]> git.ipfire.org Git - thirdparty/git.git/blame - http.c
Merge branch 'tb/t0050-maint' into maint
[thirdparty/git.git] / http.c
CommitLineData
29508e1e 1#include "http.h"
2264dfa5 2#include "pack.h"
de1a2fdd 3#include "sideband.h"
fe72d420 4#include "run-command.h"
f39f72d8 5#include "url.h"
148bb6a7 6#include "credential.h"
745c7c8e 7#include "version.h"
29508e1e 8
4251ccbd 9int active_requests;
e9176745 10int http_is_verbose;
de1a2fdd 11size_t http_post_buffer = 16 * LARGE_PACKET_MAX;
29508e1e 12
b8ac9230
MS
13#if LIBCURL_VERSION_NUM >= 0x070a06
14#define LIBCURL_CAN_HANDLE_AUTH_ANY
15#endif
16
ad75ebe5
TRC
17static int min_curl_sessions = 1;
18static int curl_session_count;
29508e1e 19#ifdef USE_CURL_MULTI
cc3530e8
MH
20static int max_requests = -1;
21static CURLM *curlm;
29508e1e
NH
22#endif
23#ifndef NO_CURL_EASY_DUPHANDLE
cc3530e8 24static CURL *curl_default;
29508e1e 25#endif
5424bc55
TRC
26
27#define PREV_BUF_SIZE 4096
28#define RANGE_HEADER_SIZE 30
29
29508e1e
NH
30char curl_errorstr[CURL_ERROR_SIZE];
31
cc3530e8 32static int curl_ssl_verify = -1;
4251ccbd 33static const char *ssl_cert;
ef52aafa 34#if LIBCURL_VERSION_NUM >= 0x070903
4251ccbd 35static const char *ssl_key;
29508e1e
NH
36#endif
37#if LIBCURL_VERSION_NUM >= 0x070908
4251ccbd 38static const char *ssl_capath;
29508e1e 39#endif
4251ccbd 40static const char *ssl_cainfo;
cc3530e8
MH
41static long curl_low_speed_limit = -1;
42static long curl_low_speed_time = -1;
4251ccbd
JH
43static int curl_ftp_no_epsv;
44static const char *curl_http_proxy;
bcfb95dd 45static const char *curl_cookie_file;
148bb6a7 46static struct credential http_auth = CREDENTIAL_INIT;
a4ddbc33 47static int http_proactive_auth;
b1d1058c 48static const char *user_agent;
29508e1e 49
30dd9163
ML
50#if LIBCURL_VERSION_NUM >= 0x071700
51/* Use CURLOPT_KEYPASSWD as is */
52#elif LIBCURL_VERSION_NUM >= 0x070903
53#define CURLOPT_KEYPASSWD CURLOPT_SSLKEYPASSWD
54#else
55#define CURLOPT_KEYPASSWD CURLOPT_SSLCERTPASSWD
56#endif
57
148bb6a7 58static struct credential cert_auth = CREDENTIAL_INIT;
30dd9163
ML
59static int ssl_cert_password_required;
60
cc3530e8 61static struct curl_slist *pragma_header;
5424bc55 62static struct curl_slist *no_pragma_header;
e9176745 63
4251ccbd 64static struct active_request_slot *active_queue_head;
29508e1e 65
a04ff3ec 66size_t fread_buffer(char *ptr, size_t eltsize, size_t nmemb, void *buffer_)
29508e1e
NH
67{
68 size_t size = eltsize * nmemb;
f444e528
JH
69 struct buffer *buffer = buffer_;
70
028c2976
MH
71 if (size > buffer->buf.len - buffer->posn)
72 size = buffer->buf.len - buffer->posn;
73 memcpy(ptr, buffer->buf.buf + buffer->posn, size);
29508e1e 74 buffer->posn += size;
028c2976 75
29508e1e
NH
76 return size;
77}
78
3944ba0c
MS
79#ifndef NO_CURL_IOCTL
80curlioerr ioctl_buffer(CURL *handle, int cmd, void *clientp)
81{
82 struct buffer *buffer = clientp;
83
84 switch (cmd) {
85 case CURLIOCMD_NOP:
86 return CURLIOE_OK;
87
88 case CURLIOCMD_RESTARTREAD:
89 buffer->posn = 0;
90 return CURLIOE_OK;
91
92 default:
93 return CURLIOE_UNKNOWNCMD;
94 }
95}
96#endif
97
a04ff3ec 98size_t fwrite_buffer(char *ptr, size_t eltsize, size_t nmemb, void *buffer_)
29508e1e
NH
99{
100 size_t size = eltsize * nmemb;
f444e528
JH
101 struct strbuf *buffer = buffer_;
102
028c2976 103 strbuf_add(buffer, ptr, size);
29508e1e
NH
104 return size;
105}
106
a04ff3ec 107size_t fwrite_null(char *ptr, size_t eltsize, size_t nmemb, void *strbuf)
29508e1e 108{
29508e1e
NH
109 return eltsize * nmemb;
110}
111
29508e1e
NH
112#ifdef USE_CURL_MULTI
113static void process_curl_messages(void)
114{
115 int num_messages;
116 struct active_request_slot *slot;
117 CURLMsg *curl_message = curl_multi_info_read(curlm, &num_messages);
118
119 while (curl_message != NULL) {
120 if (curl_message->msg == CURLMSG_DONE) {
121 int curl_result = curl_message->data.result;
122 slot = active_queue_head;
123 while (slot != NULL &&
124 slot->curl != curl_message->easy_handle)
125 slot = slot->next;
126 if (slot != NULL) {
127 curl_multi_remove_handle(curlm, slot->curl);
128 slot->curl_result = curl_result;
129 finish_active_slot(slot);
130 } else {
131 fprintf(stderr, "Received DONE message for unknown request!\n");
132 }
133 } else {
134 fprintf(stderr, "Unknown CURL message received: %d\n",
135 (int)curl_message->msg);
136 }
137 curl_message = curl_multi_info_read(curlm, &num_messages);
138 }
139}
140#endif
141
ef90d6d4 142static int http_options(const char *var, const char *value, void *cb)
29508e1e
NH
143{
144 if (!strcmp("http.sslverify", var)) {
7059cd99 145 curl_ssl_verify = git_config_bool(var, value);
29508e1e
NH
146 return 0;
147 }
7059cd99
JH
148 if (!strcmp("http.sslcert", var))
149 return git_config_string(&ssl_cert, var, value);
ef52aafa 150#if LIBCURL_VERSION_NUM >= 0x070903
7059cd99
JH
151 if (!strcmp("http.sslkey", var))
152 return git_config_string(&ssl_key, var, value);
29508e1e
NH
153#endif
154#if LIBCURL_VERSION_NUM >= 0x070908
7059cd99
JH
155 if (!strcmp("http.sslcapath", var))
156 return git_config_string(&ssl_capath, var, value);
29508e1e 157#endif
7059cd99
JH
158 if (!strcmp("http.sslcainfo", var))
159 return git_config_string(&ssl_cainfo, var, value);
754ae192
ML
160 if (!strcmp("http.sslcertpasswordprotected", var)) {
161 if (git_config_bool(var, value))
162 ssl_cert_password_required = 1;
163 return 0;
164 }
ad75ebe5
TRC
165 if (!strcmp("http.minsessions", var)) {
166 min_curl_sessions = git_config_int(var, value);
167#ifndef USE_CURL_MULTI
168 if (min_curl_sessions > 1)
169 min_curl_sessions = 1;
170#endif
171 return 0;
172 }
a6080a0a 173#ifdef USE_CURL_MULTI
29508e1e 174 if (!strcmp("http.maxrequests", var)) {
7059cd99 175 max_requests = git_config_int(var, value);
29508e1e
NH
176 return 0;
177 }
178#endif
29508e1e 179 if (!strcmp("http.lowspeedlimit", var)) {
7059cd99 180 curl_low_speed_limit = (long)git_config_int(var, value);
29508e1e
NH
181 return 0;
182 }
183 if (!strcmp("http.lowspeedtime", var)) {
7059cd99 184 curl_low_speed_time = (long)git_config_int(var, value);
29508e1e
NH
185 return 0;
186 }
187
3ea099d4
SK
188 if (!strcmp("http.noepsv", var)) {
189 curl_ftp_no_epsv = git_config_bool(var, value);
190 return 0;
191 }
7059cd99
JH
192 if (!strcmp("http.proxy", var))
193 return git_config_string(&curl_http_proxy, var, value);
3ea099d4 194
bcfb95dd
DB
195 if (!strcmp("http.cookiefile", var))
196 return git_config_string(&curl_cookie_file, var, value);
197
de1a2fdd
SP
198 if (!strcmp("http.postbuffer", var)) {
199 http_post_buffer = git_config_int(var, value);
200 if (http_post_buffer < LARGE_PACKET_MAX)
201 http_post_buffer = LARGE_PACKET_MAX;
202 return 0;
203 }
204
b1d1058c
SO
205 if (!strcmp("http.useragent", var))
206 return git_config_string(&user_agent, var, value);
207
29508e1e 208 /* Fall back on the default ones */
ef90d6d4 209 return git_default_config(var, value, cb);
29508e1e
NH
210}
211
c33976cb
JH
212static void init_curl_http_auth(CURL *result)
213{
6f4c347c
JK
214 if (!http_auth.username)
215 return;
216
217 credential_fill(&http_auth);
218
219#if LIBCURL_VERSION_NUM >= 0x071301
220 curl_easy_setopt(result, CURLOPT_USERNAME, http_auth.username);
221 curl_easy_setopt(result, CURLOPT_PASSWORD, http_auth.password);
222#else
223 {
aa0834a0 224 static struct strbuf up = STRBUF_INIT;
aa0834a0 225 strbuf_reset(&up);
148bb6a7
JK
226 strbuf_addf(&up, "%s:%s",
227 http_auth.username, http_auth.password);
aa0834a0 228 curl_easy_setopt(result, CURLOPT_USERPWD, up.buf);
c33976cb 229 }
6f4c347c 230#endif
c33976cb
JH
231}
232
30dd9163
ML
233static int has_cert_password(void)
234{
30dd9163
ML
235 if (ssl_cert == NULL || ssl_cert_password_required != 1)
236 return 0;
148bb6a7
JK
237 if (!cert_auth.password) {
238 cert_auth.protocol = xstrdup("cert");
75e9a405 239 cert_auth.username = xstrdup("");
148bb6a7
JK
240 cert_auth.path = xstrdup(ssl_cert);
241 credential_fill(&cert_auth);
242 }
243 return 1;
30dd9163
ML
244}
245
4251ccbd 246static CURL *get_curl_handle(void)
11979b98 247{
4251ccbd 248 CURL *result = curl_easy_init();
11979b98 249
a5ccc597
JH
250 if (!curl_ssl_verify) {
251 curl_easy_setopt(result, CURLOPT_SSL_VERIFYPEER, 0);
252 curl_easy_setopt(result, CURLOPT_SSL_VERIFYHOST, 0);
253 } else {
254 /* Verify authenticity of the peer's certificate */
255 curl_easy_setopt(result, CURLOPT_SSL_VERIFYPEER, 1);
256 /* The name in the cert must match whom we tried to connect */
257 curl_easy_setopt(result, CURLOPT_SSL_VERIFYHOST, 2);
258 }
259
11979b98
JH
260#if LIBCURL_VERSION_NUM >= 0x070907
261 curl_easy_setopt(result, CURLOPT_NETRC, CURL_NETRC_OPTIONAL);
262#endif
b8ac9230 263#ifdef LIBCURL_CAN_HANDLE_AUTH_ANY
525ecd26 264 curl_easy_setopt(result, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
b8ac9230 265#endif
11979b98 266
a4ddbc33
JK
267 if (http_proactive_auth)
268 init_curl_http_auth(result);
269
11979b98
JH
270 if (ssl_cert != NULL)
271 curl_easy_setopt(result, CURLOPT_SSLCERT, ssl_cert);
30dd9163 272 if (has_cert_password())
148bb6a7 273 curl_easy_setopt(result, CURLOPT_KEYPASSWD, cert_auth.password);
ef52aafa 274#if LIBCURL_VERSION_NUM >= 0x070903
11979b98
JH
275 if (ssl_key != NULL)
276 curl_easy_setopt(result, CURLOPT_SSLKEY, ssl_key);
277#endif
278#if LIBCURL_VERSION_NUM >= 0x070908
279 if (ssl_capath != NULL)
280 curl_easy_setopt(result, CURLOPT_CAPATH, ssl_capath);
281#endif
282 if (ssl_cainfo != NULL)
283 curl_easy_setopt(result, CURLOPT_CAINFO, ssl_cainfo);
284 curl_easy_setopt(result, CURLOPT_FAILONERROR, 1);
285
286 if (curl_low_speed_limit > 0 && curl_low_speed_time > 0) {
287 curl_easy_setopt(result, CURLOPT_LOW_SPEED_LIMIT,
288 curl_low_speed_limit);
289 curl_easy_setopt(result, CURLOPT_LOW_SPEED_TIME,
290 curl_low_speed_time);
291 }
292
293 curl_easy_setopt(result, CURLOPT_FOLLOWLOCATION, 1);
311e2ea0
TRC
294#if LIBCURL_VERSION_NUM >= 0x071301
295 curl_easy_setopt(result, CURLOPT_POSTREDIR, CURL_REDIR_POST_ALL);
296#elif LIBCURL_VERSION_NUM >= 0x071101
297 curl_easy_setopt(result, CURLOPT_POST301, 1);
298#endif
11979b98 299
7982d74e
MW
300 if (getenv("GIT_CURL_VERBOSE"))
301 curl_easy_setopt(result, CURLOPT_VERBOSE, 1);
302
b1d1058c 303 curl_easy_setopt(result, CURLOPT_USERAGENT,
745c7c8e 304 user_agent ? user_agent : git_user_agent());
20fc9bc5 305
3ea099d4
SK
306 if (curl_ftp_no_epsv)
307 curl_easy_setopt(result, CURLOPT_FTP_USE_EPSV, 0);
308
dd613997 309 if (curl_http_proxy) {
9c5665aa 310 curl_easy_setopt(result, CURLOPT_PROXY, curl_http_proxy);
dd613997
NBL
311 curl_easy_setopt(result, CURLOPT_PROXYAUTH, CURLAUTH_ANY);
312 }
9c5665aa 313
11979b98
JH
314 return result;
315}
316
7059cd99
JH
317static void set_from_env(const char **var, const char *envname)
318{
319 const char *val = getenv(envname);
320 if (val)
321 *var = val;
322}
323
a4ddbc33 324void http_init(struct remote *remote, const char *url, int proactive_auth)
29508e1e
NH
325{
326 char *low_speed_limit;
327 char *low_speed_time;
328
e9176745
TRC
329 http_is_verbose = 0;
330
7059cd99
JH
331 git_config(http_options, NULL);
332
29508e1e
NH
333 curl_global_init(CURL_GLOBAL_ALL);
334
a4ddbc33
JK
335 http_proactive_auth = proactive_auth;
336
9fc6440d
MH
337 if (remote && remote->http_proxy)
338 curl_http_proxy = xstrdup(remote->http_proxy);
339
29508e1e 340 pragma_header = curl_slist_append(pragma_header, "Pragma: no-cache");
e9176745 341 no_pragma_header = curl_slist_append(no_pragma_header, "Pragma:");
29508e1e
NH
342
343#ifdef USE_CURL_MULTI
344 {
345 char *http_max_requests = getenv("GIT_HTTP_MAX_REQUESTS");
346 if (http_max_requests != NULL)
347 max_requests = atoi(http_max_requests);
348 }
349
350 curlm = curl_multi_init();
351 if (curlm == NULL) {
352 fprintf(stderr, "Error creating curl multi handle.\n");
353 exit(1);
354 }
355#endif
356
357 if (getenv("GIT_SSL_NO_VERIFY"))
358 curl_ssl_verify = 0;
359
7059cd99 360 set_from_env(&ssl_cert, "GIT_SSL_CERT");
ef52aafa 361#if LIBCURL_VERSION_NUM >= 0x070903
7059cd99 362 set_from_env(&ssl_key, "GIT_SSL_KEY");
29508e1e
NH
363#endif
364#if LIBCURL_VERSION_NUM >= 0x070908
7059cd99 365 set_from_env(&ssl_capath, "GIT_SSL_CAPATH");
29508e1e 366#endif
7059cd99 367 set_from_env(&ssl_cainfo, "GIT_SSL_CAINFO");
29508e1e 368
b1d1058c
SO
369 set_from_env(&user_agent, "GIT_HTTP_USER_AGENT");
370
29508e1e
NH
371 low_speed_limit = getenv("GIT_HTTP_LOW_SPEED_LIMIT");
372 if (low_speed_limit != NULL)
373 curl_low_speed_limit = strtol(low_speed_limit, NULL, 10);
374 low_speed_time = getenv("GIT_HTTP_LOW_SPEED_TIME");
375 if (low_speed_time != NULL)
376 curl_low_speed_time = strtol(low_speed_time, NULL, 10);
377
29508e1e
NH
378 if (curl_ssl_verify == -1)
379 curl_ssl_verify = 1;
380
ad75ebe5 381 curl_session_count = 0;
29508e1e
NH
382#ifdef USE_CURL_MULTI
383 if (max_requests < 1)
384 max_requests = DEFAULT_MAX_REQUESTS;
385#endif
386
3ea099d4
SK
387 if (getenv("GIT_CURL_FTP_NO_EPSV"))
388 curl_ftp_no_epsv = 1;
389
deba4937 390 if (url) {
148bb6a7 391 credential_from_url(&http_auth, url);
754ae192
ML
392 if (!ssl_cert_password_required &&
393 getenv("GIT_SSL_CERT_PASSWORD_PROTECTED") &&
deba4937 394 !prefixcmp(url, "https://"))
30dd9163
ML
395 ssl_cert_password_required = 1;
396 }
c33976cb 397
29508e1e
NH
398#ifndef NO_CURL_EASY_DUPHANDLE
399 curl_default = get_curl_handle();
400#endif
401}
402
403void http_cleanup(void)
404{
405 struct active_request_slot *slot = active_queue_head;
29508e1e
NH
406
407 while (slot != NULL) {
3278cd0a 408 struct active_request_slot *next = slot->next;
f23d1f76 409 if (slot->curl != NULL) {
29508e1e 410#ifdef USE_CURL_MULTI
f23d1f76 411 curl_multi_remove_handle(curlm, slot->curl);
29508e1e 412#endif
29508e1e 413 curl_easy_cleanup(slot->curl);
f23d1f76 414 }
3278cd0a
SP
415 free(slot);
416 slot = next;
29508e1e 417 }
3278cd0a 418 active_queue_head = NULL;
29508e1e
NH
419
420#ifndef NO_CURL_EASY_DUPHANDLE
421 curl_easy_cleanup(curl_default);
422#endif
423
424#ifdef USE_CURL_MULTI
425 curl_multi_cleanup(curlm);
426#endif
427 curl_global_cleanup();
b3ca4e4e
NH
428
429 curl_slist_free_all(pragma_header);
3278cd0a 430 pragma_header = NULL;
9fc6440d 431
e9176745
TRC
432 curl_slist_free_all(no_pragma_header);
433 no_pragma_header = NULL;
434
9fc6440d 435 if (curl_http_proxy) {
e4a80ecf 436 free((void *)curl_http_proxy);
9fc6440d
MH
437 curl_http_proxy = NULL;
438 }
30dd9163 439
148bb6a7
JK
440 if (cert_auth.password != NULL) {
441 memset(cert_auth.password, 0, strlen(cert_auth.password));
442 free(cert_auth.password);
443 cert_auth.password = NULL;
30dd9163
ML
444 }
445 ssl_cert_password_required = 0;
29508e1e
NH
446}
447
29508e1e
NH
448struct active_request_slot *get_active_slot(void)
449{
450 struct active_request_slot *slot = active_queue_head;
451 struct active_request_slot *newslot;
452
453#ifdef USE_CURL_MULTI
454 int num_transfers;
455
456 /* Wait for a slot to open up if the queue is full */
457 while (active_requests >= max_requests) {
458 curl_multi_perform(curlm, &num_transfers);
4251ccbd 459 if (num_transfers < active_requests)
29508e1e 460 process_curl_messages();
29508e1e
NH
461 }
462#endif
463
4251ccbd 464 while (slot != NULL && slot->in_use)
29508e1e 465 slot = slot->next;
4251ccbd 466
29508e1e
NH
467 if (slot == NULL) {
468 newslot = xmalloc(sizeof(*newslot));
469 newslot->curl = NULL;
470 newslot->in_use = 0;
471 newslot->next = NULL;
472
473 slot = active_queue_head;
474 if (slot == NULL) {
475 active_queue_head = newslot;
476 } else {
4251ccbd 477 while (slot->next != NULL)
29508e1e 478 slot = slot->next;
29508e1e
NH
479 slot->next = newslot;
480 }
481 slot = newslot;
482 }
483
484 if (slot->curl == NULL) {
485#ifdef NO_CURL_EASY_DUPHANDLE
486 slot->curl = get_curl_handle();
487#else
488 slot->curl = curl_easy_duphandle(curl_default);
489#endif
ad75ebe5 490 curl_session_count++;
29508e1e
NH
491 }
492
493 active_requests++;
494 slot->in_use = 1;
c8568e13 495 slot->results = NULL;
baa7b67d 496 slot->finished = NULL;
29508e1e
NH
497 slot->callback_data = NULL;
498 slot->callback_func = NULL;
bcfb95dd 499 curl_easy_setopt(slot->curl, CURLOPT_COOKIEFILE, curl_cookie_file);
29508e1e 500 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, pragma_header);
29508e1e 501 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, curl_errorstr);
9094950d
NH
502 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, NULL);
503 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, NULL);
504 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, NULL);
1e41827d 505 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, NULL);
9094950d
NH
506 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 0);
507 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
dfa1725a
JK
508 if (http_auth.password)
509 init_curl_http_auth(slot->curl);
29508e1e
NH
510
511 return slot;
512}
513
514int start_active_slot(struct active_request_slot *slot)
515{
516#ifdef USE_CURL_MULTI
517 CURLMcode curlm_result = curl_multi_add_handle(curlm, slot->curl);
45c17412 518 int num_transfers;
29508e1e
NH
519
520 if (curlm_result != CURLM_OK &&
521 curlm_result != CURLM_CALL_MULTI_PERFORM) {
522 active_requests--;
523 slot->in_use = 0;
524 return 0;
525 }
45c17412
DB
526
527 /*
528 * We know there must be something to do, since we just added
529 * something.
530 */
531 curl_multi_perform(curlm, &num_transfers);
29508e1e
NH
532#endif
533 return 1;
534}
535
536#ifdef USE_CURL_MULTI
fc57b6aa
DB
537struct fill_chain {
538 void *data;
539 int (*fill)(void *);
540 struct fill_chain *next;
541};
542
4251ccbd 543static struct fill_chain *fill_cfg;
fc57b6aa
DB
544
545void add_fill_function(void *data, int (*fill)(void *))
546{
e8eec71d 547 struct fill_chain *new = xmalloc(sizeof(*new));
fc57b6aa
DB
548 struct fill_chain **linkp = &fill_cfg;
549 new->data = data;
550 new->fill = fill;
551 new->next = NULL;
552 while (*linkp)
553 linkp = &(*linkp)->next;
554 *linkp = new;
555}
556
45c17412
DB
557void fill_active_slots(void)
558{
559 struct active_request_slot *slot = active_queue_head;
560
fc57b6aa
DB
561 while (active_requests < max_requests) {
562 struct fill_chain *fill;
563 for (fill = fill_cfg; fill; fill = fill->next)
564 if (fill->fill(fill->data))
565 break;
566
567 if (!fill)
45c17412 568 break;
fc57b6aa 569 }
45c17412
DB
570
571 while (slot != NULL) {
ad75ebe5
TRC
572 if (!slot->in_use && slot->curl != NULL
573 && curl_session_count > min_curl_sessions) {
45c17412
DB
574 curl_easy_cleanup(slot->curl);
575 slot->curl = NULL;
ad75ebe5 576 curl_session_count--;
45c17412
DB
577 }
578 slot = slot->next;
579 }
580}
581
29508e1e
NH
582void step_active_slots(void)
583{
584 int num_transfers;
585 CURLMcode curlm_result;
586
587 do {
588 curlm_result = curl_multi_perform(curlm, &num_transfers);
589 } while (curlm_result == CURLM_CALL_MULTI_PERFORM);
590 if (num_transfers < active_requests) {
591 process_curl_messages();
592 fill_active_slots();
593 }
594}
595#endif
596
597void run_active_slot(struct active_request_slot *slot)
598{
599#ifdef USE_CURL_MULTI
29508e1e
NH
600 fd_set readfds;
601 fd_set writefds;
602 fd_set excfds;
603 int max_fd;
604 struct timeval select_timeout;
baa7b67d 605 int finished = 0;
29508e1e 606
baa7b67d
NH
607 slot->finished = &finished;
608 while (!finished) {
29508e1e
NH
609 step_active_slots();
610
df26c471 611 if (slot->in_use) {
eb56c821
MF
612#if LIBCURL_VERSION_NUM >= 0x070f04
613 long curl_timeout;
614 curl_multi_timeout(curlm, &curl_timeout);
615 if (curl_timeout == 0) {
616 continue;
617 } else if (curl_timeout == -1) {
618 select_timeout.tv_sec = 0;
619 select_timeout.tv_usec = 50000;
620 } else {
621 select_timeout.tv_sec = curl_timeout / 1000;
622 select_timeout.tv_usec = (curl_timeout % 1000) * 1000;
623 }
624#else
625 select_timeout.tv_sec = 0;
626 select_timeout.tv_usec = 50000;
627#endif
29508e1e 628
6f9dd67f 629 max_fd = -1;
29508e1e
NH
630 FD_ZERO(&readfds);
631 FD_ZERO(&writefds);
632 FD_ZERO(&excfds);
6f9dd67f 633 curl_multi_fdset(curlm, &readfds, &writefds, &excfds, &max_fd);
eb56c821 634
7202b81f
SZ
635 /*
636 * It can happen that curl_multi_timeout returns a pathologically
637 * long timeout when curl_multi_fdset returns no file descriptors
638 * to read. See commit message for more details.
639 */
640 if (max_fd < 0 &&
641 (select_timeout.tv_sec > 0 ||
642 select_timeout.tv_usec > 50000)) {
643 select_timeout.tv_sec = 0;
644 select_timeout.tv_usec = 50000;
645 }
646
6f9dd67f 647 select(max_fd+1, &readfds, &writefds, &excfds, &select_timeout);
29508e1e
NH
648 }
649 }
650#else
651 while (slot->in_use) {
652 slot->curl_result = curl_easy_perform(slot->curl);
653 finish_active_slot(slot);
654 }
655#endif
656}
657
53f31389 658static void closedown_active_slot(struct active_request_slot *slot)
29508e1e 659{
028c2976
MH
660 active_requests--;
661 slot->in_use = 0;
53f31389
MW
662}
663
83e41e2e 664static void release_active_slot(struct active_request_slot *slot)
53f31389
MW
665{
666 closedown_active_slot(slot);
ad75ebe5 667 if (slot->curl && curl_session_count > min_curl_sessions) {
b3ca4e4e 668#ifdef USE_CURL_MULTI
53f31389 669 curl_multi_remove_handle(curlm, slot->curl);
b3ca4e4e 670#endif
53f31389
MW
671 curl_easy_cleanup(slot->curl);
672 slot->curl = NULL;
ad75ebe5 673 curl_session_count--;
53f31389 674 }
b3ca4e4e 675#ifdef USE_CURL_MULTI
53f31389 676 fill_active_slots();
b3ca4e4e 677#endif
53f31389
MW
678}
679
de1a2fdd 680void finish_active_slot(struct active_request_slot *slot)
53f31389
MW
681{
682 closedown_active_slot(slot);
028c2976 683 curl_easy_getinfo(slot->curl, CURLINFO_HTTP_CODE, &slot->http_code);
c8568e13 684
baa7b67d
NH
685 if (slot->finished != NULL)
686 (*slot->finished) = 1;
687
c8568e13
NH
688 /* Store slot results so they can be read after the slot is reused */
689 if (slot->results != NULL) {
690 slot->results->curl_result = slot->curl_result;
691 slot->results->http_code = slot->http_code;
692 }
693
028c2976 694 /* Run callback if appropriate */
4251ccbd 695 if (slot->callback_func != NULL)
028c2976 696 slot->callback_func(slot->callback_data);
29508e1e
NH
697}
698
699void finish_all_active_slots(void)
700{
701 struct active_request_slot *slot = active_queue_head;
702
703 while (slot != NULL)
704 if (slot->in_use) {
705 run_active_slot(slot);
706 slot = active_queue_head;
707 } else {
708 slot = slot->next;
709 }
710}
d7e92806 711
5ace994f 712/* Helpers for modifying and creating URLs */
d7e92806
MH
713static inline int needs_quote(int ch)
714{
715 if (((ch >= 'A') && (ch <= 'Z'))
716 || ((ch >= 'a') && (ch <= 'z'))
717 || ((ch >= '0') && (ch <= '9'))
718 || (ch == '/')
719 || (ch == '-')
720 || (ch == '.'))
721 return 0;
722 return 1;
723}
724
d7e92806
MH
725static char *quote_ref_url(const char *base, const char *ref)
726{
113106e0 727 struct strbuf buf = STRBUF_INIT;
d7e92806 728 const char *cp;
113106e0 729 int ch;
d7e92806 730
5ace994f 731 end_url_with_slash(&buf, base);
113106e0
TRC
732
733 for (cp = ref; (ch = *cp) != 0; cp++)
d7e92806 734 if (needs_quote(ch))
113106e0 735 strbuf_addf(&buf, "%%%02x", ch);
d7e92806 736 else
113106e0 737 strbuf_addch(&buf, *cp);
d7e92806 738
113106e0 739 return strbuf_detach(&buf, NULL);
d7e92806
MH
740}
741
5424bc55
TRC
742void append_remote_object_url(struct strbuf *buf, const char *url,
743 const char *hex,
744 int only_two_digit_prefix)
745{
800324c3
TRC
746 end_url_with_slash(buf, url);
747
748 strbuf_addf(buf, "objects/%.*s/", 2, hex);
5424bc55
TRC
749 if (!only_two_digit_prefix)
750 strbuf_addf(buf, "%s", hex+2);
751}
752
753char *get_remote_object_url(const char *url, const char *hex,
754 int only_two_digit_prefix)
755{
756 struct strbuf buf = STRBUF_INIT;
757 append_remote_object_url(&buf, url, hex, only_two_digit_prefix);
758 return strbuf_detach(&buf, NULL);
759}
760
1960897e 761int handle_curl_result(struct slot_results *results)
88097030 762{
88097030
JK
763 if (results->curl_result == CURLE_OK) {
764 credential_approve(&http_auth);
765 return HTTP_OK;
766 } else if (missing_target(results))
767 return HTTP_MISSING_TARGET;
768 else if (results->http_code == 401) {
769 if (http_auth.username && http_auth.password) {
770 credential_reject(&http_auth);
771 return HTTP_NOAUTH;
772 } else {
773 credential_fill(&http_auth);
88097030
JK
774 return HTTP_REAUTH;
775 }
776 } else {
3503e9ab 777#if LIBCURL_VERSION_NUM >= 0x070c00
88097030
JK
778 if (!curl_errorstr[0])
779 strlcpy(curl_errorstr,
780 curl_easy_strerror(results->curl_result),
781 sizeof(curl_errorstr));
3503e9ab 782#endif
88097030
JK
783 return HTTP_ERROR;
784 }
785}
786
e929cd20
MH
787/* http_request() targets */
788#define HTTP_REQUEST_STRBUF 0
789#define HTTP_REQUEST_FILE 1
790
791static int http_request(const char *url, void *result, int target, int options)
792{
793 struct active_request_slot *slot;
794 struct slot_results results;
795 struct curl_slist *headers = NULL;
796 struct strbuf buf = STRBUF_INIT;
797 int ret;
798
799 slot = get_active_slot();
800 slot->results = &results;
801 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
802
803 if (result == NULL) {
804 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
805 } else {
806 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
807 curl_easy_setopt(slot->curl, CURLOPT_FILE, result);
808
809 if (target == HTTP_REQUEST_FILE) {
810 long posn = ftell(result);
811 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION,
812 fwrite);
813 if (posn > 0) {
814 strbuf_addf(&buf, "Range: bytes=%ld-", posn);
815 headers = curl_slist_append(headers, buf.buf);
816 strbuf_reset(&buf);
817 }
e929cd20
MH
818 } else
819 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION,
820 fwrite_buffer);
821 }
822
823 strbuf_addstr(&buf, "Pragma:");
824 if (options & HTTP_NO_CACHE)
825 strbuf_addstr(&buf, " no-cache");
826
827 headers = curl_slist_append(headers, buf.buf);
828
829 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
830 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
aa90b969 831 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "gzip");
e929cd20
MH
832
833 if (start_active_slot(slot)) {
834 run_active_slot(slot);
1960897e 835 ret = handle_curl_result(&results);
e929cd20
MH
836 } else {
837 error("Unable to start HTTP request for %s", url);
838 ret = HTTP_START_FAILED;
839 }
840
e929cd20
MH
841 curl_slist_free_all(headers);
842 strbuf_release(&buf);
843
844 return ret;
845}
846
8d677edc
JK
847static int http_request_reauth(const char *url, void *result, int target,
848 int options)
849{
850 int ret = http_request(url, result, target, options);
851 if (ret != HTTP_REAUTH)
852 return ret;
853 return http_request(url, result, target, options);
854}
855
e929cd20
MH
856int http_get_strbuf(const char *url, struct strbuf *result, int options)
857{
8d677edc 858 return http_request_reauth(url, result, HTTP_REQUEST_STRBUF, options);
e929cd20
MH
859}
860
83e41e2e 861/*
a7793a74 862 * Downloads a URL and stores the result in the given file.
83e41e2e
JH
863 *
864 * If a previous interrupted download is detected (i.e. a previous temporary
865 * file is still around) the download is resumed.
866 */
867static int http_get_file(const char *url, const char *filename, int options)
e929cd20
MH
868{
869 int ret;
870 struct strbuf tmpfile = STRBUF_INIT;
871 FILE *result;
872
873 strbuf_addf(&tmpfile, "%s.temp", filename);
874 result = fopen(tmpfile.buf, "a");
875 if (! result) {
876 error("Unable to open local file %s", tmpfile.buf);
877 ret = HTTP_ERROR;
878 goto cleanup;
879 }
880
8d677edc 881 ret = http_request_reauth(url, result, HTTP_REQUEST_FILE, options);
e929cd20
MH
882 fclose(result);
883
884 if ((ret == HTTP_OK) && move_temp_to_file(tmpfile.buf, filename))
885 ret = HTTP_ERROR;
886cleanup:
887 strbuf_release(&tmpfile);
888 return ret;
889}
890
891int http_error(const char *url, int ret)
892{
893 /* http_request has already handled HTTP_START_FAILED. */
894 if (ret != HTTP_START_FAILED)
8abc5082 895 error("%s while accessing %s", curl_errorstr, url);
e929cd20
MH
896
897 return ret;
898}
899
c13b2633 900int http_fetch_ref(const char *base, struct ref *ref)
d7e92806
MH
901{
902 char *url;
903 struct strbuf buffer = STRBUF_INIT;
0d5896e1 904 int ret = -1;
d7e92806 905
c13b2633 906 url = quote_ref_url(base, ref->name);
0d5896e1
MH
907 if (http_get_strbuf(url, &buffer, HTTP_NO_CACHE) == HTTP_OK) {
908 strbuf_rtrim(&buffer);
909 if (buffer.len == 40)
910 ret = get_sha1_hex(buffer.buf, ref->old_sha1);
911 else if (!prefixcmp(buffer.buf, "ref: ")) {
912 ref->symref = xstrdup(buffer.buf + 5);
913 ret = 0;
d7e92806 914 }
d7e92806
MH
915 }
916
917 strbuf_release(&buffer);
918 free(url);
919 return ret;
920}
b8caac2b
TRC
921
922/* Helpers for fetching packs */
750ef425 923static char *fetch_pack_index(unsigned char *sha1, const char *base_url)
b8caac2b 924{
750ef425 925 char *url, *tmp;
b8caac2b 926 struct strbuf buf = STRBUF_INIT;
b8caac2b 927
b8caac2b 928 if (http_is_verbose)
162eb5f8 929 fprintf(stderr, "Getting index for pack %s\n", sha1_to_hex(sha1));
b8caac2b
TRC
930
931 end_url_with_slash(&buf, base_url);
162eb5f8 932 strbuf_addf(&buf, "objects/pack/pack-%s.idx", sha1_to_hex(sha1));
b8caac2b
TRC
933 url = strbuf_detach(&buf, NULL);
934
750ef425
SP
935 strbuf_addf(&buf, "%s.temp", sha1_pack_index_name(sha1));
936 tmp = strbuf_detach(&buf, NULL);
937
938 if (http_get_file(url, tmp, 0) != HTTP_OK) {
82247e9b 939 error("Unable to get pack index %s", url);
750ef425
SP
940 free(tmp);
941 tmp = NULL;
942 }
b8caac2b 943
b8caac2b 944 free(url);
750ef425 945 return tmp;
b8caac2b
TRC
946}
947
948static int fetch_and_setup_pack_index(struct packed_git **packs_head,
949 unsigned char *sha1, const char *base_url)
950{
951 struct packed_git *new_pack;
750ef425
SP
952 char *tmp_idx = NULL;
953 int ret;
b8caac2b 954
750ef425
SP
955 if (has_pack_index(sha1)) {
956 new_pack = parse_pack_index(sha1, NULL);
957 if (!new_pack)
958 return -1; /* parse_pack_index() already issued error message */
959 goto add_pack;
960 }
961
962 tmp_idx = fetch_pack_index(sha1, base_url);
963 if (!tmp_idx)
b8caac2b
TRC
964 return -1;
965
750ef425
SP
966 new_pack = parse_pack_index(sha1, tmp_idx);
967 if (!new_pack) {
968 unlink(tmp_idx);
969 free(tmp_idx);
970
b8caac2b 971 return -1; /* parse_pack_index() already issued error message */
750ef425
SP
972 }
973
974 ret = verify_pack_index(new_pack);
975 if (!ret) {
976 close_pack_index(new_pack);
977 ret = move_temp_to_file(tmp_idx, sha1_pack_index_name(sha1));
978 }
979 free(tmp_idx);
980 if (ret)
981 return -1;
982
983add_pack:
b8caac2b
TRC
984 new_pack->next = *packs_head;
985 *packs_head = new_pack;
986 return 0;
987}
988
989int http_get_info_packs(const char *base_url, struct packed_git **packs_head)
990{
991 int ret = 0, i = 0;
992 char *url, *data;
993 struct strbuf buf = STRBUF_INIT;
994 unsigned char sha1[20];
995
996 end_url_with_slash(&buf, base_url);
997 strbuf_addstr(&buf, "objects/info/packs");
998 url = strbuf_detach(&buf, NULL);
999
1000 ret = http_get_strbuf(url, &buf, HTTP_NO_CACHE);
1001 if (ret != HTTP_OK)
1002 goto cleanup;
1003
1004 data = buf.buf;
1005 while (i < buf.len) {
1006 switch (data[i]) {
1007 case 'P':
1008 i++;
1009 if (i + 52 <= buf.len &&
1010 !prefixcmp(data + i, " pack-") &&
1011 !prefixcmp(data + i + 46, ".pack\n")) {
1012 get_sha1_hex(data + i + 6, sha1);
1013 fetch_and_setup_pack_index(packs_head, sha1,
1014 base_url);
1015 i += 51;
1016 break;
1017 }
1018 default:
1019 while (i < buf.len && data[i] != '\n')
1020 i++;
1021 }
1022 i++;
1023 }
1024
1025cleanup:
1026 free(url);
1027 return ret;
1028}
2264dfa5
TRC
1029
1030void release_http_pack_request(struct http_pack_request *preq)
1031{
1032 if (preq->packfile != NULL) {
1033 fclose(preq->packfile);
1034 preq->packfile = NULL;
2264dfa5
TRC
1035 }
1036 if (preq->range_header != NULL) {
1037 curl_slist_free_all(preq->range_header);
1038 preq->range_header = NULL;
1039 }
1040 preq->slot = NULL;
1041 free(preq->url);
1042}
1043
1044int finish_http_pack_request(struct http_pack_request *preq)
1045{
2264dfa5 1046 struct packed_git **lst;
021ab6f0 1047 struct packed_git *p = preq->target;
fe72d420
SP
1048 char *tmp_idx;
1049 struct child_process ip;
1050 const char *ip_argv[8];
2264dfa5 1051
fe72d420 1052 close_pack_index(p);
2264dfa5 1053
3065274c
SP
1054 fclose(preq->packfile);
1055 preq->packfile = NULL;
2264dfa5
TRC
1056
1057 lst = preq->lst;
021ab6f0 1058 while (*lst != p)
2264dfa5
TRC
1059 lst = &((*lst)->next);
1060 *lst = (*lst)->next;
1061
fe72d420
SP
1062 tmp_idx = xstrdup(preq->tmpfile);
1063 strcpy(tmp_idx + strlen(tmp_idx) - strlen(".pack.temp"),
1064 ".idx.temp");
1065
1066 ip_argv[0] = "index-pack";
1067 ip_argv[1] = "-o";
1068 ip_argv[2] = tmp_idx;
1069 ip_argv[3] = preq->tmpfile;
1070 ip_argv[4] = NULL;
1071
1072 memset(&ip, 0, sizeof(ip));
1073 ip.argv = ip_argv;
1074 ip.git_cmd = 1;
1075 ip.no_stdin = 1;
1076 ip.no_stdout = 1;
1077
1078 if (run_command(&ip)) {
1079 unlink(preq->tmpfile);
1080 unlink(tmp_idx);
1081 free(tmp_idx);
2264dfa5 1082 return -1;
fe72d420
SP
1083 }
1084
1085 unlink(sha1_pack_index_name(p->sha1));
2264dfa5 1086
fe72d420
SP
1087 if (move_temp_to_file(preq->tmpfile, sha1_pack_name(p->sha1))
1088 || move_temp_to_file(tmp_idx, sha1_pack_index_name(p->sha1))) {
1089 free(tmp_idx);
2264dfa5 1090 return -1;
fe72d420 1091 }
2264dfa5 1092
fe72d420
SP
1093 install_packed_git(p);
1094 free(tmp_idx);
2264dfa5
TRC
1095 return 0;
1096}
1097
1098struct http_pack_request *new_http_pack_request(
1099 struct packed_git *target, const char *base_url)
1100{
2264dfa5
TRC
1101 long prev_posn = 0;
1102 char range[RANGE_HEADER_SIZE];
1103 struct strbuf buf = STRBUF_INIT;
1104 struct http_pack_request *preq;
1105
ec99c9a8 1106 preq = xcalloc(1, sizeof(*preq));
2264dfa5 1107 preq->target = target;
2264dfa5
TRC
1108
1109 end_url_with_slash(&buf, base_url);
1110 strbuf_addf(&buf, "objects/pack/pack-%s.pack",
1111 sha1_to_hex(target->sha1));
bb99190e 1112 preq->url = strbuf_detach(&buf, NULL);
2264dfa5 1113
90d05713
TRC
1114 snprintf(preq->tmpfile, sizeof(preq->tmpfile), "%s.temp",
1115 sha1_pack_name(target->sha1));
2264dfa5
TRC
1116 preq->packfile = fopen(preq->tmpfile, "a");
1117 if (!preq->packfile) {
1118 error("Unable to open local file %s for pack",
1119 preq->tmpfile);
1120 goto abort;
1121 }
1122
1123 preq->slot = get_active_slot();
2264dfa5
TRC
1124 curl_easy_setopt(preq->slot->curl, CURLOPT_FILE, preq->packfile);
1125 curl_easy_setopt(preq->slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
bb99190e 1126 curl_easy_setopt(preq->slot->curl, CURLOPT_URL, preq->url);
2264dfa5
TRC
1127 curl_easy_setopt(preq->slot->curl, CURLOPT_HTTPHEADER,
1128 no_pragma_header);
1129
1130 /*
1131 * If there is data present from a previous transfer attempt,
1132 * resume where it left off
1133 */
1134 prev_posn = ftell(preq->packfile);
1135 if (prev_posn>0) {
1136 if (http_is_verbose)
1137 fprintf(stderr,
1138 "Resuming fetch of pack %s at byte %ld\n",
1139 sha1_to_hex(target->sha1), prev_posn);
1140 sprintf(range, "Range: bytes=%ld-", prev_posn);
1141 preq->range_header = curl_slist_append(NULL, range);
1142 curl_easy_setopt(preq->slot->curl, CURLOPT_HTTPHEADER,
1143 preq->range_header);
1144 }
1145
1146 return preq;
1147
1148abort:
bb99190e 1149 free(preq->url);
5ae9ebfd 1150 free(preq);
2264dfa5
TRC
1151 return NULL;
1152}
5424bc55
TRC
1153
1154/* Helpers for fetching objects (loose) */
a04ff3ec 1155static size_t fwrite_sha1_file(char *ptr, size_t eltsize, size_t nmemb,
5424bc55
TRC
1156 void *data)
1157{
1158 unsigned char expn[4096];
1159 size_t size = eltsize * nmemb;
1160 int posn = 0;
1161 struct http_object_request *freq =
1162 (struct http_object_request *)data;
1163 do {
1164 ssize_t retval = xwrite(freq->localfile,
1165 (char *) ptr + posn, size - posn);
1166 if (retval < 0)
1167 return posn;
1168 posn += retval;
1169 } while (posn < size);
1170
1171 freq->stream.avail_in = size;
a04ff3ec 1172 freq->stream.next_in = (void *)ptr;
5424bc55
TRC
1173 do {
1174 freq->stream.next_out = expn;
1175 freq->stream.avail_out = sizeof(expn);
1176 freq->zret = git_inflate(&freq->stream, Z_SYNC_FLUSH);
1177 git_SHA1_Update(&freq->c, expn,
1178 sizeof(expn) - freq->stream.avail_out);
1179 } while (freq->stream.avail_in && freq->zret == Z_OK);
5424bc55
TRC
1180 return size;
1181}
1182
1183struct http_object_request *new_http_object_request(const char *base_url,
1184 unsigned char *sha1)
1185{
1186 char *hex = sha1_to_hex(sha1);
1187 char *filename;
1188 char prevfile[PATH_MAX];
5424bc55 1189 int prevlocal;
a04ff3ec 1190 char prev_buf[PREV_BUF_SIZE];
5424bc55
TRC
1191 ssize_t prev_read = 0;
1192 long prev_posn = 0;
1193 char range[RANGE_HEADER_SIZE];
1194 struct curl_slist *range_header = NULL;
1195 struct http_object_request *freq;
1196
ec99c9a8 1197 freq = xcalloc(1, sizeof(*freq));
5424bc55
TRC
1198 hashcpy(freq->sha1, sha1);
1199 freq->localfile = -1;
1200
1201 filename = sha1_file_name(sha1);
5424bc55
TRC
1202 snprintf(freq->tmpfile, sizeof(freq->tmpfile),
1203 "%s.temp", filename);
1204
1205 snprintf(prevfile, sizeof(prevfile), "%s.prev", filename);
1206 unlink_or_warn(prevfile);
1207 rename(freq->tmpfile, prevfile);
1208 unlink_or_warn(freq->tmpfile);
1209
1210 if (freq->localfile != -1)
1211 error("fd leakage in start: %d", freq->localfile);
1212 freq->localfile = open(freq->tmpfile,
1213 O_WRONLY | O_CREAT | O_EXCL, 0666);
1214 /*
1215 * This could have failed due to the "lazy directory creation";
1216 * try to mkdir the last path component.
1217 */
1218 if (freq->localfile < 0 && errno == ENOENT) {
1219 char *dir = strrchr(freq->tmpfile, '/');
1220 if (dir) {
1221 *dir = 0;
1222 mkdir(freq->tmpfile, 0777);
1223 *dir = '/';
1224 }
1225 freq->localfile = open(freq->tmpfile,
1226 O_WRONLY | O_CREAT | O_EXCL, 0666);
1227 }
1228
1229 if (freq->localfile < 0) {
0da8b2e7
SP
1230 error("Couldn't create temporary file %s: %s",
1231 freq->tmpfile, strerror(errno));
5424bc55
TRC
1232 goto abort;
1233 }
1234
5424bc55
TRC
1235 git_inflate_init(&freq->stream);
1236
1237 git_SHA1_Init(&freq->c);
1238
bb99190e 1239 freq->url = get_remote_object_url(base_url, hex, 0);
5424bc55
TRC
1240
1241 /*
1242 * If a previous temp file is present, process what was already
1243 * fetched.
1244 */
1245 prevlocal = open(prevfile, O_RDONLY);
1246 if (prevlocal != -1) {
1247 do {
1248 prev_read = xread(prevlocal, prev_buf, PREV_BUF_SIZE);
1249 if (prev_read>0) {
1250 if (fwrite_sha1_file(prev_buf,
1251 1,
1252 prev_read,
1253 freq) == prev_read) {
1254 prev_posn += prev_read;
1255 } else {
1256 prev_read = -1;
1257 }
1258 }
1259 } while (prev_read > 0);
1260 close(prevlocal);
1261 }
1262 unlink_or_warn(prevfile);
1263
1264 /*
1265 * Reset inflate/SHA1 if there was an error reading the previous temp
1266 * file; also rewind to the beginning of the local file.
1267 */
1268 if (prev_read == -1) {
1269 memset(&freq->stream, 0, sizeof(freq->stream));
1270 git_inflate_init(&freq->stream);
1271 git_SHA1_Init(&freq->c);
1272 if (prev_posn>0) {
1273 prev_posn = 0;
1274 lseek(freq->localfile, 0, SEEK_SET);
0c4f21e4 1275 if (ftruncate(freq->localfile, 0) < 0) {
0da8b2e7
SP
1276 error("Couldn't truncate temporary file %s: %s",
1277 freq->tmpfile, strerror(errno));
0c4f21e4
JL
1278 goto abort;
1279 }
5424bc55
TRC
1280 }
1281 }
1282
1283 freq->slot = get_active_slot();
1284
1285 curl_easy_setopt(freq->slot->curl, CURLOPT_FILE, freq);
1286 curl_easy_setopt(freq->slot->curl, CURLOPT_WRITEFUNCTION, fwrite_sha1_file);
1287 curl_easy_setopt(freq->slot->curl, CURLOPT_ERRORBUFFER, freq->errorstr);
bb99190e 1288 curl_easy_setopt(freq->slot->curl, CURLOPT_URL, freq->url);
5424bc55
TRC
1289 curl_easy_setopt(freq->slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
1290
1291 /*
1292 * If we have successfully processed data from a previous fetch
1293 * attempt, only fetch the data we don't already have.
1294 */
1295 if (prev_posn>0) {
1296 if (http_is_verbose)
1297 fprintf(stderr,
1298 "Resuming fetch of object %s at byte %ld\n",
1299 hex, prev_posn);
1300 sprintf(range, "Range: bytes=%ld-", prev_posn);
1301 range_header = curl_slist_append(range_header, range);
1302 curl_easy_setopt(freq->slot->curl,
1303 CURLOPT_HTTPHEADER, range_header);
1304 }
1305
1306 return freq;
1307
5424bc55 1308abort:
bb99190e 1309 free(freq->url);
5424bc55
TRC
1310 free(freq);
1311 return NULL;
1312}
1313
1314void process_http_object_request(struct http_object_request *freq)
1315{
1316 if (freq->slot == NULL)
1317 return;
1318 freq->curl_result = freq->slot->curl_result;
1319 freq->http_code = freq->slot->http_code;
1320 freq->slot = NULL;
1321}
1322
1323int finish_http_object_request(struct http_object_request *freq)
1324{
1325 struct stat st;
1326
1327 close(freq->localfile);
1328 freq->localfile = -1;
1329
1330 process_http_object_request(freq);
1331
1332 if (freq->http_code == 416) {
bd757c18 1333 warning("requested range invalid; we may already have all the data.");
5424bc55
TRC
1334 } else if (freq->curl_result != CURLE_OK) {
1335 if (stat(freq->tmpfile, &st) == 0)
1336 if (st.st_size == 0)
1337 unlink_or_warn(freq->tmpfile);
1338 return -1;
1339 }
1340
1341 git_inflate_end(&freq->stream);
1342 git_SHA1_Final(freq->real_sha1, &freq->c);
1343 if (freq->zret != Z_STREAM_END) {
1344 unlink_or_warn(freq->tmpfile);
1345 return -1;
1346 }
1347 if (hashcmp(freq->sha1, freq->real_sha1)) {
1348 unlink_or_warn(freq->tmpfile);
1349 return -1;
1350 }
1351 freq->rename =
0da8b2e7 1352 move_temp_to_file(freq->tmpfile, sha1_file_name(freq->sha1));
5424bc55
TRC
1353
1354 return freq->rename;
1355}
1356
1357void abort_http_object_request(struct http_object_request *freq)
1358{
1359 unlink_or_warn(freq->tmpfile);
1360
1361 release_http_object_request(freq);
1362}
1363
1364void release_http_object_request(struct http_object_request *freq)
1365{
1366 if (freq->localfile != -1) {
1367 close(freq->localfile);
1368 freq->localfile = -1;
1369 }
1370 if (freq->url != NULL) {
1371 free(freq->url);
1372 freq->url = NULL;
1373 }
4b9fa0e3
TRC
1374 if (freq->slot != NULL) {
1375 freq->slot->callback_func = NULL;
1376 freq->slot->callback_data = NULL;
1377 release_active_slot(freq->slot);
1378 freq->slot = NULL;
1379 }
5424bc55 1380}