]> git.ipfire.org Git - thirdparty/git.git/blame - remote-curl.c
Sync with 2.17.3
[thirdparty/git.git] / remote-curl.c
CommitLineData
a2d725b7 1#include "cache.h"
b2141fc1 2#include "config.h"
a2d725b7 3#include "remote.h"
ad6ac124 4#include "connect.h"
a2d725b7
DB
5#include "strbuf.h"
6#include "walker.h"
7#include "http.h"
d807c4a0 8#include "exec-cmd.h"
ae4efe19 9#include "run-command.h"
97cc7bc4 10#include "pkt-line.h"
05c1eb10 11#include "string-list.h"
de1a2fdd 12#include "sideband.h"
222b1212 13#include "argv-array.h"
2501aff8 14#include "credential.h"
16094885 15#include "sha1-array.h"
30261094 16#include "send-pack.h"
ad6ac124 17#include "protocol.h"
90dce21e 18#include "quote.h"
a2d725b7 19
37a8768f 20static struct remote *remote;
b227bbc4
JK
21/* always ends with a trailing slash */
22static struct strbuf url = STRBUF_INIT;
37a8768f 23
ef08ef9e
SP
24struct options {
25 int verbosity;
26 unsigned long depth;
508ea882 27 char *deepen_since;
a45a2600 28 struct string_list deepen_not;
511155db 29 struct string_list push_options;
acb0c572 30 char *filter;
ef08ef9e 31 unsigned progress : 1,
9ba38048 32 check_self_contained_and_connected : 1,
16094885
NTND
33 cloning : 1,
34 update_shallow : 1,
ae4efe19 35 followtags : 1,
de1a2fdd 36 dry_run : 1,
0ea47f9d 37 thin : 1,
30261094 38 /* One of the SEND_PACK_PUSH_CERT_* constants. */
cccf74e2 39 push_cert : 2,
88e2f9ed
JT
40 deepen_relative : 1,
41 from_promisor : 1,
42 no_dependents : 1;
ef08ef9e
SP
43};
44static struct options options;
05c1eb10 45static struct string_list cas_options = STRING_LIST_INIT_DUP;
ef08ef9e 46
ef08ef9e
SP
47static int set_option(const char *name, const char *value)
48{
49 if (!strcmp(name, "verbosity")) {
50 char *end;
51 int v = strtol(value, &end, 10);
52 if (value == end || *end)
53 return -1;
54 options.verbosity = v;
55 return 0;
56 }
57 else if (!strcmp(name, "progress")) {
58 if (!strcmp(value, "true"))
59 options.progress = 1;
60 else if (!strcmp(value, "false"))
61 options.progress = 0;
62 else
63 return -1;
249b2004 64 return 0;
ef08ef9e
SP
65 }
66 else if (!strcmp(name, "depth")) {
67 char *end;
68 unsigned long v = strtoul(value, &end, 10);
69 if (value == end || *end)
70 return -1;
71 options.depth = v;
249b2004 72 return 0;
ef08ef9e 73 }
508ea882
NTND
74 else if (!strcmp(name, "deepen-since")) {
75 options.deepen_since = xstrdup(value);
76 return 0;
77 }
a45a2600
NTND
78 else if (!strcmp(name, "deepen-not")) {
79 string_list_append(&options.deepen_not, value);
80 return 0;
81 }
cccf74e2
NTND
82 else if (!strcmp(name, "deepen-relative")) {
83 if (!strcmp(value, "true"))
84 options.deepen_relative = 1;
85 else if (!strcmp(value, "false"))
86 options.deepen_relative = 0;
87 else
88 return -1;
89 return 0;
90 }
ef08ef9e
SP
91 else if (!strcmp(name, "followtags")) {
92 if (!strcmp(value, "true"))
93 options.followtags = 1;
94 else if (!strcmp(value, "false"))
95 options.followtags = 0;
96 else
97 return -1;
249b2004 98 return 0;
ef08ef9e 99 }
ae4efe19
SP
100 else if (!strcmp(name, "dry-run")) {
101 if (!strcmp(value, "true"))
102 options.dry_run = 1;
103 else if (!strcmp(value, "false"))
104 options.dry_run = 0;
105 else
106 return -1;
107 return 0;
108 }
9ba38048
NTND
109 else if (!strcmp(name, "check-connectivity")) {
110 if (!strcmp(value, "true"))
111 options.check_self_contained_and_connected = 1;
112 else if (!strcmp(value, "false"))
113 options.check_self_contained_and_connected = 0;
114 else
115 return -1;
116 return 0;
117 }
05c1eb10
JH
118 else if (!strcmp(name, "cas")) {
119 struct strbuf val = STRBUF_INIT;
120 strbuf_addf(&val, "--" CAS_OPT_NAME "=%s", value);
121 string_list_append(&cas_options, val.buf);
122 strbuf_release(&val);
123 return 0;
16094885
NTND
124 } else if (!strcmp(name, "cloning")) {
125 if (!strcmp(value, "true"))
126 options.cloning = 1;
127 else if (!strcmp(value, "false"))
128 options.cloning = 0;
129 else
130 return -1;
131 return 0;
132 } else if (!strcmp(name, "update-shallow")) {
133 if (!strcmp(value, "true"))
134 options.update_shallow = 1;
135 else if (!strcmp(value, "false"))
136 options.update_shallow = 0;
137 else
138 return -1;
139 return 0;
0ea47f9d
JH
140 } else if (!strcmp(name, "pushcert")) {
141 if (!strcmp(value, "true"))
30261094 142 options.push_cert = SEND_PACK_PUSH_CERT_ALWAYS;
0ea47f9d 143 else if (!strcmp(value, "false"))
30261094
DB
144 options.push_cert = SEND_PACK_PUSH_CERT_NEVER;
145 else if (!strcmp(value, "if-asked"))
146 options.push_cert = SEND_PACK_PUSH_CERT_IF_ASKED;
0ea47f9d
JH
147 else
148 return -1;
149 return 0;
511155db 150 } else if (!strcmp(name, "push-option")) {
90dce21e
JK
151 if (*value != '"')
152 string_list_append(&options.push_options, value);
153 else {
154 struct strbuf unquoted = STRBUF_INIT;
155 if (unquote_c_style(&unquoted, value, NULL) < 0)
156 die("invalid quoting in push-option value");
157 string_list_append_nodup(&options.push_options,
158 strbuf_detach(&unquoted, NULL));
159 }
511155db 160 return 0;
c915f11e
EW
161
162#if LIBCURL_VERSION_NUM >= 0x070a08
163 } else if (!strcmp(name, "family")) {
164 if (!strcmp(value, "ipv4"))
165 git_curl_ipresolve = CURL_IPRESOLVE_V4;
166 else if (!strcmp(value, "ipv6"))
167 git_curl_ipresolve = CURL_IPRESOLVE_V6;
168 else if (!strcmp(value, "all"))
169 git_curl_ipresolve = CURL_IPRESOLVE_WHATEVER;
170 else
171 return -1;
172 return 0;
173#endif /* LIBCURL_VERSION_NUM >= 0x070a08 */
88e2f9ed
JT
174 } else if (!strcmp(name, "from-promisor")) {
175 options.from_promisor = 1;
176 return 0;
177 } else if (!strcmp(name, "no-dependents")) {
178 options.no_dependents = 1;
179 return 0;
acb0c572
JH
180 } else if (!strcmp(name, "filter")) {
181 options.filter = xstrdup(value);;
182 return 0;
16094885 183 } else {
ef08ef9e
SP
184 return 1 /* unsupported */;
185 }
186}
187
97cc7bc4 188struct discovery {
f08a5d42 189 char *service;
97cc7bc4
SP
190 char *buf_alloc;
191 char *buf;
192 size_t len;
2a455202 193 struct ref *refs;
910650d2 194 struct oid_array shallow;
49e85e95 195 enum protocol_version version;
97cc7bc4
SP
196 unsigned proto_git : 1;
197};
198static struct discovery *last_discovery;
199
b8054bbe
JK
200static struct ref *parse_git_refs(struct discovery *heads, int for_push)
201{
202 struct ref *list = NULL;
ad6ac124
BW
203 struct packet_reader reader;
204
205 packet_reader_init(&reader, -1, heads->buf, heads->len,
206 PACKET_READ_CHOMP_NEWLINE |
207 PACKET_READ_GENTLE_ON_EOF);
208
49e85e95
BW
209 heads->version = discover_version(&reader);
210 switch (heads->version) {
8f6982b4 211 case protocol_v2:
0f1dc53f
BW
212 /*
213 * Do nothing. This isn't a list of refs but rather a
214 * capability advertisement. Client would have run
215 * 'stateless-connect' so we'll dump this capability listing
216 * and let them request the refs themselves.
217 */
8f6982b4 218 break;
ad6ac124
BW
219 case protocol_v1:
220 case protocol_v0:
221 get_remote_heads(&reader, &list, for_push ? REF_NORMAL : 0,
222 NULL, &heads->shallow);
223 break;
224 case protocol_unknown_version:
225 BUG("unknown protocol version");
226 }
227
b8054bbe
JK
228 return list;
229}
230
231static struct ref *parse_info_refs(struct discovery *heads)
232{
233 char *data, *start, *mid;
234 char *ref_name;
235 int i = 0;
236
237 struct ref *refs = NULL;
238 struct ref *ref = NULL;
239 struct ref *last_ref = NULL;
240
241 data = heads->buf;
242 start = NULL;
243 mid = data;
244 while (i < heads->len) {
245 if (!start) {
246 start = &data[i];
247 }
248 if (data[i] == '\t')
249 mid = &data[i];
250 if (data[i] == '\n') {
251 if (mid - start != 40)
b227bbc4
JK
252 die("%sinfo/refs not valid: is this a git repository?",
253 url.buf);
b8054bbe
JK
254 data[i] = 0;
255 ref_name = mid + 1;
6f687c21 256 ref = alloc_ref(ref_name);
f4e54d02 257 get_oid_hex(start, &ref->old_oid);
b8054bbe
JK
258 if (!refs)
259 refs = ref;
260 if (last_ref)
261 last_ref->next = ref;
262 last_ref = ref;
263 start = NULL;
264 }
265 i++;
266 }
267
268 ref = alloc_ref("HEAD");
b227bbc4 269 if (!http_fetch_ref(url.buf, ref) &&
b8054bbe
JK
270 !resolve_remote_symref(ref, refs)) {
271 ref->next = refs;
272 refs = ref;
273 } else {
274 free(ref);
275 }
276
277 return refs;
278}
279
97cc7bc4
SP
280static void free_discovery(struct discovery *d)
281{
282 if (d) {
283 if (d == last_discovery)
284 last_discovery = NULL;
ee3051bd 285 free(d->shallow.oid);
97cc7bc4 286 free(d->buf_alloc);
2a455202 287 free_refs(d->refs);
f08a5d42 288 free(d->service);
97cc7bc4
SP
289 free(d);
290 }
291}
292
fc1b774c
JK
293static int show_http_message(struct strbuf *type, struct strbuf *charset,
294 struct strbuf *msg)
426e70d4
JK
295{
296 const char *p, *eol;
297
298 /*
299 * We only show text/plain parts, as other types are likely
300 * to be ugly to look at on the user's terminal.
426e70d4 301 */
bf197fd7 302 if (strcmp(type->buf, "text/plain"))
426e70d4 303 return -1;
fc1b774c
JK
304 if (charset->len)
305 strbuf_reencode(msg, charset->buf, get_log_output_encoding());
426e70d4
JK
306
307 strbuf_trim(msg);
308 if (!msg->len)
309 return -1;
310
311 p = msg->buf;
312 do {
313 eol = strchrnul(p, '\n');
314 fprintf(stderr, "remote: %.*s\n", (int)(eol - p), p);
315 p = eol + 1;
316 } while(*eol);
317 return 0;
318}
319
884e586f
BW
320static int get_protocol_http_header(enum protocol_version version,
321 struct strbuf *header)
322{
323 if (version > 0) {
324 strbuf_addf(header, GIT_PROTOCOL_HEADER ": version=%d",
325 version);
326
327 return 1;
328 }
329
330 return 0;
331}
332
24d36f14 333static struct discovery *discover_refs(const char *service, int for_push)
a2d725b7 334{
4656bf47
SP
335 struct strbuf exp = STRBUF_INIT;
336 struct strbuf type = STRBUF_INIT;
fc1b774c 337 struct strbuf charset = STRBUF_INIT;
a2d725b7 338 struct strbuf buffer = STRBUF_INIT;
c65d5692 339 struct strbuf refs_url = STRBUF_INIT;
050ef365 340 struct strbuf effective_url = STRBUF_INIT;
884e586f
BW
341 struct strbuf protocol_header = STRBUF_INIT;
342 struct string_list extra_headers = STRING_LIST_INIT_DUP;
97cc7bc4 343 struct discovery *last = last_discovery;
243c329c 344 int http_ret, maybe_smart = 0;
fcaa6e64 345 struct http_get_options http_options;
a4d78ce2 346 enum protocol_version version = get_protocol_version_config();
a2d725b7 347
97cc7bc4
SP
348 if (last && !strcmp(service, last->service))
349 return last;
350 free_discovery(last);
a2d725b7 351
b227bbc4 352 strbuf_addf(&refs_url, "%sinfo/refs", url.buf);
59556548 353 if ((starts_with(url.buf, "http://") || starts_with(url.buf, "https://")) &&
02572c2e 354 git_env_bool("GIT_SMART_HTTP", 1)) {
243c329c 355 maybe_smart = 1;
b227bbc4 356 if (!strchr(url.buf, '?'))
c65d5692 357 strbuf_addch(&refs_url, '?');
97cc7bc4 358 else
c65d5692
JK
359 strbuf_addch(&refs_url, '&');
360 strbuf_addf(&refs_url, "service=%s", service);
97cc7bc4 361 }
a2d725b7 362
a4d78ce2
BW
363 /*
364 * NEEDSWORK: If we are trying to use protocol v2 and we are planning
365 * to perform a push, then fallback to v0 since the client doesn't know
366 * how to push yet using v2.
367 */
368 if (version == protocol_v2 && !strcmp("git-receive-pack", service))
369 version = protocol_v0;
370
884e586f 371 /* Add the extra Git-Protocol header */
a4d78ce2 372 if (get_protocol_http_header(version, &protocol_header))
884e586f
BW
373 string_list_append(&extra_headers, protocol_header.buf);
374
fcaa6e64
JK
375 memset(&http_options, 0, sizeof(http_options));
376 http_options.content_type = &type;
377 http_options.charset = &charset;
378 http_options.effective_url = &effective_url;
379 http_options.base_url = &url;
884e586f 380 http_options.extra_headers = &extra_headers;
50d34137 381 http_options.initial_request = 1;
fcaa6e64
JK
382 http_options.no_cache = 1;
383 http_options.keep_error = 1;
1bbcc224 384
fcaa6e64 385 http_ret = http_get_strbuf(refs_url.buf, &buffer, &http_options);
a2d725b7
DB
386 switch (http_ret) {
387 case HTTP_OK:
388 break;
389 case HTTP_MISSING_TARGET:
fc1b774c 390 show_http_message(&type, &charset, &buffer);
b227bbc4 391 die("repository '%s' not found", url.buf);
42653c09 392 case HTTP_NOAUTH:
fc1b774c 393 show_http_message(&type, &charset, &buffer);
b227bbc4 394 die("Authentication failed for '%s'", url.buf);
a2d725b7 395 default:
fc1b774c 396 show_http_message(&type, &charset, &buffer);
b227bbc4 397 die("unable to access '%s': %s", url.buf, curl_errorstr);
a2d725b7
DB
398 }
399
50d34137
JK
400 if (options.verbosity && !starts_with(refs_url.buf, url.buf))
401 warning(_("redirecting to %s"), url.buf);
402
97cc7bc4 403 last= xcalloc(1, sizeof(*last_discovery));
f08a5d42 404 last->service = xstrdup(service);
97cc7bc4
SP
405 last->buf_alloc = strbuf_detach(&buffer, &last->len);
406 last->buf = last->buf_alloc;
407
4656bf47
SP
408 strbuf_addf(&exp, "application/x-%s-advertisement", service);
409 if (maybe_smart &&
410 (5 <= last->len && last->buf[4] == '#') &&
411 !strbuf_cmp(&exp, &type)) {
4981fe75
JK
412 char *line;
413
4656bf47
SP
414 /*
415 * smart HTTP response; validate that the service
97cc7bc4
SP
416 * pkt-line matches our request.
417 */
4981fe75 418 line = packet_read_line_buf(&last->buf, &last->len, NULL);
bb1356dc
JS
419 if (!line)
420 die("invalid server response; expected service, got flush packet");
97cc7bc4 421
4656bf47 422 strbuf_reset(&exp);
97cc7bc4 423 strbuf_addf(&exp, "# service=%s", service);
4981fe75
JK
424 if (strcmp(line, exp.buf))
425 die("invalid server response; got '%s'", line);
97cc7bc4
SP
426 strbuf_release(&exp);
427
428 /* The header can include additional metadata lines, up
429 * until a packet flush marker. Ignore these now, but
430 * in the future we might start to scan them.
431 */
4981fe75
JK
432 while (packet_read_line_buf(&last->buf, &last->len, NULL))
433 ;
97cc7bc4
SP
434
435 last->proto_git = 1;
237ffedd
BW
436 } else if (maybe_smart &&
437 last->len > 5 && starts_with(last->buf + 4, "version 2")) {
438 last->proto_git = 1;
97cc7bc4
SP
439 }
440
2a455202
JK
441 if (last->proto_git)
442 last->refs = parse_git_refs(last, for_push);
443 else
444 last->refs = parse_info_refs(last);
445
c65d5692 446 strbuf_release(&refs_url);
4656bf47
SP
447 strbuf_release(&exp);
448 strbuf_release(&type);
fc1b774c 449 strbuf_release(&charset);
050ef365 450 strbuf_release(&effective_url);
97cc7bc4 451 strbuf_release(&buffer);
884e586f
BW
452 strbuf_release(&protocol_header);
453 string_list_clear(&extra_headers, 0);
97cc7bc4
SP
454 last_discovery = last;
455 return last;
456}
457
97cc7bc4
SP
458static struct ref *get_refs(int for_push)
459{
460 struct discovery *heads;
461
462 if (for_push)
2a455202 463 heads = discover_refs("git-receive-pack", for_push);
97cc7bc4 464 else
2a455202 465 heads = discover_refs("git-upload-pack", for_push);
97cc7bc4 466
2a455202 467 return heads->refs;
97cc7bc4
SP
468}
469
ae4efe19
SP
470static void output_refs(struct ref *refs)
471{
472 struct ref *posn;
473 for (posn = refs; posn; posn = posn->next) {
474 if (posn->symref)
475 printf("@%s %s\n", posn->symref, posn->name);
476 else
f4e54d02 477 printf("%s %s\n", oid_to_hex(&posn->old_oid), posn->name);
ae4efe19
SP
478 }
479 printf("\n");
480 fflush(stdout);
ae4efe19
SP
481}
482
de1a2fdd
SP
483struct rpc_state {
484 const char *service_name;
485 const char **argv;
8150749d 486 struct strbuf *stdin_preamble;
de1a2fdd
SP
487 char *service_url;
488 char *hdr_content_type;
489 char *hdr_accept;
884e586f 490 char *protocol_header;
de1a2fdd
SP
491 char *buf;
492 size_t alloc;
493 size_t len;
494 size_t pos;
495 int in;
496 int out;
296b847c 497 int any_written;
de1a2fdd 498 struct strbuf result;
b8538603 499 unsigned gzip_request : 1;
6c81a990 500 unsigned initial_buffer : 1;
de1a2fdd
SP
501};
502
503static size_t rpc_out(void *ptr, size_t eltsize,
504 size_t nmemb, void *buffer_)
505{
506 size_t max = eltsize * nmemb;
507 struct rpc_state *rpc = buffer_;
508 size_t avail = rpc->len - rpc->pos;
509
510 if (!avail) {
6c81a990 511 rpc->initial_buffer = 0;
4981fe75 512 avail = packet_read(rpc->out, NULL, NULL, rpc->buf, rpc->alloc, 0);
de1a2fdd
SP
513 if (!avail)
514 return 0;
515 rpc->pos = 0;
516 rpc->len = avail;
517 }
518
48310608 519 if (max < avail)
de1a2fdd
SP
520 avail = max;
521 memcpy(ptr, rpc->buf + rpc->pos, avail);
522 rpc->pos += avail;
523 return avail;
524}
525
6c81a990 526#ifndef NO_CURL_IOCTL
5092d3ec 527static curlioerr rpc_ioctl(CURL *handle, int cmd, void *clientp)
6c81a990
MS
528{
529 struct rpc_state *rpc = clientp;
530
531 switch (cmd) {
532 case CURLIOCMD_NOP:
533 return CURLIOE_OK;
534
535 case CURLIOCMD_RESTARTREAD:
536 if (rpc->initial_buffer) {
537 rpc->pos = 0;
538 return CURLIOE_OK;
539 }
b725b270 540 error("unable to rewind rpc post data - try increasing http.postBuffer");
6c81a990
MS
541 return CURLIOE_FAILRESTART;
542
543 default:
544 return CURLIOE_UNKNOWNCMD;
545 }
546}
547#endif
548
a04ff3ec 549static size_t rpc_in(char *ptr, size_t eltsize,
de1a2fdd
SP
550 size_t nmemb, void *buffer_)
551{
552 size_t size = eltsize * nmemb;
553 struct rpc_state *rpc = buffer_;
296b847c
DT
554 if (size)
555 rpc->any_written = 1;
de1a2fdd
SP
556 write_or_die(rpc->in, ptr, size);
557 return size;
558}
559
3a347ed7
JK
560static int run_slot(struct active_request_slot *slot,
561 struct slot_results *results)
206b099d 562{
b81401c1 563 int err;
3a347ed7 564 struct slot_results results_buf;
206b099d 565
3a347ed7
JK
566 if (!results)
567 results = &results_buf;
568
beed336c 569 err = run_one_slot(slot, results);
206b099d 570
b81401c1 571 if (err != HTTP_OK && err != HTTP_REAUTH) {
00540458
SP
572 struct strbuf msg = STRBUF_INIT;
573 if (results->http_code && results->http_code != 200)
574 strbuf_addf(&msg, "HTTP %ld", results->http_code);
575 if (results->curl_result != CURLE_OK) {
576 if (msg.len)
577 strbuf_addch(&msg, ' ');
578 strbuf_addf(&msg, "curl %d", results->curl_result);
579 if (curl_errorstr[0]) {
580 strbuf_addch(&msg, ' ');
581 strbuf_addstr(&msg, curl_errorstr);
582 }
583 }
584 error("RPC failed; %s", msg.buf);
585 strbuf_release(&msg);
206b099d
SP
586 }
587
588 return err;
589}
590
3a347ed7 591static int probe_rpc(struct rpc_state *rpc, struct slot_results *results)
206b099d
SP
592{
593 struct active_request_slot *slot;
8cb01e2f 594 struct curl_slist *headers = http_copy_default_headers();
206b099d
SP
595 struct strbuf buf = STRBUF_INIT;
596 int err;
597
598 slot = get_active_slot();
599
600 headers = curl_slist_append(headers, rpc->hdr_content_type);
601 headers = curl_slist_append(headers, rpc->hdr_accept);
602
603 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
604 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
605 curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
aa90b969 606 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, NULL);
206b099d
SP
607 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, "0000");
608 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE, 4);
609 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
610 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
611 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buf);
612
3a347ed7 613 err = run_slot(slot, results);
206b099d
SP
614
615 curl_slist_free_all(headers);
616 strbuf_release(&buf);
617 return err;
618}
619
37ee680d
DT
620static curl_off_t xcurl_off_t(ssize_t len) {
621 if (len > maximum_signed_value_of_type(curl_off_t))
622 die("cannot handle pushes this big");
623 return (curl_off_t) len;
624}
625
de1a2fdd
SP
626static int post_rpc(struct rpc_state *rpc)
627{
628 struct active_request_slot *slot;
8cb01e2f 629 struct curl_slist *headers = http_copy_default_headers();
b8538603
SP
630 int use_gzip = rpc->gzip_request;
631 char *gzip_body = NULL;
37711549 632 size_t gzip_size = 0;
206b099d 633 int err, large_request = 0;
c80d96ca 634 int needs_100_continue = 0;
de1a2fdd
SP
635
636 /* Try to load the entire request, if we can fit it into the
637 * allocated buffer space we can use HTTP/1.0 and avoid the
638 * chunked encoding mess.
639 */
640 while (1) {
641 size_t left = rpc->alloc - rpc->len;
642 char *buf = rpc->buf + rpc->len;
643 int n;
644
645 if (left < LARGE_PACKET_MAX) {
646 large_request = 1;
b8538603 647 use_gzip = 0;
de1a2fdd
SP
648 break;
649 }
650
4981fe75 651 n = packet_read(rpc->out, NULL, NULL, buf, left, 0);
de1a2fdd
SP
652 if (!n)
653 break;
654 rpc->len += n;
655 }
656
206b099d 657 if (large_request) {
c80d96ca 658 struct slot_results results;
659
b81401c1 660 do {
c80d96ca 661 err = probe_rpc(rpc, &results);
2501aff8
JK
662 if (err == HTTP_REAUTH)
663 credential_fill(&http_auth);
b81401c1
JK
664 } while (err == HTTP_REAUTH);
665 if (err != HTTP_OK)
666 return -1;
c80d96ca 667
668 if (results.auth_avail & CURLAUTH_GSSNEGOTIATE)
669 needs_100_continue = 1;
206b099d
SP
670 }
671
abf8df86
JK
672 headers = curl_slist_append(headers, rpc->hdr_content_type);
673 headers = curl_slist_append(headers, rpc->hdr_accept);
c80d96ca 674 headers = curl_slist_append(headers, needs_100_continue ?
675 "Expect: 100-continue" : "Expect:");
abf8df86 676
884e586f
BW
677 /* Add the extra Git-Protocol header */
678 if (rpc->protocol_header)
679 headers = curl_slist_append(headers, rpc->protocol_header);
680
abf8df86 681retry:
de1a2fdd 682 slot = get_active_slot();
de1a2fdd 683
de1a2fdd 684 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
d21f9794 685 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
de1a2fdd 686 curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
1a53e692 687 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "");
de1a2fdd 688
de1a2fdd
SP
689 if (large_request) {
690 /* The request body is large and the size cannot be predicted.
691 * We must use chunked encoding to send it.
692 */
de1a2fdd 693 headers = curl_slist_append(headers, "Transfer-Encoding: chunked");
6c81a990 694 rpc->initial_buffer = 1;
de1a2fdd
SP
695 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, rpc_out);
696 curl_easy_setopt(slot->curl, CURLOPT_INFILE, rpc);
6c81a990
MS
697#ifndef NO_CURL_IOCTL
698 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, rpc_ioctl);
699 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, rpc);
700#endif
de1a2fdd
SP
701 if (options.verbosity > 1) {
702 fprintf(stderr, "POST %s (chunked)\n", rpc->service_name);
703 fflush(stderr);
704 }
705
2e736fd5
JK
706 } else if (gzip_body) {
707 /*
708 * If we are looping to retry authentication, then the previous
709 * run will have set up the headers and gzip buffer already,
710 * and we just need to send it.
711 */
712 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
37ee680d 713 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
2e736fd5 714
b8538603
SP
715 } else if (use_gzip && 1024 < rpc->len) {
716 /* The client backend isn't giving us compressed data so
717 * we can try to deflate it ourselves, this may save on.
718 * the transfer time.
719 */
ef49a7a0 720 git_zstream stream;
b8538603
SP
721 int ret;
722
55bb5c91 723 git_deflate_init_gzip(&stream, Z_BEST_COMPRESSION);
df126e10
JK
724 gzip_size = git_deflate_bound(&stream, rpc->len);
725 gzip_body = xmalloc(gzip_size);
b8538603
SP
726
727 stream.next_in = (unsigned char *)rpc->buf;
728 stream.avail_in = rpc->len;
729 stream.next_out = (unsigned char *)gzip_body;
df126e10 730 stream.avail_out = gzip_size;
b8538603 731
55bb5c91 732 ret = git_deflate(&stream, Z_FINISH);
b8538603
SP
733 if (ret != Z_STREAM_END)
734 die("cannot deflate request; zlib deflate error %d", ret);
735
55bb5c91 736 ret = git_deflate_end_gently(&stream);
b8538603
SP
737 if (ret != Z_OK)
738 die("cannot deflate request; zlib end error %d", ret);
739
df126e10 740 gzip_size = stream.total_out;
b8538603
SP
741
742 headers = curl_slist_append(headers, "Content-Encoding: gzip");
743 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
37ee680d 744 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
b8538603
SP
745
746 if (options.verbosity > 1) {
747 fprintf(stderr, "POST %s (gzip %lu to %lu bytes)\n",
748 rpc->service_name,
df126e10 749 (unsigned long)rpc->len, (unsigned long)gzip_size);
b8538603
SP
750 fflush(stderr);
751 }
de1a2fdd
SP
752 } else {
753 /* We know the complete request size in advance, use the
754 * more normal Content-Length approach.
755 */
756 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, rpc->buf);
37ee680d 757 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(rpc->len));
de1a2fdd
SP
758 if (options.verbosity > 1) {
759 fprintf(stderr, "POST %s (%lu bytes)\n",
760 rpc->service_name, (unsigned long)rpc->len);
761 fflush(stderr);
762 }
763 }
764
765 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
766 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, rpc_in);
767 curl_easy_setopt(slot->curl, CURLOPT_FILE, rpc);
768
296b847c
DT
769
770 rpc->any_written = 0;
3a347ed7 771 err = run_slot(slot, NULL);
2501aff8
JK
772 if (err == HTTP_REAUTH && !large_request) {
773 credential_fill(&http_auth);
abf8df86 774 goto retry;
2501aff8 775 }
b81401c1
JK
776 if (err != HTTP_OK)
777 err = -1;
de1a2fdd 778
296b847c
DT
779 if (!rpc->any_written)
780 err = -1;
781
de1a2fdd 782 curl_slist_free_all(headers);
b8538603 783 free(gzip_body);
de1a2fdd
SP
784 return err;
785}
786
787static int rpc_service(struct rpc_state *rpc, struct discovery *heads)
788{
789 const char *svc = rpc->service_name;
790 struct strbuf buf = STRBUF_INIT;
8150749d 791 struct strbuf *preamble = rpc->stdin_preamble;
d3180279 792 struct child_process client = CHILD_PROCESS_INIT;
de1a2fdd
SP
793 int err = 0;
794
de1a2fdd
SP
795 client.in = -1;
796 client.out = -1;
797 client.git_cmd = 1;
798 client.argv = rpc->argv;
799 if (start_command(&client))
800 exit(1);
8150749d
IT
801 if (preamble)
802 write_or_die(client.in, preamble->buf, preamble->len);
de1a2fdd
SP
803 if (heads)
804 write_or_die(client.in, heads->buf, heads->len);
805
806 rpc->alloc = http_post_buffer;
807 rpc->buf = xmalloc(rpc->alloc);
808 rpc->in = client.in;
809 rpc->out = client.out;
810 strbuf_init(&rpc->result, 0);
811
b227bbc4 812 strbuf_addf(&buf, "%s%s", url.buf, svc);
de1a2fdd
SP
813 rpc->service_url = strbuf_detach(&buf, NULL);
814
815 strbuf_addf(&buf, "Content-Type: application/x-%s-request", svc);
816 rpc->hdr_content_type = strbuf_detach(&buf, NULL);
817
8efa5f62 818 strbuf_addf(&buf, "Accept: application/x-%s-result", svc);
de1a2fdd
SP
819 rpc->hdr_accept = strbuf_detach(&buf, NULL);
820
884e586f
BW
821 if (get_protocol_http_header(heads->version, &buf))
822 rpc->protocol_header = strbuf_detach(&buf, NULL);
823 else
824 rpc->protocol_header = NULL;
825
de1a2fdd 826 while (!err) {
4981fe75 827 int n = packet_read(rpc->out, NULL, NULL, rpc->buf, rpc->alloc, 0);
de1a2fdd
SP
828 if (!n)
829 break;
830 rpc->pos = 0;
831 rpc->len = n;
832 err |= post_rpc(rpc);
833 }
de1a2fdd
SP
834
835 close(client.in);
de1a2fdd 836 client.in = -1;
6cdf0223
SP
837 if (!err) {
838 strbuf_read(&rpc->result, client.out, 0);
839 } else {
840 char buf[4096];
841 for (;;)
842 if (xread(client.out, buf, sizeof(buf)) <= 0)
843 break;
844 }
b4ee10f6
SP
845
846 close(client.out);
de1a2fdd
SP
847 client.out = -1;
848
849 err |= finish_command(&client);
850 free(rpc->service_url);
851 free(rpc->hdr_content_type);
852 free(rpc->hdr_accept);
884e586f 853 free(rpc->protocol_header);
de1a2fdd
SP
854 free(rpc->buf);
855 strbuf_release(&buf);
856 return err;
857}
858
292ce46b
SP
859static int fetch_dumb(int nr_heads, struct ref **to_fetch)
860{
26e1e0b2 861 struct walker *walker;
b32fa95f 862 char **targets;
292ce46b
SP
863 int ret, i;
864
b32fa95f 865 ALLOC_ARRAY(targets, nr_heads);
508ea882
NTND
866 if (options.depth || options.deepen_since)
867 die("dumb http transport does not support shallow capabilities");
292ce46b 868 for (i = 0; i < nr_heads; i++)
f4e54d02 869 targets[i] = xstrdup(oid_to_hex(&to_fetch[i]->old_oid));
292ce46b 870
b227bbc4 871 walker = get_http_walker(url.buf);
ef08ef9e 872 walker->get_verbosely = options.verbosity >= 3;
292ce46b
SP
873 walker->get_recover = 0;
874 ret = walker_fetch(walker, nr_heads, targets, NULL, NULL);
26e1e0b2 875 walker_free(walker);
292ce46b
SP
876
877 for (i = 0; i < nr_heads; i++)
878 free(targets[i]);
879 free(targets);
880
b725b270 881 return ret ? error("fetch failed.") : 0;
292ce46b
SP
882}
883
249b2004
SP
884static int fetch_git(struct discovery *heads,
885 int nr_heads, struct ref **to_fetch)
886{
887 struct rpc_state rpc;
8150749d 888 struct strbuf preamble = STRBUF_INIT;
b5f62ebe
NTND
889 int i, err;
890 struct argv_array args = ARGV_ARRAY_INIT;
891
892 argv_array_pushl(&args, "fetch-pack", "--stateless-rpc",
893 "--stdin", "--lock-pack", NULL);
249b2004 894 if (options.followtags)
b5f62ebe 895 argv_array_push(&args, "--include-tag");
249b2004 896 if (options.thin)
b5f62ebe
NTND
897 argv_array_push(&args, "--thin");
898 if (options.verbosity >= 3)
899 argv_array_pushl(&args, "-v", "-v", NULL);
9ba38048 900 if (options.check_self_contained_and_connected)
b5f62ebe 901 argv_array_push(&args, "--check-self-contained-and-connected");
16094885 902 if (options.cloning)
b5f62ebe 903 argv_array_push(&args, "--cloning");
16094885 904 if (options.update_shallow)
b5f62ebe 905 argv_array_push(&args, "--update-shallow");
249b2004 906 if (!options.progress)
b5f62ebe
NTND
907 argv_array_push(&args, "--no-progress");
908 if (options.depth)
909 argv_array_pushf(&args, "--depth=%lu", options.depth);
508ea882
NTND
910 if (options.deepen_since)
911 argv_array_pushf(&args, "--shallow-since=%s", options.deepen_since);
a45a2600
NTND
912 for (i = 0; i < options.deepen_not.nr; i++)
913 argv_array_pushf(&args, "--shallow-exclude=%s",
914 options.deepen_not.items[i].string);
cccf74e2
NTND
915 if (options.deepen_relative && options.depth)
916 argv_array_push(&args, "--deepen-relative");
88e2f9ed
JT
917 if (options.from_promisor)
918 argv_array_push(&args, "--from-promisor");
919 if (options.no_dependents)
920 argv_array_push(&args, "--no-dependents");
acb0c572
JH
921 if (options.filter)
922 argv_array_pushf(&args, "--filter=%s", options.filter);
b5f62ebe 923 argv_array_push(&args, url.buf);
8150749d 924
249b2004
SP
925 for (i = 0; i < nr_heads; i++) {
926 struct ref *ref = to_fetch[i];
94ee8e2c 927 if (!*ref->name)
249b2004 928 die("cannot fetch by sha1 over smart http");
58f2ed05 929 packet_buf_write(&preamble, "%s %s\n",
f4e54d02 930 oid_to_hex(&ref->old_oid), ref->name);
249b2004 931 }
8150749d 932 packet_buf_flush(&preamble);
249b2004
SP
933
934 memset(&rpc, 0, sizeof(rpc));
935 rpc.service_name = "git-upload-pack",
b5f62ebe 936 rpc.argv = args.argv;
8150749d 937 rpc.stdin_preamble = &preamble;
b8538603 938 rpc.gzip_request = 1;
249b2004
SP
939
940 err = rpc_service(&rpc, heads);
941 if (rpc.result.len)
cdf4fb8e 942 write_or_die(1, rpc.result.buf, rpc.result.len);
249b2004 943 strbuf_release(&rpc.result);
8150749d 944 strbuf_release(&preamble);
b5f62ebe 945 argv_array_clear(&args);
249b2004
SP
946 return err;
947}
948
949static int fetch(int nr_heads, struct ref **to_fetch)
950{
2a455202 951 struct discovery *d = discover_refs("git-upload-pack", 0);
249b2004
SP
952 if (d->proto_git)
953 return fetch_git(d, nr_heads, to_fetch);
954 else
955 return fetch_dumb(nr_heads, to_fetch);
956}
957
292ce46b
SP
958static void parse_fetch(struct strbuf *buf)
959{
960 struct ref **to_fetch = NULL;
961 struct ref *list_head = NULL;
962 struct ref **list = &list_head;
963 int alloc_heads = 0, nr_heads = 0;
964
965 do {
95b567c7
JK
966 const char *p;
967 if (skip_prefix(buf->buf, "fetch ", &p)) {
968 const char *name;
292ce46b 969 struct ref *ref;
8338c911 970 struct object_id old_oid;
292ce46b 971
8338c911 972 if (get_oid_hex(p, &old_oid))
292ce46b 973 die("protocol error: expected sha/ref, got %s'", p);
8338c911 974 if (p[GIT_SHA1_HEXSZ] == ' ')
975 name = p + GIT_SHA1_HEXSZ + 1;
976 else if (!p[GIT_SHA1_HEXSZ])
292ce46b
SP
977 name = "";
978 else
979 die("protocol error: expected sha/ref, got %s'", p);
980
981 ref = alloc_ref(name);
8338c911 982 oidcpy(&ref->old_oid, &old_oid);
292ce46b
SP
983
984 *list = ref;
985 list = &ref->next;
986
987 ALLOC_GROW(to_fetch, nr_heads + 1, alloc_heads);
988 to_fetch[nr_heads++] = ref;
989 }
990 else
991 die("http transport does not support %s", buf->buf);
992
993 strbuf_reset(buf);
8f309aeb 994 if (strbuf_getline_lf(buf, stdin) == EOF)
292ce46b
SP
995 return;
996 if (!*buf->buf)
997 break;
998 } while (1);
999
249b2004 1000 if (fetch(nr_heads, to_fetch))
292ce46b
SP
1001 exit(128); /* error already reported */
1002 free_refs(list_head);
1003 free(to_fetch);
1004
1005 printf("\n");
1006 fflush(stdout);
1007 strbuf_reset(buf);
1008}
1009
ae4efe19
SP
1010static int push_dav(int nr_spec, char **specs)
1011{
850d2fec
JK
1012 struct child_process child = CHILD_PROCESS_INIT;
1013 size_t i;
ae4efe19 1014
850d2fec
JK
1015 child.git_cmd = 1;
1016 argv_array_push(&child.args, "http-push");
1017 argv_array_push(&child.args, "--helper-status");
ae4efe19 1018 if (options.dry_run)
850d2fec 1019 argv_array_push(&child.args, "--dry-run");
ae4efe19 1020 if (options.verbosity > 1)
850d2fec
JK
1021 argv_array_push(&child.args, "--verbose");
1022 argv_array_push(&child.args, url.buf);
ae4efe19 1023 for (i = 0; i < nr_spec; i++)
850d2fec 1024 argv_array_push(&child.args, specs[i]);
ae4efe19 1025
850d2fec
JK
1026 if (run_command(&child))
1027 die("git-http-push failed");
ae4efe19
SP
1028 return 0;
1029}
1030
de1a2fdd
SP
1031static int push_git(struct discovery *heads, int nr_spec, char **specs)
1032{
1033 struct rpc_state rpc;
222b1212
JH
1034 int i, err;
1035 struct argv_array args;
05c1eb10 1036 struct string_list_item *cas_option;
26be19ba 1037 struct strbuf preamble = STRBUF_INIT;
222b1212
JH
1038
1039 argv_array_init(&args);
1040 argv_array_pushl(&args, "send-pack", "--stateless-rpc", "--helper-status",
1041 NULL);
de1a2fdd 1042
de1a2fdd 1043 if (options.thin)
222b1212 1044 argv_array_push(&args, "--thin");
de1a2fdd 1045 if (options.dry_run)
222b1212 1046 argv_array_push(&args, "--dry-run");
30261094
DB
1047 if (options.push_cert == SEND_PACK_PUSH_CERT_ALWAYS)
1048 argv_array_push(&args, "--signed=yes");
1049 else if (options.push_cert == SEND_PACK_PUSH_CERT_IF_ASKED)
1050 argv_array_push(&args, "--signed=if-asked");
c207e34f 1051 if (options.verbosity == 0)
222b1212 1052 argv_array_push(&args, "--quiet");
c207e34f 1053 else if (options.verbosity > 1)
222b1212 1054 argv_array_push(&args, "--verbose");
511155db
BW
1055 for (i = 0; i < options.push_options.nr; i++)
1056 argv_array_pushf(&args, "--push-option=%s",
1057 options.push_options.items[i].string);
222b1212 1058 argv_array_push(&args, options.progress ? "--progress" : "--no-progress");
05c1eb10 1059 for_each_string_list_item(cas_option, &cas_options)
2233ad45 1060 argv_array_push(&args, cas_option->string);
b227bbc4 1061 argv_array_push(&args, url.buf);
26be19ba
JK
1062
1063 argv_array_push(&args, "--stdin");
de1a2fdd 1064 for (i = 0; i < nr_spec; i++)
26be19ba
JK
1065 packet_buf_write(&preamble, "%s\n", specs[i]);
1066 packet_buf_flush(&preamble);
de1a2fdd
SP
1067
1068 memset(&rpc, 0, sizeof(rpc));
1069 rpc.service_name = "git-receive-pack",
222b1212 1070 rpc.argv = args.argv;
26be19ba 1071 rpc.stdin_preamble = &preamble;
de1a2fdd
SP
1072
1073 err = rpc_service(&rpc, heads);
1074 if (rpc.result.len)
cdf4fb8e 1075 write_or_die(1, rpc.result.buf, rpc.result.len);
de1a2fdd 1076 strbuf_release(&rpc.result);
26be19ba 1077 strbuf_release(&preamble);
222b1212 1078 argv_array_clear(&args);
de1a2fdd
SP
1079 return err;
1080}
1081
1082static int push(int nr_spec, char **specs)
1083{
2a455202 1084 struct discovery *heads = discover_refs("git-receive-pack", 1);
de1a2fdd
SP
1085 int ret;
1086
1087 if (heads->proto_git)
1088 ret = push_git(heads, nr_spec, specs);
1089 else
1090 ret = push_dav(nr_spec, specs);
1091 free_discovery(heads);
1092 return ret;
1093}
1094
ae4efe19
SP
1095static void parse_push(struct strbuf *buf)
1096{
1097 char **specs = NULL;
5238cbf6 1098 int alloc_spec = 0, nr_spec = 0, i, ret;
ae4efe19
SP
1099
1100 do {
59556548 1101 if (starts_with(buf->buf, "push ")) {
ae4efe19
SP
1102 ALLOC_GROW(specs, nr_spec + 1, alloc_spec);
1103 specs[nr_spec++] = xstrdup(buf->buf + 5);
1104 }
1105 else
1106 die("http transport does not support %s", buf->buf);
1107
1108 strbuf_reset(buf);
8f309aeb 1109 if (strbuf_getline_lf(buf, stdin) == EOF)
dc4cd767 1110 goto free_specs;
ae4efe19
SP
1111 if (!*buf->buf)
1112 break;
1113 } while (1);
1114
5238cbf6 1115 ret = push(nr_spec, specs);
ae4efe19
SP
1116 printf("\n");
1117 fflush(stdout);
dc4cd767 1118
5238cbf6
SP
1119 if (ret)
1120 exit(128); /* error already reported */
1121
dc4cd767
JM
1122 free_specs:
1123 for (i = 0; i < nr_spec; i++)
1124 free(specs[i]);
1125 free(specs);
ae4efe19
SP
1126}
1127
0f1dc53f
BW
1128/*
1129 * Used to represent the state of a connection to an HTTP server when
1130 * communicating using git's wire-protocol version 2.
1131 */
1132struct proxy_state {
1133 char *service_name;
1134 char *service_url;
1135 struct curl_slist *headers;
1136 struct strbuf request_buffer;
1137 int in;
1138 int out;
1139 struct packet_reader reader;
1140 size_t pos;
1141 int seen_flush;
1142};
1143
1144static void proxy_state_init(struct proxy_state *p, const char *service_name,
1145 enum protocol_version version)
1146{
1147 struct strbuf buf = STRBUF_INIT;
1148
1149 memset(p, 0, sizeof(*p));
1150 p->service_name = xstrdup(service_name);
1151
1152 p->in = 0;
1153 p->out = 1;
1154 strbuf_init(&p->request_buffer, 0);
1155
1156 strbuf_addf(&buf, "%s%s", url.buf, p->service_name);
1157 p->service_url = strbuf_detach(&buf, NULL);
1158
1159 p->headers = http_copy_default_headers();
1160
1161 strbuf_addf(&buf, "Content-Type: application/x-%s-request", p->service_name);
1162 p->headers = curl_slist_append(p->headers, buf.buf);
1163 strbuf_reset(&buf);
1164
1165 strbuf_addf(&buf, "Accept: application/x-%s-result", p->service_name);
1166 p->headers = curl_slist_append(p->headers, buf.buf);
1167 strbuf_reset(&buf);
1168
1169 p->headers = curl_slist_append(p->headers, "Transfer-Encoding: chunked");
1170
1171 /* Add the Git-Protocol header */
1172 if (get_protocol_http_header(version, &buf))
1173 p->headers = curl_slist_append(p->headers, buf.buf);
1174
1175 packet_reader_init(&p->reader, p->in, NULL, 0,
1176 PACKET_READ_GENTLE_ON_EOF);
1177
1178 strbuf_release(&buf);
1179}
1180
1181static void proxy_state_clear(struct proxy_state *p)
1182{
1183 free(p->service_name);
1184 free(p->service_url);
1185 curl_slist_free_all(p->headers);
1186 strbuf_release(&p->request_buffer);
1187}
1188
1189/*
1190 * CURLOPT_READFUNCTION callback function.
1191 * Attempts to copy over a single packet-line at a time into the
1192 * curl provided buffer.
1193 */
1194static size_t proxy_in(char *buffer, size_t eltsize,
1195 size_t nmemb, void *userdata)
1196{
1197 size_t max;
1198 struct proxy_state *p = userdata;
1199 size_t avail = p->request_buffer.len - p->pos;
1200
1201
1202 if (eltsize != 1)
1203 BUG("curl read callback called with size = %"PRIuMAX" != 1",
1204 (uintmax_t)eltsize);
1205 max = nmemb;
1206
1207 if (!avail) {
1208 if (p->seen_flush) {
1209 p->seen_flush = 0;
1210 return 0;
1211 }
1212
1213 strbuf_reset(&p->request_buffer);
1214 switch (packet_reader_read(&p->reader)) {
1215 case PACKET_READ_EOF:
1216 die("unexpected EOF when reading from parent process");
1217 case PACKET_READ_NORMAL:
1218 packet_buf_write_len(&p->request_buffer, p->reader.line,
1219 p->reader.pktlen);
1220 break;
1221 case PACKET_READ_DELIM:
1222 packet_buf_delim(&p->request_buffer);
1223 break;
1224 case PACKET_READ_FLUSH:
1225 packet_buf_flush(&p->request_buffer);
1226 p->seen_flush = 1;
1227 break;
1228 }
1229 p->pos = 0;
1230 avail = p->request_buffer.len;
1231 }
1232
1233 if (max < avail)
1234 avail = max;
1235 memcpy(buffer, p->request_buffer.buf + p->pos, avail);
1236 p->pos += avail;
1237 return avail;
1238}
1239
1240static size_t proxy_out(char *buffer, size_t eltsize,
1241 size_t nmemb, void *userdata)
1242{
1243 size_t size;
1244 struct proxy_state *p = userdata;
1245
1246 if (eltsize != 1)
1247 BUG("curl read callback called with size = %"PRIuMAX" != 1",
1248 (uintmax_t)eltsize);
1249 size = nmemb;
1250
1251 write_or_die(p->out, buffer, size);
1252 return size;
1253}
1254
1255/* Issues a request to the HTTP server configured in `p` */
1256static int proxy_request(struct proxy_state *p)
1257{
1258 struct active_request_slot *slot;
1259
1260 slot = get_active_slot();
1261
eaf6a1b6 1262 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "");
0f1dc53f
BW
1263 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
1264 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
1265 curl_easy_setopt(slot->curl, CURLOPT_URL, p->service_url);
1266 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, p->headers);
1267
1268 /* Setup function to read request from client */
1269 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, proxy_in);
1270 curl_easy_setopt(slot->curl, CURLOPT_READDATA, p);
1271
1272 /* Setup function to write server response to client */
1273 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, proxy_out);
1274 curl_easy_setopt(slot->curl, CURLOPT_WRITEDATA, p);
1275
1276 if (run_slot(slot, NULL) != HTTP_OK)
1277 return -1;
1278
1279 return 0;
1280}
1281
1282static int stateless_connect(const char *service_name)
1283{
1284 struct discovery *discover;
1285 struct proxy_state p;
1286
1287 /*
1288 * Run the info/refs request and see if the server supports protocol
1289 * v2. If and only if the server supports v2 can we successfully
1290 * establish a stateless connection, otherwise we need to tell the
1291 * client to fallback to using other transport helper functions to
1292 * complete their request.
1293 */
1294 discover = discover_refs(service_name, 0);
1295 if (discover->version != protocol_v2) {
1296 printf("fallback\n");
1297 fflush(stdout);
1298 return -1;
1299 } else {
1300 /* Stateless Connection established */
1301 printf("\n");
1302 fflush(stdout);
1303 }
1304
1305 proxy_state_init(&p, service_name, discover->version);
1306
1307 /*
1308 * Dump the capability listing that we got from the server earlier
1309 * during the info/refs request.
1310 */
1311 write_or_die(p.out, discover->buf, discover->len);
1312
1313 /* Peek the next packet line. Until we see EOF keep sending POSTs */
1314 while (packet_reader_peek(&p.reader) != PACKET_READ_EOF) {
1315 if (proxy_request(&p)) {
1316 /* We would have an err here */
1317 break;
1318 }
1319 }
1320
1321 proxy_state_clear(&p);
1322 return 0;
1323}
1324
3f2e2297 1325int cmd_main(int argc, const char **argv)
a2d725b7 1326{
a2d725b7 1327 struct strbuf buf = STRBUF_INIT;
a45d3d7e 1328 int nongit;
a2d725b7 1329
a45d3d7e 1330 setup_git_directory_gently(&nongit);
a2d725b7 1331 if (argc < 2) {
cdaa4e98 1332 error("remote-curl: usage: git remote-curl <remote> [<url>]");
a2d725b7
DB
1333 return 1;
1334 }
1335
ef08ef9e
SP
1336 options.verbosity = 1;
1337 options.progress = !!isatty(2);
de1a2fdd 1338 options.thin = 1;
a45a2600 1339 string_list_init(&options.deepen_not, 1);
511155db 1340 string_list_init(&options.push_options, 1);
ef08ef9e 1341
a2d725b7
DB
1342 remote = remote_get(argv[1]);
1343
1344 if (argc > 2) {
b227bbc4 1345 end_url_with_slash(&url, argv[2]);
a2d725b7 1346 } else {
b227bbc4 1347 end_url_with_slash(&url, remote->url[0]);
a2d725b7
DB
1348 }
1349
b227bbc4 1350 http_init(remote, url.buf, 0);
888692b7 1351
a2d725b7 1352 do {
95b567c7
JK
1353 const char *arg;
1354
8f309aeb 1355 if (strbuf_getline_lf(&buf, stdin) == EOF) {
1843f0ce 1356 if (ferror(stdin))
cdaa4e98 1357 error("remote-curl: error reading command stream from git");
1843f0ce
SR
1358 return 1;
1359 }
1360 if (buf.len == 0)
a2d725b7 1361 break;
59556548 1362 if (starts_with(buf.buf, "fetch ")) {
a45d3d7e 1363 if (nongit)
cdaa4e98 1364 die("remote-curl: fetch attempted without a local repo");
292ce46b
SP
1365 parse_fetch(&buf);
1366
59556548 1367 } else if (!strcmp(buf.buf, "list") || starts_with(buf.buf, "list ")) {
97cc7bc4
SP
1368 int for_push = !!strstr(buf.buf + 4, "for-push");
1369 output_refs(get_refs(for_push));
ae4efe19 1370
59556548 1371 } else if (starts_with(buf.buf, "push ")) {
ae4efe19
SP
1372 parse_push(&buf);
1373
95b567c7
JK
1374 } else if (skip_prefix(buf.buf, "option ", &arg)) {
1375 char *value = strchr(arg, ' ');
ef08ef9e
SP
1376 int result;
1377
1378 if (value)
1379 *value++ = '\0';
1380 else
1381 value = "true";
1382
95b567c7 1383 result = set_option(arg, value);
ef08ef9e
SP
1384 if (!result)
1385 printf("ok\n");
1386 else if (result < 0)
1387 printf("error invalid value\n");
1388 else
1389 printf("unsupported\n");
a2d725b7 1390 fflush(stdout);
ef08ef9e 1391
a2d725b7 1392 } else if (!strcmp(buf.buf, "capabilities")) {
0f1dc53f 1393 printf("stateless-connect\n");
a2d725b7 1394 printf("fetch\n");
ef08ef9e 1395 printf("option\n");
ae4efe19 1396 printf("push\n");
9ba38048 1397 printf("check-connectivity\n");
a2d725b7
DB
1398 printf("\n");
1399 fflush(stdout);
0f1dc53f
BW
1400 } else if (skip_prefix(buf.buf, "stateless-connect ", &arg)) {
1401 if (!stateless_connect(arg))
1402 break;
a2d725b7 1403 } else {
cdaa4e98 1404 error("remote-curl: unknown command '%s' from git", buf.buf);
a2d725b7
DB
1405 return 1;
1406 }
1407 strbuf_reset(&buf);
1408 } while (1);
888692b7
TRC
1409
1410 http_cleanup();
1411
a2d725b7
DB
1412 return 0;
1413}