]> git.ipfire.org Git - thirdparty/git.git/blame - remote-curl.c
l10n: it.po: update the Italian translation for Git 2.24.0 round #2
[thirdparty/git.git] / remote-curl.c
CommitLineData
a2d725b7 1#include "cache.h"
b2141fc1 2#include "config.h"
a2d725b7 3#include "remote.h"
ad6ac124 4#include "connect.h"
a2d725b7
DB
5#include "strbuf.h"
6#include "walker.h"
7#include "http.h"
d807c4a0 8#include "exec-cmd.h"
ae4efe19 9#include "run-command.h"
97cc7bc4 10#include "pkt-line.h"
05c1eb10 11#include "string-list.h"
de1a2fdd 12#include "sideband.h"
222b1212 13#include "argv-array.h"
2501aff8 14#include "credential.h"
16094885 15#include "sha1-array.h"
30261094 16#include "send-pack.h"
ad6ac124 17#include "protocol.h"
90dce21e 18#include "quote.h"
c1284b21 19#include "transport.h"
a2d725b7 20
37a8768f 21static struct remote *remote;
b227bbc4
JK
22/* always ends with a trailing slash */
23static struct strbuf url = STRBUF_INIT;
37a8768f 24
ef08ef9e
SP
25struct options {
26 int verbosity;
27 unsigned long depth;
508ea882 28 char *deepen_since;
a45a2600 29 struct string_list deepen_not;
511155db 30 struct string_list push_options;
acb0c572 31 char *filter;
ef08ef9e 32 unsigned progress : 1,
9ba38048 33 check_self_contained_and_connected : 1,
16094885
NTND
34 cloning : 1,
35 update_shallow : 1,
ae4efe19 36 followtags : 1,
de1a2fdd 37 dry_run : 1,
0ea47f9d 38 thin : 1,
30261094 39 /* One of the SEND_PACK_PUSH_CERT_* constants. */
cccf74e2 40 push_cert : 2,
88e2f9ed
JT
41 deepen_relative : 1,
42 from_promisor : 1,
6f119424 43 no_dependents : 1,
44 atomic : 1;
ef08ef9e
SP
45};
46static struct options options;
05c1eb10 47static struct string_list cas_options = STRING_LIST_INIT_DUP;
ef08ef9e 48
ef08ef9e
SP
49static int set_option(const char *name, const char *value)
50{
51 if (!strcmp(name, "verbosity")) {
52 char *end;
53 int v = strtol(value, &end, 10);
54 if (value == end || *end)
55 return -1;
56 options.verbosity = v;
57 return 0;
58 }
59 else if (!strcmp(name, "progress")) {
60 if (!strcmp(value, "true"))
61 options.progress = 1;
62 else if (!strcmp(value, "false"))
63 options.progress = 0;
64 else
65 return -1;
249b2004 66 return 0;
ef08ef9e
SP
67 }
68 else if (!strcmp(name, "depth")) {
69 char *end;
70 unsigned long v = strtoul(value, &end, 10);
71 if (value == end || *end)
72 return -1;
73 options.depth = v;
249b2004 74 return 0;
ef08ef9e 75 }
508ea882
NTND
76 else if (!strcmp(name, "deepen-since")) {
77 options.deepen_since = xstrdup(value);
78 return 0;
79 }
a45a2600
NTND
80 else if (!strcmp(name, "deepen-not")) {
81 string_list_append(&options.deepen_not, value);
82 return 0;
83 }
cccf74e2
NTND
84 else if (!strcmp(name, "deepen-relative")) {
85 if (!strcmp(value, "true"))
86 options.deepen_relative = 1;
87 else if (!strcmp(value, "false"))
88 options.deepen_relative = 0;
89 else
90 return -1;
91 return 0;
92 }
ef08ef9e
SP
93 else if (!strcmp(name, "followtags")) {
94 if (!strcmp(value, "true"))
95 options.followtags = 1;
96 else if (!strcmp(value, "false"))
97 options.followtags = 0;
98 else
99 return -1;
249b2004 100 return 0;
ef08ef9e 101 }
ae4efe19
SP
102 else if (!strcmp(name, "dry-run")) {
103 if (!strcmp(value, "true"))
104 options.dry_run = 1;
105 else if (!strcmp(value, "false"))
106 options.dry_run = 0;
107 else
108 return -1;
109 return 0;
110 }
9ba38048
NTND
111 else if (!strcmp(name, "check-connectivity")) {
112 if (!strcmp(value, "true"))
113 options.check_self_contained_and_connected = 1;
114 else if (!strcmp(value, "false"))
115 options.check_self_contained_and_connected = 0;
116 else
117 return -1;
118 return 0;
119 }
05c1eb10
JH
120 else if (!strcmp(name, "cas")) {
121 struct strbuf val = STRBUF_INIT;
122 strbuf_addf(&val, "--" CAS_OPT_NAME "=%s", value);
123 string_list_append(&cas_options, val.buf);
124 strbuf_release(&val);
125 return 0;
16094885
NTND
126 } else if (!strcmp(name, "cloning")) {
127 if (!strcmp(value, "true"))
128 options.cloning = 1;
129 else if (!strcmp(value, "false"))
130 options.cloning = 0;
131 else
132 return -1;
133 return 0;
134 } else if (!strcmp(name, "update-shallow")) {
135 if (!strcmp(value, "true"))
136 options.update_shallow = 1;
137 else if (!strcmp(value, "false"))
138 options.update_shallow = 0;
139 else
140 return -1;
141 return 0;
0ea47f9d
JH
142 } else if (!strcmp(name, "pushcert")) {
143 if (!strcmp(value, "true"))
30261094 144 options.push_cert = SEND_PACK_PUSH_CERT_ALWAYS;
0ea47f9d 145 else if (!strcmp(value, "false"))
30261094
DB
146 options.push_cert = SEND_PACK_PUSH_CERT_NEVER;
147 else if (!strcmp(value, "if-asked"))
148 options.push_cert = SEND_PACK_PUSH_CERT_IF_ASKED;
0ea47f9d
JH
149 else
150 return -1;
151 return 0;
6f119424 152 } else if (!strcmp(name, "atomic")) {
153 if (!strcmp(value, "true"))
154 options.atomic = 1;
155 else if (!strcmp(value, "false"))
156 options.atomic = 0;
157 else
158 return -1;
159 return 0;
511155db 160 } else if (!strcmp(name, "push-option")) {
90dce21e
JK
161 if (*value != '"')
162 string_list_append(&options.push_options, value);
163 else {
164 struct strbuf unquoted = STRBUF_INIT;
165 if (unquote_c_style(&unquoted, value, NULL) < 0)
ed8b4132 166 die(_("invalid quoting in push-option value: '%s'"), value);
90dce21e
JK
167 string_list_append_nodup(&options.push_options,
168 strbuf_detach(&unquoted, NULL));
169 }
511155db 170 return 0;
c915f11e
EW
171
172#if LIBCURL_VERSION_NUM >= 0x070a08
173 } else if (!strcmp(name, "family")) {
174 if (!strcmp(value, "ipv4"))
175 git_curl_ipresolve = CURL_IPRESOLVE_V4;
176 else if (!strcmp(value, "ipv6"))
177 git_curl_ipresolve = CURL_IPRESOLVE_V6;
178 else if (!strcmp(value, "all"))
179 git_curl_ipresolve = CURL_IPRESOLVE_WHATEVER;
180 else
181 return -1;
182 return 0;
183#endif /* LIBCURL_VERSION_NUM >= 0x070a08 */
88e2f9ed
JT
184 } else if (!strcmp(name, "from-promisor")) {
185 options.from_promisor = 1;
186 return 0;
187 } else if (!strcmp(name, "no-dependents")) {
188 options.no_dependents = 1;
189 return 0;
acb0c572 190 } else if (!strcmp(name, "filter")) {
c3b9bc94 191 options.filter = xstrdup(value);
acb0c572 192 return 0;
16094885 193 } else {
ef08ef9e
SP
194 return 1 /* unsupported */;
195 }
196}
197
97cc7bc4 198struct discovery {
f08a5d42 199 char *service;
97cc7bc4
SP
200 char *buf_alloc;
201 char *buf;
202 size_t len;
2a455202 203 struct ref *refs;
910650d2 204 struct oid_array shallow;
49e85e95 205 enum protocol_version version;
97cc7bc4
SP
206 unsigned proto_git : 1;
207};
208static struct discovery *last_discovery;
209
b8054bbe
JK
210static struct ref *parse_git_refs(struct discovery *heads, int for_push)
211{
212 struct ref *list = NULL;
ad6ac124
BW
213 struct packet_reader reader;
214
215 packet_reader_init(&reader, -1, heads->buf, heads->len,
216 PACKET_READ_CHOMP_NEWLINE |
2d103c31
MS
217 PACKET_READ_GENTLE_ON_EOF |
218 PACKET_READ_DIE_ON_ERR_PACKET);
ad6ac124 219
49e85e95
BW
220 heads->version = discover_version(&reader);
221 switch (heads->version) {
8f6982b4 222 case protocol_v2:
0f1dc53f
BW
223 /*
224 * Do nothing. This isn't a list of refs but rather a
225 * capability advertisement. Client would have run
226 * 'stateless-connect' so we'll dump this capability listing
227 * and let them request the refs themselves.
228 */
8f6982b4 229 break;
ad6ac124
BW
230 case protocol_v1:
231 case protocol_v0:
232 get_remote_heads(&reader, &list, for_push ? REF_NORMAL : 0,
233 NULL, &heads->shallow);
234 break;
235 case protocol_unknown_version:
236 BUG("unknown protocol version");
237 }
238
b8054bbe
JK
239 return list;
240}
241
242static struct ref *parse_info_refs(struct discovery *heads)
243{
244 char *data, *start, *mid;
245 char *ref_name;
246 int i = 0;
247
248 struct ref *refs = NULL;
249 struct ref *ref = NULL;
250 struct ref *last_ref = NULL;
251
252 data = heads->buf;
253 start = NULL;
254 mid = data;
255 while (i < heads->len) {
256 if (!start) {
257 start = &data[i];
258 }
259 if (data[i] == '\t')
260 mid = &data[i];
261 if (data[i] == '\n') {
9c9492e8 262 if (mid - start != the_hash_algo->hexsz)
ed8b4132 263 die(_("%sinfo/refs not valid: is this a git repository?"),
c1284b21 264 transport_anonymize_url(url.buf));
b8054bbe
JK
265 data[i] = 0;
266 ref_name = mid + 1;
6f687c21 267 ref = alloc_ref(ref_name);
f4e54d02 268 get_oid_hex(start, &ref->old_oid);
b8054bbe
JK
269 if (!refs)
270 refs = ref;
271 if (last_ref)
272 last_ref->next = ref;
273 last_ref = ref;
274 start = NULL;
275 }
276 i++;
277 }
278
279 ref = alloc_ref("HEAD");
b227bbc4 280 if (!http_fetch_ref(url.buf, ref) &&
b8054bbe
JK
281 !resolve_remote_symref(ref, refs)) {
282 ref->next = refs;
283 refs = ref;
284 } else {
285 free(ref);
286 }
287
288 return refs;
289}
290
97cc7bc4
SP
291static void free_discovery(struct discovery *d)
292{
293 if (d) {
294 if (d == last_discovery)
295 last_discovery = NULL;
ee3051bd 296 free(d->shallow.oid);
97cc7bc4 297 free(d->buf_alloc);
2a455202 298 free_refs(d->refs);
f08a5d42 299 free(d->service);
97cc7bc4
SP
300 free(d);
301 }
302}
303
fc1b774c
JK
304static int show_http_message(struct strbuf *type, struct strbuf *charset,
305 struct strbuf *msg)
426e70d4
JK
306{
307 const char *p, *eol;
308
309 /*
310 * We only show text/plain parts, as other types are likely
311 * to be ugly to look at on the user's terminal.
426e70d4 312 */
bf197fd7 313 if (strcmp(type->buf, "text/plain"))
426e70d4 314 return -1;
fc1b774c
JK
315 if (charset->len)
316 strbuf_reencode(msg, charset->buf, get_log_output_encoding());
426e70d4
JK
317
318 strbuf_trim(msg);
319 if (!msg->len)
320 return -1;
321
322 p = msg->buf;
323 do {
324 eol = strchrnul(p, '\n');
325 fprintf(stderr, "remote: %.*s\n", (int)(eol - p), p);
326 p = eol + 1;
327 } while(*eol);
328 return 0;
329}
330
884e586f
BW
331static int get_protocol_http_header(enum protocol_version version,
332 struct strbuf *header)
333{
334 if (version > 0) {
335 strbuf_addf(header, GIT_PROTOCOL_HEADER ": version=%d",
336 version);
337
338 return 1;
339 }
340
341 return 0;
342}
343
8ee3e120
JK
344static void check_smart_http(struct discovery *d, const char *service,
345 struct strbuf *type)
346{
347 const char *p;
348 struct packet_reader reader;
349
350 /*
351 * If we don't see x-$service-advertisement, then it's not smart-http.
352 * But once we do, we commit to it and assume any other protocol
353 * violations are hard errors.
354 */
355 if (!skip_prefix(type->buf, "application/x-", &p) ||
356 !skip_prefix(p, service, &p) ||
357 strcmp(p, "-advertisement"))
358 return;
359
360 packet_reader_init(&reader, -1, d->buf, d->len,
361 PACKET_READ_CHOMP_NEWLINE |
362 PACKET_READ_DIE_ON_ERR_PACKET);
363 if (packet_reader_read(&reader) != PACKET_READ_NORMAL)
aa1edf14 364 die(_("invalid server response; expected service, got flush packet"));
8ee3e120
JK
365
366 if (skip_prefix(reader.line, "# service=", &p) && !strcmp(p, service)) {
367 /*
368 * The header can include additional metadata lines, up
369 * until a packet flush marker. Ignore these now, but
370 * in the future we might start to scan them.
371 */
372 for (;;) {
373 packet_reader_read(&reader);
374 if (reader.pktlen <= 0) {
375 break;
376 }
377 }
378
379 /*
380 * v0 smart http; callers expect us to soak up the
381 * service and header packets
382 */
383 d->buf = reader.src_buffer;
384 d->len = reader.src_len;
385 d->proto_git = 1;
386
cbdb8d14 387 } else if (!strcmp(reader.line, "version 2")) {
8ee3e120
JK
388 /*
389 * v2 smart http; do not consume version packet, which will
390 * be handled elsewhere.
391 */
392 d->proto_git = 1;
393
394 } else {
aa1edf14 395 die(_("invalid server response; got '%s'"), reader.line);
8ee3e120
JK
396 }
397}
398
24d36f14 399static struct discovery *discover_refs(const char *service, int for_push)
a2d725b7 400{
4656bf47 401 struct strbuf type = STRBUF_INIT;
fc1b774c 402 struct strbuf charset = STRBUF_INIT;
a2d725b7 403 struct strbuf buffer = STRBUF_INIT;
c65d5692 404 struct strbuf refs_url = STRBUF_INIT;
050ef365 405 struct strbuf effective_url = STRBUF_INIT;
884e586f
BW
406 struct strbuf protocol_header = STRBUF_INIT;
407 struct string_list extra_headers = STRING_LIST_INIT_DUP;
97cc7bc4 408 struct discovery *last = last_discovery;
243c329c 409 int http_ret, maybe_smart = 0;
fcaa6e64 410 struct http_get_options http_options;
a4d78ce2 411 enum protocol_version version = get_protocol_version_config();
a2d725b7 412
97cc7bc4
SP
413 if (last && !strcmp(service, last->service))
414 return last;
415 free_discovery(last);
a2d725b7 416
b227bbc4 417 strbuf_addf(&refs_url, "%sinfo/refs", url.buf);
59556548 418 if ((starts_with(url.buf, "http://") || starts_with(url.buf, "https://")) &&
02572c2e 419 git_env_bool("GIT_SMART_HTTP", 1)) {
243c329c 420 maybe_smart = 1;
b227bbc4 421 if (!strchr(url.buf, '?'))
c65d5692 422 strbuf_addch(&refs_url, '?');
97cc7bc4 423 else
c65d5692
JK
424 strbuf_addch(&refs_url, '&');
425 strbuf_addf(&refs_url, "service=%s", service);
97cc7bc4 426 }
a2d725b7 427
a4d78ce2
BW
428 /*
429 * NEEDSWORK: If we are trying to use protocol v2 and we are planning
430 * to perform a push, then fallback to v0 since the client doesn't know
431 * how to push yet using v2.
432 */
433 if (version == protocol_v2 && !strcmp("git-receive-pack", service))
434 version = protocol_v0;
435
884e586f 436 /* Add the extra Git-Protocol header */
a4d78ce2 437 if (get_protocol_http_header(version, &protocol_header))
884e586f
BW
438 string_list_append(&extra_headers, protocol_header.buf);
439
fcaa6e64
JK
440 memset(&http_options, 0, sizeof(http_options));
441 http_options.content_type = &type;
442 http_options.charset = &charset;
443 http_options.effective_url = &effective_url;
444 http_options.base_url = &url;
884e586f 445 http_options.extra_headers = &extra_headers;
50d34137 446 http_options.initial_request = 1;
fcaa6e64 447 http_options.no_cache = 1;
1bbcc224 448
fcaa6e64 449 http_ret = http_get_strbuf(refs_url.buf, &buffer, &http_options);
a2d725b7
DB
450 switch (http_ret) {
451 case HTTP_OK:
452 break;
453 case HTTP_MISSING_TARGET:
fc1b774c 454 show_http_message(&type, &charset, &buffer);
ed8b4132 455 die(_("repository '%s' not found"),
c1284b21 456 transport_anonymize_url(url.buf));
42653c09 457 case HTTP_NOAUTH:
fc1b774c 458 show_http_message(&type, &charset, &buffer);
ed8b4132 459 die(_("Authentication failed for '%s'"),
c1284b21 460 transport_anonymize_url(url.buf));
a2d725b7 461 default:
fc1b774c 462 show_http_message(&type, &charset, &buffer);
ed8b4132 463 die(_("unable to access '%s': %s"),
c1284b21 464 transport_anonymize_url(url.buf), curl_errorstr);
a2d725b7
DB
465 }
466
c1284b21
JS
467 if (options.verbosity && !starts_with(refs_url.buf, url.buf)) {
468 char *u = transport_anonymize_url(url.buf);
469 warning(_("redirecting to %s"), u);
470 free(u);
471 }
50d34137 472
97cc7bc4 473 last= xcalloc(1, sizeof(*last_discovery));
f08a5d42 474 last->service = xstrdup(service);
97cc7bc4
SP
475 last->buf_alloc = strbuf_detach(&buffer, &last->len);
476 last->buf = last->buf_alloc;
477
8ee3e120
JK
478 if (maybe_smart)
479 check_smart_http(last, service, &type);
97cc7bc4 480
2a455202
JK
481 if (last->proto_git)
482 last->refs = parse_git_refs(last, for_push);
483 else
484 last->refs = parse_info_refs(last);
485
c65d5692 486 strbuf_release(&refs_url);
4656bf47 487 strbuf_release(&type);
fc1b774c 488 strbuf_release(&charset);
050ef365 489 strbuf_release(&effective_url);
97cc7bc4 490 strbuf_release(&buffer);
884e586f
BW
491 strbuf_release(&protocol_header);
492 string_list_clear(&extra_headers, 0);
97cc7bc4
SP
493 last_discovery = last;
494 return last;
495}
496
97cc7bc4
SP
497static struct ref *get_refs(int for_push)
498{
499 struct discovery *heads;
500
501 if (for_push)
2a455202 502 heads = discover_refs("git-receive-pack", for_push);
97cc7bc4 503 else
2a455202 504 heads = discover_refs("git-upload-pack", for_push);
97cc7bc4 505
2a455202 506 return heads->refs;
97cc7bc4
SP
507}
508
ae4efe19
SP
509static void output_refs(struct ref *refs)
510{
511 struct ref *posn;
512 for (posn = refs; posn; posn = posn->next) {
513 if (posn->symref)
514 printf("@%s %s\n", posn->symref, posn->name);
515 else
f4e54d02 516 printf("%s %s\n", oid_to_hex(&posn->old_oid), posn->name);
ae4efe19
SP
517 }
518 printf("\n");
519 fflush(stdout);
ae4efe19
SP
520}
521
de1a2fdd
SP
522struct rpc_state {
523 const char *service_name;
de1a2fdd
SP
524 char *service_url;
525 char *hdr_content_type;
526 char *hdr_accept;
884e586f 527 char *protocol_header;
de1a2fdd
SP
528 char *buf;
529 size_t alloc;
530 size_t len;
531 size_t pos;
532 int in;
533 int out;
296b847c 534 int any_written;
b8538603 535 unsigned gzip_request : 1;
6c81a990 536 unsigned initial_buffer : 1;
a97d0079
JT
537
538 /*
539 * Whenever a pkt-line is read into buf, append the 4 characters
540 * denoting its length before appending the payload.
541 */
542 unsigned write_line_lengths : 1;
543
544 /*
545 * Used by rpc_out; initialize to 0. This is true if a flush has been
546 * read, but the corresponding line length (if write_line_lengths is
547 * true) and EOF have not been sent to libcurl. Since each flush marks
548 * the end of a request, each flush must be completely sent before any
549 * further reading occurs.
550 */
551 unsigned flush_read_but_not_sent : 1;
de1a2fdd
SP
552};
553
78ad9172
JT
554/*
555 * Appends the result of reading from rpc->out to the string represented by
556 * rpc->buf and rpc->len if there is enough space. Returns 1 if there was
557 * enough space, 0 otherwise.
558 *
a97d0079
JT
559 * If rpc->write_line_lengths is true, appends the line length as a 4-byte
560 * hexadecimal string before appending the result described above.
561 *
562 * Writes the total number of bytes appended into appended.
78ad9172 563 */
a97d0079
JT
564static int rpc_read_from_out(struct rpc_state *rpc, int options,
565 size_t *appended,
566 enum packet_read_status *status) {
567 size_t left;
568 char *buf;
569 int pktlen_raw;
570
571 if (rpc->write_line_lengths) {
572 left = rpc->alloc - rpc->len - 4;
573 buf = rpc->buf + rpc->len + 4;
574 } else {
575 left = rpc->alloc - rpc->len;
576 buf = rpc->buf + rpc->len;
577 }
78ad9172
JT
578
579 if (left < LARGE_PACKET_MAX)
580 return 0;
581
a97d0079
JT
582 *status = packet_read_with_status(rpc->out, NULL, NULL, buf,
583 left, &pktlen_raw, options);
584 if (*status != PACKET_READ_EOF) {
585 *appended = pktlen_raw + (rpc->write_line_lengths ? 4 : 0);
586 rpc->len += *appended;
587 }
588
589 if (rpc->write_line_lengths) {
590 switch (*status) {
591 case PACKET_READ_EOF:
592 if (!(options & PACKET_READ_GENTLE_ON_EOF))
aa1edf14 593 die(_("shouldn't have EOF when not gentle on EOF"));
a97d0079
JT
594 break;
595 case PACKET_READ_NORMAL:
596 set_packet_header(buf - 4, *appended);
597 break;
598 case PACKET_READ_DELIM:
599 memcpy(buf - 4, "0001", 4);
600 break;
601 case PACKET_READ_FLUSH:
602 memcpy(buf - 4, "0000", 4);
603 break;
604 }
605 }
606
78ad9172
JT
607 return 1;
608}
609
de1a2fdd
SP
610static size_t rpc_out(void *ptr, size_t eltsize,
611 size_t nmemb, void *buffer_)
612{
613 size_t max = eltsize * nmemb;
614 struct rpc_state *rpc = buffer_;
615 size_t avail = rpc->len - rpc->pos;
a97d0079 616 enum packet_read_status status;
de1a2fdd
SP
617
618 if (!avail) {
6c81a990 619 rpc->initial_buffer = 0;
78ad9172 620 rpc->len = 0;
de1a2fdd 621 rpc->pos = 0;
a97d0079
JT
622 if (!rpc->flush_read_but_not_sent) {
623 if (!rpc_read_from_out(rpc, 0, &avail, &status))
624 BUG("The entire rpc->buf should be larger than LARGE_PACKET_MAX");
625 if (status == PACKET_READ_FLUSH)
626 rpc->flush_read_but_not_sent = 1;
627 }
628 /*
629 * If flush_read_but_not_sent is true, we have already read one
630 * full request but have not fully sent it + EOF, which is why
631 * we need to refrain from reading.
632 */
633 }
634 if (rpc->flush_read_but_not_sent) {
635 if (!avail) {
636 /*
637 * The line length either does not need to be sent at
638 * all or has already been completely sent. Now we can
639 * return 0, indicating EOF, meaning that the flush has
640 * been fully sent.
641 */
642 rpc->flush_read_but_not_sent = 0;
643 return 0;
644 }
645 /*
646 * If avail is non-zerp, the line length for the flush still
647 * hasn't been fully sent. Proceed with sending the line
648 * length.
649 */
de1a2fdd
SP
650 }
651
48310608 652 if (max < avail)
de1a2fdd
SP
653 avail = max;
654 memcpy(ptr, rpc->buf + rpc->pos, avail);
655 rpc->pos += avail;
656 return avail;
657}
658
6c81a990 659#ifndef NO_CURL_IOCTL
5092d3ec 660static curlioerr rpc_ioctl(CURL *handle, int cmd, void *clientp)
6c81a990
MS
661{
662 struct rpc_state *rpc = clientp;
663
664 switch (cmd) {
665 case CURLIOCMD_NOP:
666 return CURLIOE_OK;
667
668 case CURLIOCMD_RESTARTREAD:
669 if (rpc->initial_buffer) {
670 rpc->pos = 0;
671 return CURLIOE_OK;
672 }
ed8b4132 673 error(_("unable to rewind rpc post data - try increasing http.postBuffer"));
6c81a990
MS
674 return CURLIOE_FAILRESTART;
675
676 default:
677 return CURLIOE_UNKNOWNCMD;
678 }
679}
680#endif
681
cf2fb92b
MS
682struct rpc_in_data {
683 struct rpc_state *rpc;
b79bdd8c 684 struct active_request_slot *slot;
cf2fb92b
MS
685};
686
687/*
688 * A callback for CURLOPT_WRITEFUNCTION. The return value is the bytes consumed
689 * from ptr.
690 */
a04ff3ec 691static size_t rpc_in(char *ptr, size_t eltsize,
de1a2fdd
SP
692 size_t nmemb, void *buffer_)
693{
694 size_t size = eltsize * nmemb;
cf2fb92b 695 struct rpc_in_data *data = buffer_;
b79bdd8c
MS
696 long response_code;
697
698 if (curl_easy_getinfo(data->slot->curl, CURLINFO_RESPONSE_CODE,
699 &response_code) != CURLE_OK)
700 return size;
701 if (response_code >= 300)
702 return size;
296b847c 703 if (size)
cf2fb92b
MS
704 data->rpc->any_written = 1;
705 write_or_die(data->rpc->in, ptr, size);
de1a2fdd
SP
706 return size;
707}
708
3a347ed7
JK
709static int run_slot(struct active_request_slot *slot,
710 struct slot_results *results)
206b099d 711{
b81401c1 712 int err;
3a347ed7 713 struct slot_results results_buf;
206b099d 714
3a347ed7
JK
715 if (!results)
716 results = &results_buf;
717
beed336c 718 err = run_one_slot(slot, results);
206b099d 719
b81401c1 720 if (err != HTTP_OK && err != HTTP_REAUTH) {
00540458
SP
721 struct strbuf msg = STRBUF_INIT;
722 if (results->http_code && results->http_code != 200)
723 strbuf_addf(&msg, "HTTP %ld", results->http_code);
724 if (results->curl_result != CURLE_OK) {
725 if (msg.len)
726 strbuf_addch(&msg, ' ');
727 strbuf_addf(&msg, "curl %d", results->curl_result);
728 if (curl_errorstr[0]) {
729 strbuf_addch(&msg, ' ');
730 strbuf_addstr(&msg, curl_errorstr);
731 }
732 }
ed8b4132 733 error(_("RPC failed; %s"), msg.buf);
00540458 734 strbuf_release(&msg);
206b099d
SP
735 }
736
737 return err;
738}
739
3a347ed7 740static int probe_rpc(struct rpc_state *rpc, struct slot_results *results)
206b099d
SP
741{
742 struct active_request_slot *slot;
8cb01e2f 743 struct curl_slist *headers = http_copy_default_headers();
206b099d
SP
744 struct strbuf buf = STRBUF_INIT;
745 int err;
746
747 slot = get_active_slot();
748
749 headers = curl_slist_append(headers, rpc->hdr_content_type);
750 headers = curl_slist_append(headers, rpc->hdr_accept);
751
752 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
753 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
754 curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
aa90b969 755 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, NULL);
206b099d
SP
756 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, "0000");
757 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE, 4);
758 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
759 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
760 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buf);
761
3a347ed7 762 err = run_slot(slot, results);
206b099d
SP
763
764 curl_slist_free_all(headers);
765 strbuf_release(&buf);
766 return err;
767}
768
3b335762
NTND
769static curl_off_t xcurl_off_t(size_t len)
770{
cb8010bb
TB
771 uintmax_t size = len;
772 if (size > maximum_signed_value_of_type(curl_off_t))
ed8b4132 773 die(_("cannot handle pushes this big"));
cb8010bb 774 return (curl_off_t)size;
37ee680d
DT
775}
776
a97d0079
JT
777/*
778 * If flush_received is true, do not attempt to read any more; just use what's
779 * in rpc->buf.
780 */
781static int post_rpc(struct rpc_state *rpc, int flush_received)
de1a2fdd
SP
782{
783 struct active_request_slot *slot;
8cb01e2f 784 struct curl_slist *headers = http_copy_default_headers();
b8538603
SP
785 int use_gzip = rpc->gzip_request;
786 char *gzip_body = NULL;
37711549 787 size_t gzip_size = 0;
206b099d 788 int err, large_request = 0;
c80d96ca 789 int needs_100_continue = 0;
cf2fb92b 790 struct rpc_in_data rpc_in_data;
de1a2fdd
SP
791
792 /* Try to load the entire request, if we can fit it into the
793 * allocated buffer space we can use HTTP/1.0 and avoid the
794 * chunked encoding mess.
795 */
a97d0079
JT
796 if (!flush_received) {
797 while (1) {
798 size_t n;
799 enum packet_read_status status;
800
801 if (!rpc_read_from_out(rpc, 0, &n, &status)) {
802 large_request = 1;
803 use_gzip = 0;
804 break;
805 }
806 if (status == PACKET_READ_FLUSH)
807 break;
de1a2fdd 808 }
de1a2fdd
SP
809 }
810
206b099d 811 if (large_request) {
c80d96ca 812 struct slot_results results;
813
b81401c1 814 do {
c80d96ca 815 err = probe_rpc(rpc, &results);
2501aff8
JK
816 if (err == HTTP_REAUTH)
817 credential_fill(&http_auth);
b81401c1
JK
818 } while (err == HTTP_REAUTH);
819 if (err != HTTP_OK)
820 return -1;
c80d96ca 821
822 if (results.auth_avail & CURLAUTH_GSSNEGOTIATE)
823 needs_100_continue = 1;
206b099d
SP
824 }
825
abf8df86
JK
826 headers = curl_slist_append(headers, rpc->hdr_content_type);
827 headers = curl_slist_append(headers, rpc->hdr_accept);
c80d96ca 828 headers = curl_slist_append(headers, needs_100_continue ?
829 "Expect: 100-continue" : "Expect:");
abf8df86 830
884e586f
BW
831 /* Add the extra Git-Protocol header */
832 if (rpc->protocol_header)
833 headers = curl_slist_append(headers, rpc->protocol_header);
834
abf8df86 835retry:
de1a2fdd 836 slot = get_active_slot();
de1a2fdd 837
de1a2fdd 838 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
d21f9794 839 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
de1a2fdd 840 curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
1a53e692 841 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "");
de1a2fdd 842
de1a2fdd
SP
843 if (large_request) {
844 /* The request body is large and the size cannot be predicted.
845 * We must use chunked encoding to send it.
846 */
de1a2fdd 847 headers = curl_slist_append(headers, "Transfer-Encoding: chunked");
6c81a990 848 rpc->initial_buffer = 1;
de1a2fdd
SP
849 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, rpc_out);
850 curl_easy_setopt(slot->curl, CURLOPT_INFILE, rpc);
6c81a990
MS
851#ifndef NO_CURL_IOCTL
852 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, rpc_ioctl);
853 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, rpc);
854#endif
de1a2fdd
SP
855 if (options.verbosity > 1) {
856 fprintf(stderr, "POST %s (chunked)\n", rpc->service_name);
857 fflush(stderr);
858 }
859
2e736fd5
JK
860 } else if (gzip_body) {
861 /*
862 * If we are looping to retry authentication, then the previous
863 * run will have set up the headers and gzip buffer already,
864 * and we just need to send it.
865 */
866 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
37ee680d 867 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
2e736fd5 868
b8538603
SP
869 } else if (use_gzip && 1024 < rpc->len) {
870 /* The client backend isn't giving us compressed data so
a8132410 871 * we can try to deflate it ourselves, this may save on
b8538603
SP
872 * the transfer time.
873 */
ef49a7a0 874 git_zstream stream;
b8538603
SP
875 int ret;
876
55bb5c91 877 git_deflate_init_gzip(&stream, Z_BEST_COMPRESSION);
df126e10
JK
878 gzip_size = git_deflate_bound(&stream, rpc->len);
879 gzip_body = xmalloc(gzip_size);
b8538603
SP
880
881 stream.next_in = (unsigned char *)rpc->buf;
882 stream.avail_in = rpc->len;
883 stream.next_out = (unsigned char *)gzip_body;
df126e10 884 stream.avail_out = gzip_size;
b8538603 885
55bb5c91 886 ret = git_deflate(&stream, Z_FINISH);
b8538603 887 if (ret != Z_STREAM_END)
ed8b4132 888 die(_("cannot deflate request; zlib deflate error %d"), ret);
b8538603 889
55bb5c91 890 ret = git_deflate_end_gently(&stream);
b8538603 891 if (ret != Z_OK)
ed8b4132 892 die(_("cannot deflate request; zlib end error %d"), ret);
b8538603 893
df126e10 894 gzip_size = stream.total_out;
b8538603
SP
895
896 headers = curl_slist_append(headers, "Content-Encoding: gzip");
897 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
37ee680d 898 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
b8538603
SP
899
900 if (options.verbosity > 1) {
901 fprintf(stderr, "POST %s (gzip %lu to %lu bytes)\n",
902 rpc->service_name,
df126e10 903 (unsigned long)rpc->len, (unsigned long)gzip_size);
b8538603
SP
904 fflush(stderr);
905 }
de1a2fdd
SP
906 } else {
907 /* We know the complete request size in advance, use the
908 * more normal Content-Length approach.
909 */
910 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, rpc->buf);
37ee680d 911 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(rpc->len));
de1a2fdd
SP
912 if (options.verbosity > 1) {
913 fprintf(stderr, "POST %s (%lu bytes)\n",
914 rpc->service_name, (unsigned long)rpc->len);
915 fflush(stderr);
916 }
917 }
918
919 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
920 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, rpc_in);
cf2fb92b 921 rpc_in_data.rpc = rpc;
b79bdd8c 922 rpc_in_data.slot = slot;
cf2fb92b 923 curl_easy_setopt(slot->curl, CURLOPT_FILE, &rpc_in_data);
b79bdd8c 924 curl_easy_setopt(slot->curl, CURLOPT_FAILONERROR, 0);
de1a2fdd 925
296b847c
DT
926
927 rpc->any_written = 0;
3a347ed7 928 err = run_slot(slot, NULL);
2501aff8
JK
929 if (err == HTTP_REAUTH && !large_request) {
930 credential_fill(&http_auth);
abf8df86 931 goto retry;
2501aff8 932 }
b81401c1
JK
933 if (err != HTTP_OK)
934 err = -1;
de1a2fdd 935
296b847c
DT
936 if (!rpc->any_written)
937 err = -1;
938
de1a2fdd 939 curl_slist_free_all(headers);
b8538603 940 free(gzip_body);
de1a2fdd
SP
941 return err;
942}
943
7d50d34f 944static int rpc_service(struct rpc_state *rpc, struct discovery *heads,
b3590309
JT
945 const char **client_argv, const struct strbuf *preamble,
946 struct strbuf *rpc_result)
de1a2fdd
SP
947{
948 const char *svc = rpc->service_name;
949 struct strbuf buf = STRBUF_INIT;
d3180279 950 struct child_process client = CHILD_PROCESS_INIT;
de1a2fdd
SP
951 int err = 0;
952
de1a2fdd
SP
953 client.in = -1;
954 client.out = -1;
955 client.git_cmd = 1;
7d50d34f 956 client.argv = client_argv;
de1a2fdd
SP
957 if (start_command(&client))
958 exit(1);
5d916693 959 write_or_die(client.in, preamble->buf, preamble->len);
de1a2fdd
SP
960 if (heads)
961 write_or_die(client.in, heads->buf, heads->len);
962
963 rpc->alloc = http_post_buffer;
964 rpc->buf = xmalloc(rpc->alloc);
965 rpc->in = client.in;
966 rpc->out = client.out;
de1a2fdd 967
b227bbc4 968 strbuf_addf(&buf, "%s%s", url.buf, svc);
de1a2fdd
SP
969 rpc->service_url = strbuf_detach(&buf, NULL);
970
971 strbuf_addf(&buf, "Content-Type: application/x-%s-request", svc);
972 rpc->hdr_content_type = strbuf_detach(&buf, NULL);
973
8efa5f62 974 strbuf_addf(&buf, "Accept: application/x-%s-result", svc);
de1a2fdd
SP
975 rpc->hdr_accept = strbuf_detach(&buf, NULL);
976
884e586f
BW
977 if (get_protocol_http_header(heads->version, &buf))
978 rpc->protocol_header = strbuf_detach(&buf, NULL);
979 else
980 rpc->protocol_header = NULL;
981
de1a2fdd 982 while (!err) {
4981fe75 983 int n = packet_read(rpc->out, NULL, NULL, rpc->buf, rpc->alloc, 0);
de1a2fdd
SP
984 if (!n)
985 break;
986 rpc->pos = 0;
987 rpc->len = n;
a97d0079 988 err |= post_rpc(rpc, 0);
de1a2fdd 989 }
de1a2fdd
SP
990
991 close(client.in);
de1a2fdd 992 client.in = -1;
6cdf0223 993 if (!err) {
b3590309 994 strbuf_read(rpc_result, client.out, 0);
6cdf0223
SP
995 } else {
996 char buf[4096];
997 for (;;)
998 if (xread(client.out, buf, sizeof(buf)) <= 0)
999 break;
1000 }
b4ee10f6
SP
1001
1002 close(client.out);
de1a2fdd
SP
1003 client.out = -1;
1004
1005 err |= finish_command(&client);
1006 free(rpc->service_url);
1007 free(rpc->hdr_content_type);
1008 free(rpc->hdr_accept);
884e586f 1009 free(rpc->protocol_header);
de1a2fdd
SP
1010 free(rpc->buf);
1011 strbuf_release(&buf);
1012 return err;
1013}
1014
292ce46b
SP
1015static int fetch_dumb(int nr_heads, struct ref **to_fetch)
1016{
26e1e0b2 1017 struct walker *walker;
b32fa95f 1018 char **targets;
292ce46b
SP
1019 int ret, i;
1020
b32fa95f 1021 ALLOC_ARRAY(targets, nr_heads);
508ea882 1022 if (options.depth || options.deepen_since)
ed8b4132 1023 die(_("dumb http transport does not support shallow capabilities"));
292ce46b 1024 for (i = 0; i < nr_heads; i++)
f4e54d02 1025 targets[i] = xstrdup(oid_to_hex(&to_fetch[i]->old_oid));
292ce46b 1026
b227bbc4 1027 walker = get_http_walker(url.buf);
ef08ef9e 1028 walker->get_verbosely = options.verbosity >= 3;
292ce46b
SP
1029 walker->get_recover = 0;
1030 ret = walker_fetch(walker, nr_heads, targets, NULL, NULL);
26e1e0b2 1031 walker_free(walker);
292ce46b
SP
1032
1033 for (i = 0; i < nr_heads; i++)
1034 free(targets[i]);
1035 free(targets);
1036
ed8b4132 1037 return ret ? error(_("fetch failed.")) : 0;
292ce46b
SP
1038}
1039
249b2004
SP
1040static int fetch_git(struct discovery *heads,
1041 int nr_heads, struct ref **to_fetch)
1042{
1043 struct rpc_state rpc;
8150749d 1044 struct strbuf preamble = STRBUF_INIT;
b5f62ebe
NTND
1045 int i, err;
1046 struct argv_array args = ARGV_ARRAY_INIT;
b3590309 1047 struct strbuf rpc_result = STRBUF_INIT;
b5f62ebe
NTND
1048
1049 argv_array_pushl(&args, "fetch-pack", "--stateless-rpc",
1050 "--stdin", "--lock-pack", NULL);
249b2004 1051 if (options.followtags)
b5f62ebe 1052 argv_array_push(&args, "--include-tag");
249b2004 1053 if (options.thin)
b5f62ebe
NTND
1054 argv_array_push(&args, "--thin");
1055 if (options.verbosity >= 3)
1056 argv_array_pushl(&args, "-v", "-v", NULL);
9ba38048 1057 if (options.check_self_contained_and_connected)
b5f62ebe 1058 argv_array_push(&args, "--check-self-contained-and-connected");
16094885 1059 if (options.cloning)
b5f62ebe 1060 argv_array_push(&args, "--cloning");
16094885 1061 if (options.update_shallow)
b5f62ebe 1062 argv_array_push(&args, "--update-shallow");
249b2004 1063 if (!options.progress)
b5f62ebe
NTND
1064 argv_array_push(&args, "--no-progress");
1065 if (options.depth)
1066 argv_array_pushf(&args, "--depth=%lu", options.depth);
508ea882
NTND
1067 if (options.deepen_since)
1068 argv_array_pushf(&args, "--shallow-since=%s", options.deepen_since);
a45a2600
NTND
1069 for (i = 0; i < options.deepen_not.nr; i++)
1070 argv_array_pushf(&args, "--shallow-exclude=%s",
1071 options.deepen_not.items[i].string);
cccf74e2
NTND
1072 if (options.deepen_relative && options.depth)
1073 argv_array_push(&args, "--deepen-relative");
88e2f9ed
JT
1074 if (options.from_promisor)
1075 argv_array_push(&args, "--from-promisor");
1076 if (options.no_dependents)
1077 argv_array_push(&args, "--no-dependents");
acb0c572
JH
1078 if (options.filter)
1079 argv_array_pushf(&args, "--filter=%s", options.filter);
b5f62ebe 1080 argv_array_push(&args, url.buf);
8150749d 1081
249b2004
SP
1082 for (i = 0; i < nr_heads; i++) {
1083 struct ref *ref = to_fetch[i];
94ee8e2c 1084 if (!*ref->name)
ed8b4132 1085 die(_("cannot fetch by sha1 over smart http"));
58f2ed05 1086 packet_buf_write(&preamble, "%s %s\n",
f4e54d02 1087 oid_to_hex(&ref->old_oid), ref->name);
249b2004 1088 }
8150749d 1089 packet_buf_flush(&preamble);
249b2004
SP
1090
1091 memset(&rpc, 0, sizeof(rpc));
1092 rpc.service_name = "git-upload-pack",
b8538603 1093 rpc.gzip_request = 1;
249b2004 1094
b3590309
JT
1095 err = rpc_service(&rpc, heads, args.argv, &preamble, &rpc_result);
1096 if (rpc_result.len)
1097 write_or_die(1, rpc_result.buf, rpc_result.len);
1098 strbuf_release(&rpc_result);
8150749d 1099 strbuf_release(&preamble);
b5f62ebe 1100 argv_array_clear(&args);
249b2004
SP
1101 return err;
1102}
1103
1104static int fetch(int nr_heads, struct ref **to_fetch)
1105{
2a455202 1106 struct discovery *d = discover_refs("git-upload-pack", 0);
249b2004
SP
1107 if (d->proto_git)
1108 return fetch_git(d, nr_heads, to_fetch);
1109 else
1110 return fetch_dumb(nr_heads, to_fetch);
1111}
1112
292ce46b
SP
1113static void parse_fetch(struct strbuf *buf)
1114{
1115 struct ref **to_fetch = NULL;
1116 struct ref *list_head = NULL;
1117 struct ref **list = &list_head;
1118 int alloc_heads = 0, nr_heads = 0;
1119
1120 do {
95b567c7
JK
1121 const char *p;
1122 if (skip_prefix(buf->buf, "fetch ", &p)) {
1123 const char *name;
292ce46b 1124 struct ref *ref;
8338c911 1125 struct object_id old_oid;
9c9492e8 1126 const char *q;
292ce46b 1127
9c9492e8 1128 if (parse_oid_hex(p, &old_oid, &q))
8a1569d6 1129 die(_("protocol error: expected sha/ref, got '%s'"), p);
9c9492e8 1130 if (*q == ' ')
1131 name = q + 1;
1132 else if (!*q)
292ce46b
SP
1133 name = "";
1134 else
8a1569d6 1135 die(_("protocol error: expected sha/ref, got '%s'"), p);
292ce46b
SP
1136
1137 ref = alloc_ref(name);
8338c911 1138 oidcpy(&ref->old_oid, &old_oid);
292ce46b
SP
1139
1140 *list = ref;
1141 list = &ref->next;
1142
1143 ALLOC_GROW(to_fetch, nr_heads + 1, alloc_heads);
1144 to_fetch[nr_heads++] = ref;
1145 }
1146 else
ed8b4132 1147 die(_("http transport does not support %s"), buf->buf);
292ce46b
SP
1148
1149 strbuf_reset(buf);
8f309aeb 1150 if (strbuf_getline_lf(buf, stdin) == EOF)
292ce46b
SP
1151 return;
1152 if (!*buf->buf)
1153 break;
1154 } while (1);
1155
249b2004 1156 if (fetch(nr_heads, to_fetch))
292ce46b
SP
1157 exit(128); /* error already reported */
1158 free_refs(list_head);
1159 free(to_fetch);
1160
1161 printf("\n");
1162 fflush(stdout);
1163 strbuf_reset(buf);
1164}
1165
062a309d 1166static int push_dav(int nr_spec, const char **specs)
ae4efe19 1167{
850d2fec
JK
1168 struct child_process child = CHILD_PROCESS_INIT;
1169 size_t i;
ae4efe19 1170
850d2fec
JK
1171 child.git_cmd = 1;
1172 argv_array_push(&child.args, "http-push");
1173 argv_array_push(&child.args, "--helper-status");
ae4efe19 1174 if (options.dry_run)
850d2fec 1175 argv_array_push(&child.args, "--dry-run");
ae4efe19 1176 if (options.verbosity > 1)
850d2fec
JK
1177 argv_array_push(&child.args, "--verbose");
1178 argv_array_push(&child.args, url.buf);
ae4efe19 1179 for (i = 0; i < nr_spec; i++)
850d2fec 1180 argv_array_push(&child.args, specs[i]);
ae4efe19 1181
850d2fec 1182 if (run_command(&child))
ed8b4132 1183 die(_("git-http-push failed"));
ae4efe19
SP
1184 return 0;
1185}
1186
062a309d 1187static int push_git(struct discovery *heads, int nr_spec, const char **specs)
de1a2fdd
SP
1188{
1189 struct rpc_state rpc;
222b1212
JH
1190 int i, err;
1191 struct argv_array args;
05c1eb10 1192 struct string_list_item *cas_option;
26be19ba 1193 struct strbuf preamble = STRBUF_INIT;
b3590309 1194 struct strbuf rpc_result = STRBUF_INIT;
222b1212
JH
1195
1196 argv_array_init(&args);
1197 argv_array_pushl(&args, "send-pack", "--stateless-rpc", "--helper-status",
1198 NULL);
de1a2fdd 1199
de1a2fdd 1200 if (options.thin)
222b1212 1201 argv_array_push(&args, "--thin");
de1a2fdd 1202 if (options.dry_run)
222b1212 1203 argv_array_push(&args, "--dry-run");
30261094
DB
1204 if (options.push_cert == SEND_PACK_PUSH_CERT_ALWAYS)
1205 argv_array_push(&args, "--signed=yes");
1206 else if (options.push_cert == SEND_PACK_PUSH_CERT_IF_ASKED)
1207 argv_array_push(&args, "--signed=if-asked");
6f119424 1208 if (options.atomic)
1209 argv_array_push(&args, "--atomic");
c207e34f 1210 if (options.verbosity == 0)
222b1212 1211 argv_array_push(&args, "--quiet");
c207e34f 1212 else if (options.verbosity > 1)
222b1212 1213 argv_array_push(&args, "--verbose");
511155db
BW
1214 for (i = 0; i < options.push_options.nr; i++)
1215 argv_array_pushf(&args, "--push-option=%s",
1216 options.push_options.items[i].string);
222b1212 1217 argv_array_push(&args, options.progress ? "--progress" : "--no-progress");
05c1eb10 1218 for_each_string_list_item(cas_option, &cas_options)
2233ad45 1219 argv_array_push(&args, cas_option->string);
b227bbc4 1220 argv_array_push(&args, url.buf);
26be19ba
JK
1221
1222 argv_array_push(&args, "--stdin");
de1a2fdd 1223 for (i = 0; i < nr_spec; i++)
26be19ba
JK
1224 packet_buf_write(&preamble, "%s\n", specs[i]);
1225 packet_buf_flush(&preamble);
de1a2fdd
SP
1226
1227 memset(&rpc, 0, sizeof(rpc));
1228 rpc.service_name = "git-receive-pack",
de1a2fdd 1229
b3590309
JT
1230 err = rpc_service(&rpc, heads, args.argv, &preamble, &rpc_result);
1231 if (rpc_result.len)
1232 write_or_die(1, rpc_result.buf, rpc_result.len);
1233 strbuf_release(&rpc_result);
26be19ba 1234 strbuf_release(&preamble);
222b1212 1235 argv_array_clear(&args);
de1a2fdd
SP
1236 return err;
1237}
1238
062a309d 1239static int push(int nr_spec, const char **specs)
de1a2fdd 1240{
2a455202 1241 struct discovery *heads = discover_refs("git-receive-pack", 1);
de1a2fdd
SP
1242 int ret;
1243
1244 if (heads->proto_git)
1245 ret = push_git(heads, nr_spec, specs);
1246 else
1247 ret = push_dav(nr_spec, specs);
1248 free_discovery(heads);
1249 return ret;
1250}
1251
ae4efe19
SP
1252static void parse_push(struct strbuf *buf)
1253{
062a309d
RS
1254 struct argv_array specs = ARGV_ARRAY_INIT;
1255 int ret;
ae4efe19
SP
1256
1257 do {
062a309d
RS
1258 if (starts_with(buf->buf, "push "))
1259 argv_array_push(&specs, buf->buf + 5);
ae4efe19 1260 else
ed8b4132 1261 die(_("http transport does not support %s"), buf->buf);
ae4efe19
SP
1262
1263 strbuf_reset(buf);
8f309aeb 1264 if (strbuf_getline_lf(buf, stdin) == EOF)
dc4cd767 1265 goto free_specs;
ae4efe19
SP
1266 if (!*buf->buf)
1267 break;
1268 } while (1);
1269
062a309d 1270 ret = push(specs.argc, specs.argv);
ae4efe19
SP
1271 printf("\n");
1272 fflush(stdout);
dc4cd767 1273
5238cbf6
SP
1274 if (ret)
1275 exit(128); /* error already reported */
1276
dc4cd767 1277 free_specs:
062a309d 1278 argv_array_clear(&specs);
ae4efe19
SP
1279}
1280
0f1dc53f
BW
1281static int stateless_connect(const char *service_name)
1282{
1283 struct discovery *discover;
a97d0079
JT
1284 struct rpc_state rpc;
1285 struct strbuf buf = STRBUF_INIT;
0f1dc53f
BW
1286
1287 /*
1288 * Run the info/refs request and see if the server supports protocol
1289 * v2. If and only if the server supports v2 can we successfully
1290 * establish a stateless connection, otherwise we need to tell the
1291 * client to fallback to using other transport helper functions to
1292 * complete their request.
1293 */
1294 discover = discover_refs(service_name, 0);
1295 if (discover->version != protocol_v2) {
1296 printf("fallback\n");
1297 fflush(stdout);
1298 return -1;
1299 } else {
1300 /* Stateless Connection established */
1301 printf("\n");
1302 fflush(stdout);
1303 }
1304
a97d0079
JT
1305 rpc.service_name = service_name;
1306 rpc.service_url = xstrfmt("%s%s", url.buf, rpc.service_name);
1307 rpc.hdr_content_type = xstrfmt("Content-Type: application/x-%s-request", rpc.service_name);
1308 rpc.hdr_accept = xstrfmt("Accept: application/x-%s-result", rpc.service_name);
1309 if (get_protocol_http_header(discover->version, &buf)) {
1310 rpc.protocol_header = strbuf_detach(&buf, NULL);
1311 } else {
1312 rpc.protocol_header = NULL;
1313 strbuf_release(&buf);
1314 }
1315 rpc.buf = xmalloc(http_post_buffer);
1316 rpc.alloc = http_post_buffer;
1317 rpc.len = 0;
1318 rpc.pos = 0;
1319 rpc.in = 1;
1320 rpc.out = 0;
1321 rpc.any_written = 0;
1322 rpc.gzip_request = 1;
1323 rpc.initial_buffer = 0;
1324 rpc.write_line_lengths = 1;
1325 rpc.flush_read_but_not_sent = 0;
0f1dc53f
BW
1326
1327 /*
1328 * Dump the capability listing that we got from the server earlier
1329 * during the info/refs request.
1330 */
a97d0079
JT
1331 write_or_die(rpc.in, discover->buf, discover->len);
1332
1333 /* Until we see EOF keep sending POSTs */
1334 while (1) {
1335 size_t avail;
1336 enum packet_read_status status;
0f1dc53f 1337
a97d0079
JT
1338 if (!rpc_read_from_out(&rpc, PACKET_READ_GENTLE_ON_EOF, &avail,
1339 &status))
1340 BUG("The entire rpc->buf should be larger than LARGE_PACKET_MAX");
1341 if (status == PACKET_READ_EOF)
1342 break;
1343 if (post_rpc(&rpc, status == PACKET_READ_FLUSH))
0f1dc53f
BW
1344 /* We would have an err here */
1345 break;
a97d0079
JT
1346 /* Reset the buffer for next request */
1347 rpc.len = 0;
0f1dc53f
BW
1348 }
1349
a97d0079
JT
1350 free(rpc.service_url);
1351 free(rpc.hdr_content_type);
1352 free(rpc.hdr_accept);
1353 free(rpc.protocol_header);
1354 free(rpc.buf);
1355 strbuf_release(&buf);
1356
0f1dc53f
BW
1357 return 0;
1358}
1359
3f2e2297 1360int cmd_main(int argc, const char **argv)
a2d725b7 1361{
a2d725b7 1362 struct strbuf buf = STRBUF_INIT;
a45d3d7e 1363 int nongit;
a2d725b7 1364
a45d3d7e 1365 setup_git_directory_gently(&nongit);
a2d725b7 1366 if (argc < 2) {
ed8b4132 1367 error(_("remote-curl: usage: git remote-curl <remote> [<url>]"));
a2d725b7
DB
1368 return 1;
1369 }
1370
ef08ef9e
SP
1371 options.verbosity = 1;
1372 options.progress = !!isatty(2);
de1a2fdd 1373 options.thin = 1;
a45a2600 1374 string_list_init(&options.deepen_not, 1);
511155db 1375 string_list_init(&options.push_options, 1);
ef08ef9e 1376
ee4512ed
JH
1377 /*
1378 * Just report "remote-curl" here (folding all the various aliases
1379 * ("git-remote-http", "git-remote-https", and etc.) here since they
1380 * are all just copies of the same actual executable.
1381 */
1382 trace2_cmd_name("remote-curl");
1383
a2d725b7
DB
1384 remote = remote_get(argv[1]);
1385
1386 if (argc > 2) {
b227bbc4 1387 end_url_with_slash(&url, argv[2]);
a2d725b7 1388 } else {
b227bbc4 1389 end_url_with_slash(&url, remote->url[0]);
a2d725b7
DB
1390 }
1391
b227bbc4 1392 http_init(remote, url.buf, 0);
888692b7 1393
a2d725b7 1394 do {
95b567c7
JK
1395 const char *arg;
1396
8f309aeb 1397 if (strbuf_getline_lf(&buf, stdin) == EOF) {
1843f0ce 1398 if (ferror(stdin))
ed8b4132 1399 error(_("remote-curl: error reading command stream from git"));
1843f0ce
SR
1400 return 1;
1401 }
1402 if (buf.len == 0)
a2d725b7 1403 break;
59556548 1404 if (starts_with(buf.buf, "fetch ")) {
a45d3d7e 1405 if (nongit)
ed8b4132 1406 die(_("remote-curl: fetch attempted without a local repo"));
292ce46b
SP
1407 parse_fetch(&buf);
1408
59556548 1409 } else if (!strcmp(buf.buf, "list") || starts_with(buf.buf, "list ")) {
97cc7bc4
SP
1410 int for_push = !!strstr(buf.buf + 4, "for-push");
1411 output_refs(get_refs(for_push));
ae4efe19 1412
59556548 1413 } else if (starts_with(buf.buf, "push ")) {
ae4efe19
SP
1414 parse_push(&buf);
1415
95b567c7
JK
1416 } else if (skip_prefix(buf.buf, "option ", &arg)) {
1417 char *value = strchr(arg, ' ');
ef08ef9e
SP
1418 int result;
1419
1420 if (value)
1421 *value++ = '\0';
1422 else
1423 value = "true";
1424
95b567c7 1425 result = set_option(arg, value);
ef08ef9e
SP
1426 if (!result)
1427 printf("ok\n");
1428 else if (result < 0)
1429 printf("error invalid value\n");
1430 else
1431 printf("unsupported\n");
a2d725b7 1432 fflush(stdout);
ef08ef9e 1433
a2d725b7 1434 } else if (!strcmp(buf.buf, "capabilities")) {
0f1dc53f 1435 printf("stateless-connect\n");
a2d725b7 1436 printf("fetch\n");
ef08ef9e 1437 printf("option\n");
ae4efe19 1438 printf("push\n");
9ba38048 1439 printf("check-connectivity\n");
a2d725b7
DB
1440 printf("\n");
1441 fflush(stdout);
0f1dc53f
BW
1442 } else if (skip_prefix(buf.buf, "stateless-connect ", &arg)) {
1443 if (!stateless_connect(arg))
1444 break;
a2d725b7 1445 } else {
ed8b4132 1446 error(_("remote-curl: unknown command '%s' from git"), buf.buf);
a2d725b7
DB
1447 return 1;
1448 }
1449 strbuf_reset(&buf);
1450 } while (1);
888692b7
TRC
1451
1452 http_cleanup();
1453
a2d725b7
DB
1454 return 0;
1455}