 if (start_active_slot(slot)) {
866 run_active_slot(slot);
1960897e 867 ret = handle_curl_result(&results);
e929cd20 868 } else {
67d2a7b5
JK
869 snprintf(curl_errorstr, sizeof(curl_errorstr),
870 "failed to start HTTP request");
e929cd20
MH
871 ret = HTTP_START_FAILED;
872 }
873
4656bf47
SP
874 if (type) {
875 char *t;
3443db51 876 strbuf_reset(type);
4656bf47
SP
877 curl_easy_getinfo(slot->curl, CURLINFO_CONTENT_TYPE, &t);
878 if (t)
879 strbuf_addstr(type, t);
880 }
881
e929cd20
MH
882 curl_slist_free_all(headers);
883 strbuf_release(&buf);
884
885 return ret;
886}
887
4656bf47
SP
888static int http_request_reauth(const char *url,
889 struct strbuf *type,
890 void *result, int target,
8d677edc
JK
891 int options)
892{
4656bf47 893 int ret = http_request(url, type, result, target, options);
8d677edc
JK
894 if (ret != HTTP_REAUTH)
895 return ret;
6d052d78
JK
896
897 /*
898 * If we are using KEEP_ERROR, the previous request may have
899 * put cruft into our output stream; we should clear it out before
900 * making our next request. We only know how to do this for
901 * the strbuf case, but that is enough to satisfy current callers.
902 */
903 if (options & HTTP_KEEP_ERROR) {
904 switch (target) {
905 case HTTP_REQUEST_STRBUF:
906 strbuf_reset(result);
907 break;
908 default:
909 die("BUG: HTTP_KEEP_ERROR is only supported with strbufs");
910 }
911 }
4656bf47 912 return http_request(url, type, result, target, options);
8d677edc
JK
913}
914
4656bf47
SP
915int http_get_strbuf(const char *url,
916 struct strbuf *type,
917 struct strbuf *result, int options)
e929cd20 918{
4656bf47
SP
919 return http_request_reauth(url, type, result,
920 HTTP_REQUEST_STRBUF, options);
e929cd20
MH
921}
922
83e41e2e 923/*
a7793a74 924 * Downloads a URL and stores the result in the given file.
83e41e2e
JH
925 *
926 * If a previous interrupted download is detected (i.e. a previous temporary
927 * file is still around) the download is resumed.
928 */
929static int http_get_file(const char *url, const char *filename, int options)
e929cd20
MH
930{
931 int ret;
932 struct strbuf tmpfile = STRBUF_INIT;
933 FILE *result;
934
935 strbuf_addf(&tmpfile, "%s.temp", filename);
936 result = fopen(tmpfile.buf, "a");
937 if (! result) {
938 error("Unable to open local file %s", tmpfile.buf);
939 ret = HTTP_ERROR;
940 goto cleanup;
941 }
942
4656bf47 943 ret = http_request_reauth(url, NULL, result, HTTP_REQUEST_FILE, options);
e929cd20
MH
944 fclose(result);
945
946 if ((ret == HTTP_OK) && move_temp_to_file(tmpfile.buf, filename))
947 ret = HTTP_ERROR;
948cleanup:
949 strbuf_release(&tmpfile);
950 return ret;
951}
952
c13b2633 953int http_fetch_ref(const char *base, struct ref *ref)
d7e92806
MH
954{
955 char *url;
956 struct strbuf buffer = STRBUF_INIT;
0d5896e1 957 int ret = -1;
d7e92806 958
c13b2633 959 url = quote_ref_url(base, ref->name);
4656bf47 960 if (http_get_strbuf(url, NULL, &buffer, HTTP_NO_CACHE) == HTTP_OK) {
0d5896e1
MH
961 strbuf_rtrim(&buffer);
962 if (buffer.len == 40)
963 ret = get_sha1_hex(buffer.buf, ref->old_sha1);
964 else if (!prefixcmp(buffer.buf, "ref: ")) {
965 ref->symref = xstrdup(buffer.buf + 5);
966 ret = 0;
d7e92806 967 }
d7e92806
MH
968 }
969
970 strbuf_release(&buffer);
971 free(url);
972 return ret;
973}
b8caac2b
TRC
974
975/* Helpers for fetching packs */
750ef425 976static char *fetch_pack_index(unsigned char *sha1, const char *base_url)
b8caac2b 977{
750ef425 978 char *url, *tmp;
b8caac2b 979 struct strbuf buf = STRBUF_INIT;
b8caac2b 980
b8caac2b 981 if (http_is_verbose)
162eb5f8 982 fprintf(stderr, "Getting index for pack %s\n", sha1_to_hex(sha1));
b8caac2b
TRC
983
984 end_url_with_slash(&buf, base_url);
162eb5f8 985 strbuf_addf(&buf, "objects/pack/pack-%s.idx", sha1_to_hex(sha1));
b8caac2b
TRC
986 url = strbuf_detach(&buf, NULL);
987
750ef425
SP
988 strbuf_addf(&buf, "%s.temp", sha1_pack_index_name(sha1));
989 tmp = strbuf_detach(&buf, NULL);
990
991 if (http_get_file(url, tmp, 0) != HTTP_OK) {
82247e9b 992 error("Unable to get pack index %s", url);
750ef425
SP
993 free(tmp);
994 tmp = NULL;
995 }
b8caac2b 996
b8caac2b 997 free(url);
750ef425 998 return tmp;
b8caac2b
TRC
999}
1000
1001static int fetch_and_setup_pack_index(struct packed_git **packs_head,
1002 unsigned char *sha1, const char *base_url)
1003{
1004 struct packed_git *new_pack;
750ef425
SP
1005 char *tmp_idx = NULL;
1006 int ret;
b8caac2b 1007
750ef425
SP
1008 if (has_pack_index(sha1)) {
1009 new_pack = parse_pack_index(sha1, NULL);
1010 if (!new_pack)
1011 return -1; /* parse_pack_index() already issued error message */
1012 goto add_pack;
1013 }
1014
1015 tmp_idx = fetch_pack_index(sha1, base_url);
1016 if (!tmp_idx)
b8caac2b
TRC
1017 return -1;
1018
750ef425
SP
1019 new_pack = parse_pack_index(sha1, tmp_idx);
1020 if (!new_pack) {
1021 unlink(tmp_idx);
1022 free(tmp_idx);
1023
b8caac2b 1024 return -1; /* parse_pack_index() already issued error message */
750ef425
SP
1025 }
1026
1027 ret = verify_pack_index(new_pack);
1028 if (!ret) {
1029 close_pack_index(new_pack);
1030 ret = move_temp_to_file(tmp_idx, sha1_pack_index_name(sha1));
1031 }
1032 free(tmp_idx);
1033 if (ret)
1034 return -1;
1035
1036add_pack:
b8caac2b
TRC
1037 new_pack->next = *packs_head;
1038 *packs_head = new_pack;
1039 return 0;
1040}
1041
1042int http_get_info_packs(const char *base_url, struct packed_git **packs_head)
1043{
1044 int ret = 0, i = 0;
1045 char *url, *data;
1046 struct strbuf buf = STRBUF_INIT;
1047 unsigned char sha1[20];
1048
1049 end_url_with_slash(&buf, base_url);
1050 strbuf_addstr(&buf, "objects/info/packs");
1051 url = strbuf_detach(&buf, NULL);
1052
4656bf47 1053 ret = http_get_strbuf(url, NULL, &buf, HTTP_NO_CACHE);
b8caac2b
TRC
1054 if (ret != HTTP_OK)
1055 goto cleanup;
1056
1057 data = buf.buf;
1058 while (i < buf.len) {
1059 switch (data[i]) {
1060 case 'P':
1061 i++;
1062 if (i + 52 <= buf.len &&
1063 !prefixcmp(data + i, " pack-") &&
1064 !prefixcmp(data + i + 46, ".pack\n")) {
1065 get_sha1_hex(data + i + 6, sha1);
1066 fetch_and_setup_pack_index(packs_head, sha1,
1067 base_url);
1068 i += 51;
1069 break;
1070 }
1071 default:
1072 while (i < buf.len && data[i] != '\n')
1073 i++;
1074 }
1075 i++;
1076 }
1077
1078cleanup:
1079 free(url);
1080 return ret;
1081}
2264dfa5
TRC
1082
1083void release_http_pack_request(struct http_pack_request *preq)
1084{
1085 if (preq->packfile != NULL) {
1086 fclose(preq->packfile);
1087 preq->packfile = NULL;
2264dfa5
TRC
1088 }
1089 if (preq->range_header != NULL) {
1090 curl_slist_free_all(preq->range_header);
1091 preq->range_header = NULL;
1092 }
1093 preq->slot = NULL;
1094 free(preq->url);
1095}
1096
1097int finish_http_pack_request(struct http_pack_request *preq)
1098{
2264dfa5 1099 struct packed_git **lst;
021ab6f0 1100 struct packed_git *p = preq->target;
fe72d420
SP
1101 char *tmp_idx;
1102 struct child_process ip;
1103 const char *ip_argv[8];
2264dfa5 1104
fe72d420 1105 close_pack_index(p);
2264dfa5 1106
3065274c
SP
1107 fclose(preq->packfile);
1108 preq->packfile = NULL;
2264dfa5
TRC
1109
1110 lst = preq->lst;
021ab6f0 1111 while (*lst != p)
2264dfa5
TRC
1112 lst = &((*lst)->next);
1113 *lst = (*lst)->next;
1114
fe72d420
SP
1115 tmp_idx = xstrdup(preq->tmpfile);
1116 strcpy(tmp_idx + strlen(tmp_idx) - strlen(".pack.temp"),
1117 ".idx.temp");
1118
1119 ip_argv[0] = "index-pack";
1120 ip_argv[1] = "-o";
1121 ip_argv[2] = tmp_idx;
1122 ip_argv[3] = preq->tmpfile;
1123 ip_argv[4] = NULL;
1124
1125 memset(&ip, 0, sizeof(ip));
1126 ip.argv = ip_argv;
1127 ip.git_cmd = 1;
1128 ip.no_stdin = 1;
1129 ip.no_stdout = 1;
1130
1131 if (run_command(&ip)) {
1132 unlink(preq->tmpfile);
1133 unlink(tmp_idx);
1134 free(tmp_idx);
2264dfa5 1135 return -1;
fe72d420
SP
1136 }
1137
1138 unlink(sha1_pack_index_name(p->sha1));
2264dfa5 1139
fe72d420
SP
1140 if (move_temp_to_file(preq->tmpfile, sha1_pack_name(p->sha1))
1141 || move_temp_to_file(tmp_idx, sha1_pack_index_name(p->sha1))) {
1142 free(tmp_idx);
2264dfa5 1143 return -1;
fe72d420 1144 }
2264dfa5 1145
fe72d420
SP
1146 install_packed_git(p);
1147 free(tmp_idx);
2264dfa5
TRC
1148 return 0;
1149}
1150
1151struct http_pack_request *new_http_pack_request(
1152 struct packed_git *target, const char *base_url)
1153{
2264dfa5
TRC
1154 long prev_posn = 0;
1155 char range[RANGE_HEADER_SIZE];
1156 struct strbuf buf = STRBUF_INIT;
1157 struct http_pack_request *preq;
1158
ec99c9a8 1159 preq = xcalloc(1, sizeof(*preq));
2264dfa5 1160 preq->target = target;
2264dfa5
TRC
1161
1162 end_url_with_slash(&buf, base_url);
1163 strbuf_addf(&buf, "objects/pack/pack-%s.pack",
1164 sha1_to_hex(target->sha1));
bb99190e 1165 preq->url = strbuf_detach(&buf, NULL);
2264dfa5 1166
90d05713
TRC
1167 snprintf(preq->tmpfile, sizeof(preq->tmpfile), "%s.temp",
1168 sha1_pack_name(target->sha1));
2264dfa5
TRC
1169 preq->packfile = fopen(preq->tmpfile, "a");
1170 if (!preq->packfile) {
1171 error("Unable to open local file %s for pack",
1172 preq->tmpfile);
1173 goto abort;
1174 }
1175
1176 preq->slot = get_active_slot();
2264dfa5
TRC
1177 curl_easy_setopt(preq->slot->curl, CURLOPT_FILE, preq->packfile);
1178 curl_easy_setopt(preq->slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
bb99190e 1179 curl_easy_setopt(preq->slot->curl, CURLOPT_URL, preq->url);
2264dfa5
TRC
1180 curl_easy_setopt(preq->slot->curl, CURLOPT_HTTPHEADER,
1181 no_pragma_header);
1182
1183 /*
1184 * If there is data present from a previous transfer attempt,
1185 * resume where it left off
1186 */
1187 prev_posn = ftell(preq->packfile);
1188 if (prev_posn>0) {
1189 if (http_is_verbose)
1190 fprintf(stderr,
1191 "Resuming fetch of pack %s at byte %ld\n",
1192 sha1_to_hex(target->sha1), prev_posn);
1193 sprintf(range, "Range: bytes=%ld-", prev_posn);
1194 preq->range_header = curl_slist_append(NULL, range);
1195 curl_easy_setopt(preq->slot->curl, CURLOPT_HTTPHEADER,
1196 preq->range_header);
1197 }
1198
1199 return preq;
1200
1201abort:
bb99190e 1202 free(preq->url);
5ae9ebfd 1203 free(preq);
2264dfa5
TRC
1204 return NULL;
1205}
5424bc55
TRC
1206
1207/* Helpers for fetching objects (loose) */
a04ff3ec 1208static size_t fwrite_sha1_file(char *ptr, size_t eltsize, size_t nmemb,
5424bc55
TRC
1209 void *data)
1210{
1211 unsigned char expn[4096];
1212 size_t size = eltsize * nmemb;
1213 int posn = 0;
1214 struct http_object_request *freq =
1215 (struct http_object_request *)data;
1216 do {
1217 ssize_t retval = xwrite(freq->localfile,
1218 (char *) ptr + posn, size - posn);
1219 if (retval < 0)
1220 return posn;
1221 posn += retval;
1222 } while (posn < size);
1223
1224 freq->stream.avail_in = size;
a04ff3ec 1225 freq->stream.next_in = (void *)ptr;
5424bc55
TRC
1226 do {
1227 freq->stream.next_out = expn;
1228 freq->stream.avail_out = sizeof(expn);
1229 freq->zret = git_inflate(&freq->stream, Z_SYNC_FLUSH);
1230 git_SHA1_Update(&freq->c, expn,
1231 sizeof(expn) - freq->stream.avail_out);
1232 } while (freq->stream.avail_in && freq->zret == Z_OK);
5424bc55
TRC
1233 return size;
1234}
1235
1236struct http_object_request *new_http_object_request(const char *base_url,
1237 unsigned char *sha1)
1238{
1239 char *hex = sha1_to_hex(sha1);
1240 char *filename;
1241 char prevfile[PATH_MAX];
5424bc55 1242 int prevlocal;
a04ff3ec 1243 char prev_buf[PREV_BUF_SIZE];
5424bc55
TRC
1244 ssize_t prev_read = 0;
1245 long prev_posn = 0;
1246 char range[RANGE_HEADER_SIZE];
1247 struct curl_slist *range_header = NULL;
1248 struct http_object_request *freq;
1249
ec99c9a8 1250 freq = xcalloc(1, sizeof(*freq));
5424bc55
TRC
1251 hashcpy(freq->sha1, sha1);
1252 freq->localfile = -1;
1253
1254 filename = sha1_file_name(sha1);
5424bc55
TRC
1255 snprintf(freq->tmpfile, sizeof(freq->tmpfile),
1256 "%s.temp", filename);
1257
1258 snprintf(prevfile, sizeof(prevfile), "%s.prev", filename);
1259 unlink_or_warn(prevfile);
1260 rename(freq->tmpfile, prevfile);
1261 unlink_or_warn(freq->tmpfile);
1262
1263 if (freq->localfile != -1)
1264 error("fd leakage in start: %d", freq->localfile);
1265 freq->localfile = open(freq->tmpfile,
1266 O_WRONLY | O_CREAT | O_EXCL, 0666);
1267 /*
1268 * This could have failed due to the "lazy directory creation";
1269 * try to mkdir the last path component.
1270 */
1271 if (freq->localfile < 0 && errno == ENOENT) {
1272 char *dir = strrchr(freq->tmpfile, '/');
1273 if (dir) {
1274 *dir = 0;
1275 mkdir(freq->tmpfile, 0777);
1276 *dir = '/';
1277 }
1278 freq->localfile = open(freq->tmpfile,
1279 O_WRONLY | O_CREAT | O_EXCL, 0666);
1280 }
1281
1282 if (freq->localfile < 0) {
0da8b2e7
SP
1283 error("Couldn't create temporary file %s: %s",
1284 freq->tmpfile, strerror(errno));
5424bc55
TRC
1285 goto abort;
1286 }
1287
5424bc55
TRC
1288 git_inflate_init(&freq->stream);
1289
1290 git_SHA1_Init(&freq->c);
1291
bb99190e 1292 freq->url = get_remote_object_url(base_url, hex, 0);
5424bc55
TRC
1293
1294 /*
1295 * If a previous temp file is present, process what was already
1296 * fetched.
1297 */
1298 prevlocal = open(prevfile, O_RDONLY);
1299 if (prevlocal != -1) {
1300 do {
1301 prev_read = xread(prevlocal, prev_buf, PREV_BUF_SIZE);
1302 if (prev_read>0) {
1303 if (fwrite_sha1_file(prev_buf,
1304 1,
1305 prev_read,
1306 freq) == prev_read) {
1307 prev_posn += prev_read;
1308 } else {
1309 prev_read = -1;
1310 }
1311 }
1312 } while (prev_read > 0);
1313 close(prevlocal);
1314 }
1315 unlink_or_warn(prevfile);
1316
1317 /*
1318 * Reset inflate/SHA1 if there was an error reading the previous temp
1319 * file; also rewind to the beginning of the local file.
1320 */
1321 if (prev_read == -1) {
1322 memset(&freq->stream, 0, sizeof(freq->stream));
1323 git_inflate_init(&freq->stream);
1324 git_SHA1_Init(&freq->c);
1325 if (prev_posn>0) {
1326 prev_posn = 0;
1327 lseek(freq->localfile, 0, SEEK_SET);
0c4f21e4 1328 if (ftruncate(freq->localfile, 0) < 0) {
0da8b2e7
SP
1329 error("Couldn't truncate temporary file %s: %s",
1330 freq->tmpfile, strerror(errno));
0c4f21e4
JL
1331 goto abort;
1332 }
5424bc55
TRC
1333 }
1334 }
1335
1336 freq->slot = get_active_slot();
1337
1338 curl_easy_setopt(freq->slot->curl, CURLOPT_FILE, freq);
1339 curl_easy_setopt(freq->slot->curl, CURLOPT_WRITEFUNCTION, fwrite_sha1_file);
1340 curl_easy_setopt(freq->slot->curl, CURLOPT_ERRORBUFFER, freq->errorstr);
bb99190e 1341 curl_easy_setopt(freq->slot->curl, CURLOPT_URL, freq->url);
5424bc55
TRC
1342 curl_easy_setopt(freq->slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
1343
1344 /*
1345 * If we have successfully processed data from a previous fetch
1346 * attempt, only fetch the data we don't already have.
1347 */
1348 if (prev_posn>0) {
1349 if (http_is_verbose)
1350 fprintf(stderr,
1351 "Resuming fetch of object %s at byte %ld\n",
1352 hex, prev_posn);
1353 sprintf(range, "Range: bytes=%ld-", prev_posn);
1354 range_header = curl_slist_append(range_header, range);
1355 curl_easy_setopt(freq->slot->curl,
1356 CURLOPT_HTTPHEADER, range_header);
1357 }
1358
1359 return freq;
1360
5424bc55 1361abort:
bb99190e 1362 free(freq->url);
5424bc55
TRC
1363 free(freq);
1364 return NULL;
1365}
1366
1367void process_http_object_request(struct http_object_request *freq)
1368{
1369 if (freq->slot == NULL)
1370 return;
1371 freq->curl_result = freq->slot->curl_result;
1372 freq->http_code = freq->slot->http_code;
1373 freq->slot = NULL;
1374}
1375
1376int finish_http_object_request(struct http_object_request *freq)
1377{
1378 struct stat st;
1379
1380 close(freq->localfile);
1381 freq->localfile = -1;
1382
1383 process_http_object_request(freq);
1384
1385 if (freq->http_code == 416) {
bd757c18 1386 warning("requested range invalid; we may already have all the data.");
5424bc55
TRC
1387 } else if (freq->curl_result != CURLE_OK) {
1388 if (stat(freq->tmpfile, &st) == 0)
1389 if (st.st_size == 0)
1390 unlink_or_warn(freq->tmpfile);
1391 return -1;
1392 }
1393
1394 git_inflate_end(&freq->stream);
1395 git_SHA1_Final(freq->real_sha1, &freq->c);
1396 if (freq->zret != Z_STREAM_END) {
1397 unlink_or_warn(freq->tmpfile);
1398 return -1;
1399 }
1400 if (hashcmp(freq->sha1, freq->real_sha1)) {
1401 unlink_or_warn(freq->tmpfile);
1402 return -1;
1403 }
1404 freq->rename =
0da8b2e7 1405 move_temp_to_file(freq->tmpfile, sha1_file_name(freq->sha1));
5424bc55
TRC
1406
1407 return freq->rename;
1408}
1409
1410void abort_http_object_request(struct http_object_request *freq)
1411{
1412 unlink_or_warn(freq->tmpfile);
1413
1414 release_http_object_request(freq);
1415}
1416
1417void release_http_object_request(struct http_object_request *freq)
1418{
1419 if (freq->localfile != -1) {
1420 close(freq->localfile);
1421 freq->localfile = -1;
1422 }
1423 if (freq->url != NULL) {
1424 free(freq->url);
1425 freq->url = NULL;
1426 }
4b9fa0e3
TRC
1427 if (freq->slot != NULL) {
1428 freq->slot->callback_func = NULL;
1429 freq->slot->callback_data = NULL;
1430 release_active_slot(freq->slot);
1431 freq->slot = NULL;
1432 }
5424bc55 1433}