]> git.ipfire.org Git - thirdparty/git.git/blame - remote-curl.c
remote-curl: reduce scope of rpc_state.stdin_preamble
[thirdparty/git.git] / remote-curl.c
CommitLineData
a2d725b7 1#include "cache.h"
b2141fc1 2#include "config.h"
a2d725b7 3#include "remote.h"
ad6ac124 4#include "connect.h"
a2d725b7
DB
5#include "strbuf.h"
6#include "walker.h"
7#include "http.h"
d807c4a0 8#include "exec-cmd.h"
ae4efe19 9#include "run-command.h"
97cc7bc4 10#include "pkt-line.h"
05c1eb10 11#include "string-list.h"
de1a2fdd 12#include "sideband.h"
222b1212 13#include "argv-array.h"
2501aff8 14#include "credential.h"
16094885 15#include "sha1-array.h"
30261094 16#include "send-pack.h"
ad6ac124 17#include "protocol.h"
90dce21e 18#include "quote.h"
a2d725b7 19
37a8768f 20static struct remote *remote;
b227bbc4
JK
21/* always ends with a trailing slash */
22static struct strbuf url = STRBUF_INIT;
37a8768f 23
ef08ef9e
SP
24struct options {
25 int verbosity;
26 unsigned long depth;
508ea882 27 char *deepen_since;
a45a2600 28 struct string_list deepen_not;
511155db 29 struct string_list push_options;
acb0c572 30 char *filter;
ef08ef9e 31 unsigned progress : 1,
9ba38048 32 check_self_contained_and_connected : 1,
16094885
NTND
33 cloning : 1,
34 update_shallow : 1,
ae4efe19 35 followtags : 1,
de1a2fdd 36 dry_run : 1,
0ea47f9d 37 thin : 1,
30261094 38 /* One of the SEND_PACK_PUSH_CERT_* constants. */
cccf74e2 39 push_cert : 2,
88e2f9ed
JT
40 deepen_relative : 1,
41 from_promisor : 1,
42 no_dependents : 1;
ef08ef9e
SP
43};
44static struct options options;
05c1eb10 45static struct string_list cas_options = STRING_LIST_INIT_DUP;
ef08ef9e 46
ef08ef9e
SP
47static int set_option(const char *name, const char *value)
48{
49 if (!strcmp(name, "verbosity")) {
50 char *end;
51 int v = strtol(value, &end, 10);
52 if (value == end || *end)
53 return -1;
54 options.verbosity = v;
55 return 0;
56 }
57 else if (!strcmp(name, "progress")) {
58 if (!strcmp(value, "true"))
59 options.progress = 1;
60 else if (!strcmp(value, "false"))
61 options.progress = 0;
62 else
63 return -1;
249b2004 64 return 0;
ef08ef9e
SP
65 }
66 else if (!strcmp(name, "depth")) {
67 char *end;
68 unsigned long v = strtoul(value, &end, 10);
69 if (value == end || *end)
70 return -1;
71 options.depth = v;
249b2004 72 return 0;
ef08ef9e 73 }
508ea882
NTND
74 else if (!strcmp(name, "deepen-since")) {
75 options.deepen_since = xstrdup(value);
76 return 0;
77 }
a45a2600
NTND
78 else if (!strcmp(name, "deepen-not")) {
79 string_list_append(&options.deepen_not, value);
80 return 0;
81 }
cccf74e2
NTND
82 else if (!strcmp(name, "deepen-relative")) {
83 if (!strcmp(value, "true"))
84 options.deepen_relative = 1;
85 else if (!strcmp(value, "false"))
86 options.deepen_relative = 0;
87 else
88 return -1;
89 return 0;
90 }
ef08ef9e
SP
91 else if (!strcmp(name, "followtags")) {
92 if (!strcmp(value, "true"))
93 options.followtags = 1;
94 else if (!strcmp(value, "false"))
95 options.followtags = 0;
96 else
97 return -1;
249b2004 98 return 0;
ef08ef9e 99 }
ae4efe19
SP
100 else if (!strcmp(name, "dry-run")) {
101 if (!strcmp(value, "true"))
102 options.dry_run = 1;
103 else if (!strcmp(value, "false"))
104 options.dry_run = 0;
105 else
106 return -1;
107 return 0;
108 }
9ba38048
NTND
109 else if (!strcmp(name, "check-connectivity")) {
110 if (!strcmp(value, "true"))
111 options.check_self_contained_and_connected = 1;
112 else if (!strcmp(value, "false"))
113 options.check_self_contained_and_connected = 0;
114 else
115 return -1;
116 return 0;
117 }
05c1eb10
JH
118 else if (!strcmp(name, "cas")) {
119 struct strbuf val = STRBUF_INIT;
120 strbuf_addf(&val, "--" CAS_OPT_NAME "=%s", value);
121 string_list_append(&cas_options, val.buf);
122 strbuf_release(&val);
123 return 0;
16094885
NTND
124 } else if (!strcmp(name, "cloning")) {
125 if (!strcmp(value, "true"))
126 options.cloning = 1;
127 else if (!strcmp(value, "false"))
128 options.cloning = 0;
129 else
130 return -1;
131 return 0;
132 } else if (!strcmp(name, "update-shallow")) {
133 if (!strcmp(value, "true"))
134 options.update_shallow = 1;
135 else if (!strcmp(value, "false"))
136 options.update_shallow = 0;
137 else
138 return -1;
139 return 0;
0ea47f9d
JH
140 } else if (!strcmp(name, "pushcert")) {
141 if (!strcmp(value, "true"))
30261094 142 options.push_cert = SEND_PACK_PUSH_CERT_ALWAYS;
0ea47f9d 143 else if (!strcmp(value, "false"))
30261094
DB
144 options.push_cert = SEND_PACK_PUSH_CERT_NEVER;
145 else if (!strcmp(value, "if-asked"))
146 options.push_cert = SEND_PACK_PUSH_CERT_IF_ASKED;
0ea47f9d
JH
147 else
148 return -1;
149 return 0;
511155db 150 } else if (!strcmp(name, "push-option")) {
90dce21e
JK
151 if (*value != '"')
152 string_list_append(&options.push_options, value);
153 else {
154 struct strbuf unquoted = STRBUF_INIT;
155 if (unquote_c_style(&unquoted, value, NULL) < 0)
156 die("invalid quoting in push-option value");
157 string_list_append_nodup(&options.push_options,
158 strbuf_detach(&unquoted, NULL));
159 }
511155db 160 return 0;
c915f11e
EW
161
162#if LIBCURL_VERSION_NUM >= 0x070a08
163 } else if (!strcmp(name, "family")) {
164 if (!strcmp(value, "ipv4"))
165 git_curl_ipresolve = CURL_IPRESOLVE_V4;
166 else if (!strcmp(value, "ipv6"))
167 git_curl_ipresolve = CURL_IPRESOLVE_V6;
168 else if (!strcmp(value, "all"))
169 git_curl_ipresolve = CURL_IPRESOLVE_WHATEVER;
170 else
171 return -1;
172 return 0;
173#endif /* LIBCURL_VERSION_NUM >= 0x070a08 */
88e2f9ed
JT
174 } else if (!strcmp(name, "from-promisor")) {
175 options.from_promisor = 1;
176 return 0;
177 } else if (!strcmp(name, "no-dependents")) {
178 options.no_dependents = 1;
179 return 0;
acb0c572 180 } else if (!strcmp(name, "filter")) {
c3b9bc94 181 options.filter = xstrdup(value);
acb0c572 182 return 0;
16094885 183 } else {
ef08ef9e
SP
184 return 1 /* unsupported */;
185 }
186}
187
97cc7bc4 188struct discovery {
f08a5d42 189 char *service;
97cc7bc4
SP
190 char *buf_alloc;
191 char *buf;
192 size_t len;
2a455202 193 struct ref *refs;
910650d2 194 struct oid_array shallow;
49e85e95 195 enum protocol_version version;
97cc7bc4
SP
196 unsigned proto_git : 1;
197};
198static struct discovery *last_discovery;
199
b8054bbe
JK
200static struct ref *parse_git_refs(struct discovery *heads, int for_push)
201{
202 struct ref *list = NULL;
ad6ac124
BW
203 struct packet_reader reader;
204
205 packet_reader_init(&reader, -1, heads->buf, heads->len,
206 PACKET_READ_CHOMP_NEWLINE |
2d103c31
MS
207 PACKET_READ_GENTLE_ON_EOF |
208 PACKET_READ_DIE_ON_ERR_PACKET);
ad6ac124 209
49e85e95
BW
210 heads->version = discover_version(&reader);
211 switch (heads->version) {
8f6982b4 212 case protocol_v2:
0f1dc53f
BW
213 /*
214 * Do nothing. This isn't a list of refs but rather a
215 * capability advertisement. Client would have run
216 * 'stateless-connect' so we'll dump this capability listing
217 * and let them request the refs themselves.
218 */
8f6982b4 219 break;
ad6ac124
BW
220 case protocol_v1:
221 case protocol_v0:
222 get_remote_heads(&reader, &list, for_push ? REF_NORMAL : 0,
223 NULL, &heads->shallow);
224 break;
225 case protocol_unknown_version:
226 BUG("unknown protocol version");
227 }
228
b8054bbe
JK
229 return list;
230}
231
232static struct ref *parse_info_refs(struct discovery *heads)
233{
234 char *data, *start, *mid;
235 char *ref_name;
236 int i = 0;
237
238 struct ref *refs = NULL;
239 struct ref *ref = NULL;
240 struct ref *last_ref = NULL;
241
242 data = heads->buf;
243 start = NULL;
244 mid = data;
245 while (i < heads->len) {
246 if (!start) {
247 start = &data[i];
248 }
249 if (data[i] == '\t')
250 mid = &data[i];
251 if (data[i] == '\n') {
252 if (mid - start != 40)
b227bbc4
JK
253 die("%sinfo/refs not valid: is this a git repository?",
254 url.buf);
b8054bbe
JK
255 data[i] = 0;
256 ref_name = mid + 1;
6f687c21 257 ref = alloc_ref(ref_name);
f4e54d02 258 get_oid_hex(start, &ref->old_oid);
b8054bbe
JK
259 if (!refs)
260 refs = ref;
261 if (last_ref)
262 last_ref->next = ref;
263 last_ref = ref;
264 start = NULL;
265 }
266 i++;
267 }
268
269 ref = alloc_ref("HEAD");
b227bbc4 270 if (!http_fetch_ref(url.buf, ref) &&
b8054bbe
JK
271 !resolve_remote_symref(ref, refs)) {
272 ref->next = refs;
273 refs = ref;
274 } else {
275 free(ref);
276 }
277
278 return refs;
279}
280
97cc7bc4
SP
281static void free_discovery(struct discovery *d)
282{
283 if (d) {
284 if (d == last_discovery)
285 last_discovery = NULL;
ee3051bd 286 free(d->shallow.oid);
97cc7bc4 287 free(d->buf_alloc);
2a455202 288 free_refs(d->refs);
f08a5d42 289 free(d->service);
97cc7bc4
SP
290 free(d);
291 }
292}
293
fc1b774c
JK
294static int show_http_message(struct strbuf *type, struct strbuf *charset,
295 struct strbuf *msg)
426e70d4
JK
296{
297 const char *p, *eol;
298
299 /*
300 * We only show text/plain parts, as other types are likely
301 * to be ugly to look at on the user's terminal.
426e70d4 302 */
bf197fd7 303 if (strcmp(type->buf, "text/plain"))
426e70d4 304 return -1;
fc1b774c
JK
305 if (charset->len)
306 strbuf_reencode(msg, charset->buf, get_log_output_encoding());
426e70d4
JK
307
308 strbuf_trim(msg);
309 if (!msg->len)
310 return -1;
311
312 p = msg->buf;
313 do {
314 eol = strchrnul(p, '\n');
315 fprintf(stderr, "remote: %.*s\n", (int)(eol - p), p);
316 p = eol + 1;
317 } while(*eol);
318 return 0;
319}
320
884e586f
BW
321static int get_protocol_http_header(enum protocol_version version,
322 struct strbuf *header)
323{
324 if (version > 0) {
325 strbuf_addf(header, GIT_PROTOCOL_HEADER ": version=%d",
326 version);
327
328 return 1;
329 }
330
331 return 0;
332}
333
8ee3e120
JK
334static void check_smart_http(struct discovery *d, const char *service,
335 struct strbuf *type)
336{
337 const char *p;
338 struct packet_reader reader;
339
340 /*
341 * If we don't see x-$service-advertisement, then it's not smart-http.
342 * But once we do, we commit to it and assume any other protocol
343 * violations are hard errors.
344 */
345 if (!skip_prefix(type->buf, "application/x-", &p) ||
346 !skip_prefix(p, service, &p) ||
347 strcmp(p, "-advertisement"))
348 return;
349
350 packet_reader_init(&reader, -1, d->buf, d->len,
351 PACKET_READ_CHOMP_NEWLINE |
352 PACKET_READ_DIE_ON_ERR_PACKET);
353 if (packet_reader_read(&reader) != PACKET_READ_NORMAL)
354 die("invalid server response; expected service, got flush packet");
355
356 if (skip_prefix(reader.line, "# service=", &p) && !strcmp(p, service)) {
357 /*
358 * The header can include additional metadata lines, up
359 * until a packet flush marker. Ignore these now, but
360 * in the future we might start to scan them.
361 */
362 for (;;) {
363 packet_reader_read(&reader);
364 if (reader.pktlen <= 0) {
365 break;
366 }
367 }
368
369 /*
370 * v0 smart http; callers expect us to soak up the
371 * service and header packets
372 */
373 d->buf = reader.src_buffer;
374 d->len = reader.src_len;
375 d->proto_git = 1;
376
cbdb8d14 377 } else if (!strcmp(reader.line, "version 2")) {
8ee3e120
JK
378 /*
379 * v2 smart http; do not consume version packet, which will
380 * be handled elsewhere.
381 */
382 d->proto_git = 1;
383
384 } else {
385 die("invalid server response; got '%s'", reader.line);
386 }
387}
388
24d36f14 389static struct discovery *discover_refs(const char *service, int for_push)
a2d725b7 390{
4656bf47 391 struct strbuf type = STRBUF_INIT;
fc1b774c 392 struct strbuf charset = STRBUF_INIT;
a2d725b7 393 struct strbuf buffer = STRBUF_INIT;
c65d5692 394 struct strbuf refs_url = STRBUF_INIT;
050ef365 395 struct strbuf effective_url = STRBUF_INIT;
884e586f
BW
396 struct strbuf protocol_header = STRBUF_INIT;
397 struct string_list extra_headers = STRING_LIST_INIT_DUP;
97cc7bc4 398 struct discovery *last = last_discovery;
243c329c 399 int http_ret, maybe_smart = 0;
fcaa6e64 400 struct http_get_options http_options;
a4d78ce2 401 enum protocol_version version = get_protocol_version_config();
a2d725b7 402
97cc7bc4
SP
403 if (last && !strcmp(service, last->service))
404 return last;
405 free_discovery(last);
a2d725b7 406
b227bbc4 407 strbuf_addf(&refs_url, "%sinfo/refs", url.buf);
59556548 408 if ((starts_with(url.buf, "http://") || starts_with(url.buf, "https://")) &&
02572c2e 409 git_env_bool("GIT_SMART_HTTP", 1)) {
243c329c 410 maybe_smart = 1;
b227bbc4 411 if (!strchr(url.buf, '?'))
c65d5692 412 strbuf_addch(&refs_url, '?');
97cc7bc4 413 else
c65d5692
JK
414 strbuf_addch(&refs_url, '&');
415 strbuf_addf(&refs_url, "service=%s", service);
97cc7bc4 416 }
a2d725b7 417
a4d78ce2
BW
418 /*
419 * NEEDSWORK: If we are trying to use protocol v2 and we are planning
420 * to perform a push, then fallback to v0 since the client doesn't know
421 * how to push yet using v2.
422 */
423 if (version == protocol_v2 && !strcmp("git-receive-pack", service))
424 version = protocol_v0;
425
884e586f 426 /* Add the extra Git-Protocol header */
a4d78ce2 427 if (get_protocol_http_header(version, &protocol_header))
884e586f
BW
428 string_list_append(&extra_headers, protocol_header.buf);
429
fcaa6e64
JK
430 memset(&http_options, 0, sizeof(http_options));
431 http_options.content_type = &type;
432 http_options.charset = &charset;
433 http_options.effective_url = &effective_url;
434 http_options.base_url = &url;
884e586f 435 http_options.extra_headers = &extra_headers;
50d34137 436 http_options.initial_request = 1;
fcaa6e64 437 http_options.no_cache = 1;
1bbcc224 438
fcaa6e64 439 http_ret = http_get_strbuf(refs_url.buf, &buffer, &http_options);
a2d725b7
DB
440 switch (http_ret) {
441 case HTTP_OK:
442 break;
443 case HTTP_MISSING_TARGET:
fc1b774c 444 show_http_message(&type, &charset, &buffer);
b227bbc4 445 die("repository '%s' not found", url.buf);
42653c09 446 case HTTP_NOAUTH:
fc1b774c 447 show_http_message(&type, &charset, &buffer);
b227bbc4 448 die("Authentication failed for '%s'", url.buf);
a2d725b7 449 default:
fc1b774c 450 show_http_message(&type, &charset, &buffer);
b227bbc4 451 die("unable to access '%s': %s", url.buf, curl_errorstr);
a2d725b7
DB
452 }
453
50d34137
JK
454 if (options.verbosity && !starts_with(refs_url.buf, url.buf))
455 warning(_("redirecting to %s"), url.buf);
456
97cc7bc4 457 last= xcalloc(1, sizeof(*last_discovery));
f08a5d42 458 last->service = xstrdup(service);
97cc7bc4
SP
459 last->buf_alloc = strbuf_detach(&buffer, &last->len);
460 last->buf = last->buf_alloc;
461
8ee3e120
JK
462 if (maybe_smart)
463 check_smart_http(last, service, &type);
97cc7bc4 464
2a455202
JK
465 if (last->proto_git)
466 last->refs = parse_git_refs(last, for_push);
467 else
468 last->refs = parse_info_refs(last);
469
c65d5692 470 strbuf_release(&refs_url);
4656bf47 471 strbuf_release(&type);
fc1b774c 472 strbuf_release(&charset);
050ef365 473 strbuf_release(&effective_url);
97cc7bc4 474 strbuf_release(&buffer);
884e586f
BW
475 strbuf_release(&protocol_header);
476 string_list_clear(&extra_headers, 0);
97cc7bc4
SP
477 last_discovery = last;
478 return last;
479}
480
97cc7bc4
SP
481static struct ref *get_refs(int for_push)
482{
483 struct discovery *heads;
484
485 if (for_push)
2a455202 486 heads = discover_refs("git-receive-pack", for_push);
97cc7bc4 487 else
2a455202 488 heads = discover_refs("git-upload-pack", for_push);
97cc7bc4 489
2a455202 490 return heads->refs;
97cc7bc4
SP
491}
492
ae4efe19
SP
493static void output_refs(struct ref *refs)
494{
495 struct ref *posn;
496 for (posn = refs; posn; posn = posn->next) {
497 if (posn->symref)
498 printf("@%s %s\n", posn->symref, posn->name);
499 else
f4e54d02 500 printf("%s %s\n", oid_to_hex(&posn->old_oid), posn->name);
ae4efe19
SP
501 }
502 printf("\n");
503 fflush(stdout);
ae4efe19
SP
504}
505
de1a2fdd
SP
506struct rpc_state {
507 const char *service_name;
de1a2fdd
SP
508 char *service_url;
509 char *hdr_content_type;
510 char *hdr_accept;
884e586f 511 char *protocol_header;
de1a2fdd
SP
512 char *buf;
513 size_t alloc;
514 size_t len;
515 size_t pos;
516 int in;
517 int out;
296b847c 518 int any_written;
de1a2fdd 519 struct strbuf result;
b8538603 520 unsigned gzip_request : 1;
6c81a990 521 unsigned initial_buffer : 1;
de1a2fdd
SP
522};
523
524static size_t rpc_out(void *ptr, size_t eltsize,
525 size_t nmemb, void *buffer_)
526{
527 size_t max = eltsize * nmemb;
528 struct rpc_state *rpc = buffer_;
529 size_t avail = rpc->len - rpc->pos;
530
531 if (!avail) {
6c81a990 532 rpc->initial_buffer = 0;
4981fe75 533 avail = packet_read(rpc->out, NULL, NULL, rpc->buf, rpc->alloc, 0);
de1a2fdd
SP
534 if (!avail)
535 return 0;
536 rpc->pos = 0;
537 rpc->len = avail;
538 }
539
48310608 540 if (max < avail)
de1a2fdd
SP
541 avail = max;
542 memcpy(ptr, rpc->buf + rpc->pos, avail);
543 rpc->pos += avail;
544 return avail;
545}
546
6c81a990 547#ifndef NO_CURL_IOCTL
5092d3ec 548static curlioerr rpc_ioctl(CURL *handle, int cmd, void *clientp)
6c81a990
MS
549{
550 struct rpc_state *rpc = clientp;
551
552 switch (cmd) {
553 case CURLIOCMD_NOP:
554 return CURLIOE_OK;
555
556 case CURLIOCMD_RESTARTREAD:
557 if (rpc->initial_buffer) {
558 rpc->pos = 0;
559 return CURLIOE_OK;
560 }
b725b270 561 error("unable to rewind rpc post data - try increasing http.postBuffer");
6c81a990
MS
562 return CURLIOE_FAILRESTART;
563
564 default:
565 return CURLIOE_UNKNOWNCMD;
566 }
567}
568#endif
569
cf2fb92b
MS
570struct rpc_in_data {
571 struct rpc_state *rpc;
b79bdd8c 572 struct active_request_slot *slot;
cf2fb92b
MS
573};
574
575/*
576 * A callback for CURLOPT_WRITEFUNCTION. The return value is the bytes consumed
577 * from ptr.
578 */
a04ff3ec 579static size_t rpc_in(char *ptr, size_t eltsize,
de1a2fdd
SP
580 size_t nmemb, void *buffer_)
581{
582 size_t size = eltsize * nmemb;
cf2fb92b 583 struct rpc_in_data *data = buffer_;
b79bdd8c
MS
584 long response_code;
585
586 if (curl_easy_getinfo(data->slot->curl, CURLINFO_RESPONSE_CODE,
587 &response_code) != CURLE_OK)
588 return size;
589 if (response_code >= 300)
590 return size;
296b847c 591 if (size)
cf2fb92b
MS
592 data->rpc->any_written = 1;
593 write_or_die(data->rpc->in, ptr, size);
de1a2fdd
SP
594 return size;
595}
596
3a347ed7
JK
597static int run_slot(struct active_request_slot *slot,
598 struct slot_results *results)
206b099d 599{
b81401c1 600 int err;
3a347ed7 601 struct slot_results results_buf;
206b099d 602
3a347ed7
JK
603 if (!results)
604 results = &results_buf;
605
beed336c 606 err = run_one_slot(slot, results);
206b099d 607
b81401c1 608 if (err != HTTP_OK && err != HTTP_REAUTH) {
00540458
SP
609 struct strbuf msg = STRBUF_INIT;
610 if (results->http_code && results->http_code != 200)
611 strbuf_addf(&msg, "HTTP %ld", results->http_code);
612 if (results->curl_result != CURLE_OK) {
613 if (msg.len)
614 strbuf_addch(&msg, ' ');
615 strbuf_addf(&msg, "curl %d", results->curl_result);
616 if (curl_errorstr[0]) {
617 strbuf_addch(&msg, ' ');
618 strbuf_addstr(&msg, curl_errorstr);
619 }
620 }
621 error("RPC failed; %s", msg.buf);
622 strbuf_release(&msg);
206b099d
SP
623 }
624
625 return err;
626}
627
3a347ed7 628static int probe_rpc(struct rpc_state *rpc, struct slot_results *results)
206b099d
SP
629{
630 struct active_request_slot *slot;
8cb01e2f 631 struct curl_slist *headers = http_copy_default_headers();
206b099d
SP
632 struct strbuf buf = STRBUF_INIT;
633 int err;
634
635 slot = get_active_slot();
636
637 headers = curl_slist_append(headers, rpc->hdr_content_type);
638 headers = curl_slist_append(headers, rpc->hdr_accept);
639
640 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
641 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
642 curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
aa90b969 643 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, NULL);
206b099d
SP
644 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, "0000");
645 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE, 4);
646 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
647 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
648 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buf);
649
3a347ed7 650 err = run_slot(slot, results);
206b099d
SP
651
652 curl_slist_free_all(headers);
653 strbuf_release(&buf);
654 return err;
655}
656
3b335762
NTND
657static curl_off_t xcurl_off_t(size_t len)
658{
cb8010bb
TB
659 uintmax_t size = len;
660 if (size > maximum_signed_value_of_type(curl_off_t))
37ee680d 661 die("cannot handle pushes this big");
cb8010bb 662 return (curl_off_t)size;
37ee680d
DT
663}
664
de1a2fdd
SP
665static int post_rpc(struct rpc_state *rpc)
666{
667 struct active_request_slot *slot;
8cb01e2f 668 struct curl_slist *headers = http_copy_default_headers();
b8538603
SP
669 int use_gzip = rpc->gzip_request;
670 char *gzip_body = NULL;
37711549 671 size_t gzip_size = 0;
206b099d 672 int err, large_request = 0;
c80d96ca 673 int needs_100_continue = 0;
cf2fb92b 674 struct rpc_in_data rpc_in_data;
de1a2fdd
SP
675
676 /* Try to load the entire request, if we can fit it into the
677 * allocated buffer space we can use HTTP/1.0 and avoid the
678 * chunked encoding mess.
679 */
680 while (1) {
681 size_t left = rpc->alloc - rpc->len;
682 char *buf = rpc->buf + rpc->len;
683 int n;
684
685 if (left < LARGE_PACKET_MAX) {
686 large_request = 1;
b8538603 687 use_gzip = 0;
de1a2fdd
SP
688 break;
689 }
690
4981fe75 691 n = packet_read(rpc->out, NULL, NULL, buf, left, 0);
de1a2fdd
SP
692 if (!n)
693 break;
694 rpc->len += n;
695 }
696
206b099d 697 if (large_request) {
c80d96ca 698 struct slot_results results;
699
b81401c1 700 do {
c80d96ca 701 err = probe_rpc(rpc, &results);
2501aff8
JK
702 if (err == HTTP_REAUTH)
703 credential_fill(&http_auth);
b81401c1
JK
704 } while (err == HTTP_REAUTH);
705 if (err != HTTP_OK)
706 return -1;
c80d96ca 707
708 if (results.auth_avail & CURLAUTH_GSSNEGOTIATE)
709 needs_100_continue = 1;
206b099d
SP
710 }
711
abf8df86
JK
712 headers = curl_slist_append(headers, rpc->hdr_content_type);
713 headers = curl_slist_append(headers, rpc->hdr_accept);
c80d96ca 714 headers = curl_slist_append(headers, needs_100_continue ?
715 "Expect: 100-continue" : "Expect:");
abf8df86 716
884e586f
BW
717 /* Add the extra Git-Protocol header */
718 if (rpc->protocol_header)
719 headers = curl_slist_append(headers, rpc->protocol_header);
720
abf8df86 721retry:
de1a2fdd 722 slot = get_active_slot();
de1a2fdd 723
de1a2fdd 724 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
d21f9794 725 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
de1a2fdd 726 curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
1a53e692 727 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "");
de1a2fdd 728
de1a2fdd
SP
729 if (large_request) {
730 /* The request body is large and the size cannot be predicted.
731 * We must use chunked encoding to send it.
732 */
de1a2fdd 733 headers = curl_slist_append(headers, "Transfer-Encoding: chunked");
6c81a990 734 rpc->initial_buffer = 1;
de1a2fdd
SP
735 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, rpc_out);
736 curl_easy_setopt(slot->curl, CURLOPT_INFILE, rpc);
6c81a990
MS
737#ifndef NO_CURL_IOCTL
738 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, rpc_ioctl);
739 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, rpc);
740#endif
de1a2fdd
SP
741 if (options.verbosity > 1) {
742 fprintf(stderr, "POST %s (chunked)\n", rpc->service_name);
743 fflush(stderr);
744 }
745
2e736fd5
JK
746 } else if (gzip_body) {
747 /*
748 * If we are looping to retry authentication, then the previous
749 * run will have set up the headers and gzip buffer already,
750 * and we just need to send it.
751 */
752 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
37ee680d 753 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
2e736fd5 754
b8538603
SP
755 } else if (use_gzip && 1024 < rpc->len) {
756 /* The client backend isn't giving us compressed data so
a8132410 757 * we can try to deflate it ourselves, this may save on
b8538603
SP
758 * the transfer time.
759 */
ef49a7a0 760 git_zstream stream;
b8538603
SP
761 int ret;
762
55bb5c91 763 git_deflate_init_gzip(&stream, Z_BEST_COMPRESSION);
df126e10
JK
764 gzip_size = git_deflate_bound(&stream, rpc->len);
765 gzip_body = xmalloc(gzip_size);
b8538603
SP
766
767 stream.next_in = (unsigned char *)rpc->buf;
768 stream.avail_in = rpc->len;
769 stream.next_out = (unsigned char *)gzip_body;
df126e10 770 stream.avail_out = gzip_size;
b8538603 771
55bb5c91 772 ret = git_deflate(&stream, Z_FINISH);
b8538603
SP
773 if (ret != Z_STREAM_END)
774 die("cannot deflate request; zlib deflate error %d", ret);
775
55bb5c91 776 ret = git_deflate_end_gently(&stream);
b8538603
SP
777 if (ret != Z_OK)
778 die("cannot deflate request; zlib end error %d", ret);
779
df126e10 780 gzip_size = stream.total_out;
b8538603
SP
781
782 headers = curl_slist_append(headers, "Content-Encoding: gzip");
783 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
37ee680d 784 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
b8538603
SP
785
786 if (options.verbosity > 1) {
787 fprintf(stderr, "POST %s (gzip %lu to %lu bytes)\n",
788 rpc->service_name,
df126e10 789 (unsigned long)rpc->len, (unsigned long)gzip_size);
b8538603
SP
790 fflush(stderr);
791 }
de1a2fdd
SP
792 } else {
793 /* We know the complete request size in advance, use the
794 * more normal Content-Length approach.
795 */
796 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, rpc->buf);
37ee680d 797 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(rpc->len));
de1a2fdd
SP
798 if (options.verbosity > 1) {
799 fprintf(stderr, "POST %s (%lu bytes)\n",
800 rpc->service_name, (unsigned long)rpc->len);
801 fflush(stderr);
802 }
803 }
804
805 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
806 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, rpc_in);
cf2fb92b 807 rpc_in_data.rpc = rpc;
b79bdd8c 808 rpc_in_data.slot = slot;
cf2fb92b 809 curl_easy_setopt(slot->curl, CURLOPT_FILE, &rpc_in_data);
b79bdd8c 810 curl_easy_setopt(slot->curl, CURLOPT_FAILONERROR, 0);
de1a2fdd 811
296b847c
DT
812
813 rpc->any_written = 0;
3a347ed7 814 err = run_slot(slot, NULL);
2501aff8
JK
815 if (err == HTTP_REAUTH && !large_request) {
816 credential_fill(&http_auth);
abf8df86 817 goto retry;
2501aff8 818 }
b81401c1
JK
819 if (err != HTTP_OK)
820 err = -1;
de1a2fdd 821
296b847c
DT
822 if (!rpc->any_written)
823 err = -1;
824
de1a2fdd 825 curl_slist_free_all(headers);
b8538603 826 free(gzip_body);
de1a2fdd
SP
827 return err;
828}
829
7d50d34f 830static int rpc_service(struct rpc_state *rpc, struct discovery *heads,
5d916693 831 const char **client_argv, const struct strbuf *preamble)
de1a2fdd
SP
832{
833 const char *svc = rpc->service_name;
834 struct strbuf buf = STRBUF_INIT;
d3180279 835 struct child_process client = CHILD_PROCESS_INIT;
de1a2fdd
SP
836 int err = 0;
837
de1a2fdd
SP
838 client.in = -1;
839 client.out = -1;
840 client.git_cmd = 1;
7d50d34f 841 client.argv = client_argv;
de1a2fdd
SP
842 if (start_command(&client))
843 exit(1);
5d916693 844 write_or_die(client.in, preamble->buf, preamble->len);
de1a2fdd
SP
845 if (heads)
846 write_or_die(client.in, heads->buf, heads->len);
847
848 rpc->alloc = http_post_buffer;
849 rpc->buf = xmalloc(rpc->alloc);
850 rpc->in = client.in;
851 rpc->out = client.out;
852 strbuf_init(&rpc->result, 0);
853
b227bbc4 854 strbuf_addf(&buf, "%s%s", url.buf, svc);
de1a2fdd
SP
855 rpc->service_url = strbuf_detach(&buf, NULL);
856
857 strbuf_addf(&buf, "Content-Type: application/x-%s-request", svc);
858 rpc->hdr_content_type = strbuf_detach(&buf, NULL);
859
8efa5f62 860 strbuf_addf(&buf, "Accept: application/x-%s-result", svc);
de1a2fdd
SP
861 rpc->hdr_accept = strbuf_detach(&buf, NULL);
862
884e586f
BW
863 if (get_protocol_http_header(heads->version, &buf))
864 rpc->protocol_header = strbuf_detach(&buf, NULL);
865 else
866 rpc->protocol_header = NULL;
867
de1a2fdd 868 while (!err) {
4981fe75 869 int n = packet_read(rpc->out, NULL, NULL, rpc->buf, rpc->alloc, 0);
de1a2fdd
SP
870 if (!n)
871 break;
872 rpc->pos = 0;
873 rpc->len = n;
874 err |= post_rpc(rpc);
875 }
de1a2fdd
SP
876
877 close(client.in);
de1a2fdd 878 client.in = -1;
6cdf0223
SP
879 if (!err) {
880 strbuf_read(&rpc->result, client.out, 0);
881 } else {
882 char buf[4096];
883 for (;;)
884 if (xread(client.out, buf, sizeof(buf)) <= 0)
885 break;
886 }
b4ee10f6
SP
887
888 close(client.out);
de1a2fdd
SP
889 client.out = -1;
890
891 err |= finish_command(&client);
892 free(rpc->service_url);
893 free(rpc->hdr_content_type);
894 free(rpc->hdr_accept);
884e586f 895 free(rpc->protocol_header);
de1a2fdd
SP
896 free(rpc->buf);
897 strbuf_release(&buf);
898 return err;
899}
900
292ce46b
SP
901static int fetch_dumb(int nr_heads, struct ref **to_fetch)
902{
26e1e0b2 903 struct walker *walker;
b32fa95f 904 char **targets;
292ce46b
SP
905 int ret, i;
906
b32fa95f 907 ALLOC_ARRAY(targets, nr_heads);
508ea882
NTND
908 if (options.depth || options.deepen_since)
909 die("dumb http transport does not support shallow capabilities");
292ce46b 910 for (i = 0; i < nr_heads; i++)
f4e54d02 911 targets[i] = xstrdup(oid_to_hex(&to_fetch[i]->old_oid));
292ce46b 912
b227bbc4 913 walker = get_http_walker(url.buf);
ef08ef9e 914 walker->get_verbosely = options.verbosity >= 3;
292ce46b
SP
915 walker->get_recover = 0;
916 ret = walker_fetch(walker, nr_heads, targets, NULL, NULL);
26e1e0b2 917 walker_free(walker);
292ce46b
SP
918
919 for (i = 0; i < nr_heads; i++)
920 free(targets[i]);
921 free(targets);
922
b725b270 923 return ret ? error("fetch failed.") : 0;
292ce46b
SP
924}
925
249b2004
SP
926static int fetch_git(struct discovery *heads,
927 int nr_heads, struct ref **to_fetch)
928{
929 struct rpc_state rpc;
8150749d 930 struct strbuf preamble = STRBUF_INIT;
b5f62ebe
NTND
931 int i, err;
932 struct argv_array args = ARGV_ARRAY_INIT;
933
934 argv_array_pushl(&args, "fetch-pack", "--stateless-rpc",
935 "--stdin", "--lock-pack", NULL);
249b2004 936 if (options.followtags)
b5f62ebe 937 argv_array_push(&args, "--include-tag");
249b2004 938 if (options.thin)
b5f62ebe
NTND
939 argv_array_push(&args, "--thin");
940 if (options.verbosity >= 3)
941 argv_array_pushl(&args, "-v", "-v", NULL);
9ba38048 942 if (options.check_self_contained_and_connected)
b5f62ebe 943 argv_array_push(&args, "--check-self-contained-and-connected");
16094885 944 if (options.cloning)
b5f62ebe 945 argv_array_push(&args, "--cloning");
16094885 946 if (options.update_shallow)
b5f62ebe 947 argv_array_push(&args, "--update-shallow");
249b2004 948 if (!options.progress)
b5f62ebe
NTND
949 argv_array_push(&args, "--no-progress");
950 if (options.depth)
951 argv_array_pushf(&args, "--depth=%lu", options.depth);
508ea882
NTND
952 if (options.deepen_since)
953 argv_array_pushf(&args, "--shallow-since=%s", options.deepen_since);
a45a2600
NTND
954 for (i = 0; i < options.deepen_not.nr; i++)
955 argv_array_pushf(&args, "--shallow-exclude=%s",
956 options.deepen_not.items[i].string);
cccf74e2
NTND
957 if (options.deepen_relative && options.depth)
958 argv_array_push(&args, "--deepen-relative");
88e2f9ed
JT
959 if (options.from_promisor)
960 argv_array_push(&args, "--from-promisor");
961 if (options.no_dependents)
962 argv_array_push(&args, "--no-dependents");
acb0c572
JH
963 if (options.filter)
964 argv_array_pushf(&args, "--filter=%s", options.filter);
b5f62ebe 965 argv_array_push(&args, url.buf);
8150749d 966
249b2004
SP
967 for (i = 0; i < nr_heads; i++) {
968 struct ref *ref = to_fetch[i];
94ee8e2c 969 if (!*ref->name)
249b2004 970 die("cannot fetch by sha1 over smart http");
58f2ed05 971 packet_buf_write(&preamble, "%s %s\n",
f4e54d02 972 oid_to_hex(&ref->old_oid), ref->name);
249b2004 973 }
8150749d 974 packet_buf_flush(&preamble);
249b2004
SP
975
976 memset(&rpc, 0, sizeof(rpc));
977 rpc.service_name = "git-upload-pack",
b8538603 978 rpc.gzip_request = 1;
249b2004 979
5d916693 980 err = rpc_service(&rpc, heads, args.argv, &preamble);
249b2004 981 if (rpc.result.len)
cdf4fb8e 982 write_or_die(1, rpc.result.buf, rpc.result.len);
249b2004 983 strbuf_release(&rpc.result);
8150749d 984 strbuf_release(&preamble);
b5f62ebe 985 argv_array_clear(&args);
249b2004
SP
986 return err;
987}
988
989static int fetch(int nr_heads, struct ref **to_fetch)
990{
2a455202 991 struct discovery *d = discover_refs("git-upload-pack", 0);
249b2004
SP
992 if (d->proto_git)
993 return fetch_git(d, nr_heads, to_fetch);
994 else
995 return fetch_dumb(nr_heads, to_fetch);
996}
997
292ce46b
SP
998static void parse_fetch(struct strbuf *buf)
999{
1000 struct ref **to_fetch = NULL;
1001 struct ref *list_head = NULL;
1002 struct ref **list = &list_head;
1003 int alloc_heads = 0, nr_heads = 0;
1004
1005 do {
95b567c7
JK
1006 const char *p;
1007 if (skip_prefix(buf->buf, "fetch ", &p)) {
1008 const char *name;
292ce46b 1009 struct ref *ref;
8338c911 1010 struct object_id old_oid;
292ce46b 1011
8338c911 1012 if (get_oid_hex(p, &old_oid))
292ce46b 1013 die("protocol error: expected sha/ref, got %s'", p);
8338c911 1014 if (p[GIT_SHA1_HEXSZ] == ' ')
1015 name = p + GIT_SHA1_HEXSZ + 1;
1016 else if (!p[GIT_SHA1_HEXSZ])
292ce46b
SP
1017 name = "";
1018 else
1019 die("protocol error: expected sha/ref, got %s'", p);
1020
1021 ref = alloc_ref(name);
8338c911 1022 oidcpy(&ref->old_oid, &old_oid);
292ce46b
SP
1023
1024 *list = ref;
1025 list = &ref->next;
1026
1027 ALLOC_GROW(to_fetch, nr_heads + 1, alloc_heads);
1028 to_fetch[nr_heads++] = ref;
1029 }
1030 else
1031 die("http transport does not support %s", buf->buf);
1032
1033 strbuf_reset(buf);
8f309aeb 1034 if (strbuf_getline_lf(buf, stdin) == EOF)
292ce46b
SP
1035 return;
1036 if (!*buf->buf)
1037 break;
1038 } while (1);
1039
249b2004 1040 if (fetch(nr_heads, to_fetch))
292ce46b
SP
1041 exit(128); /* error already reported */
1042 free_refs(list_head);
1043 free(to_fetch);
1044
1045 printf("\n");
1046 fflush(stdout);
1047 strbuf_reset(buf);
1048}
1049
ae4efe19
SP
1050static int push_dav(int nr_spec, char **specs)
1051{
850d2fec
JK
1052 struct child_process child = CHILD_PROCESS_INIT;
1053 size_t i;
ae4efe19 1054
850d2fec
JK
1055 child.git_cmd = 1;
1056 argv_array_push(&child.args, "http-push");
1057 argv_array_push(&child.args, "--helper-status");
ae4efe19 1058 if (options.dry_run)
850d2fec 1059 argv_array_push(&child.args, "--dry-run");
ae4efe19 1060 if (options.verbosity > 1)
850d2fec
JK
1061 argv_array_push(&child.args, "--verbose");
1062 argv_array_push(&child.args, url.buf);
ae4efe19 1063 for (i = 0; i < nr_spec; i++)
850d2fec 1064 argv_array_push(&child.args, specs[i]);
ae4efe19 1065
850d2fec
JK
1066 if (run_command(&child))
1067 die("git-http-push failed");
ae4efe19
SP
1068 return 0;
1069}
1070
de1a2fdd
SP
1071static int push_git(struct discovery *heads, int nr_spec, char **specs)
1072{
1073 struct rpc_state rpc;
222b1212
JH
1074 int i, err;
1075 struct argv_array args;
05c1eb10 1076 struct string_list_item *cas_option;
26be19ba 1077 struct strbuf preamble = STRBUF_INIT;
222b1212
JH
1078
1079 argv_array_init(&args);
1080 argv_array_pushl(&args, "send-pack", "--stateless-rpc", "--helper-status",
1081 NULL);
de1a2fdd 1082
de1a2fdd 1083 if (options.thin)
222b1212 1084 argv_array_push(&args, "--thin");
de1a2fdd 1085 if (options.dry_run)
222b1212 1086 argv_array_push(&args, "--dry-run");
30261094
DB
1087 if (options.push_cert == SEND_PACK_PUSH_CERT_ALWAYS)
1088 argv_array_push(&args, "--signed=yes");
1089 else if (options.push_cert == SEND_PACK_PUSH_CERT_IF_ASKED)
1090 argv_array_push(&args, "--signed=if-asked");
c207e34f 1091 if (options.verbosity == 0)
222b1212 1092 argv_array_push(&args, "--quiet");
c207e34f 1093 else if (options.verbosity > 1)
222b1212 1094 argv_array_push(&args, "--verbose");
511155db
BW
1095 for (i = 0; i < options.push_options.nr; i++)
1096 argv_array_pushf(&args, "--push-option=%s",
1097 options.push_options.items[i].string);
222b1212 1098 argv_array_push(&args, options.progress ? "--progress" : "--no-progress");
05c1eb10 1099 for_each_string_list_item(cas_option, &cas_options)
2233ad45 1100 argv_array_push(&args, cas_option->string);
b227bbc4 1101 argv_array_push(&args, url.buf);
26be19ba
JK
1102
1103 argv_array_push(&args, "--stdin");
de1a2fdd 1104 for (i = 0; i < nr_spec; i++)
26be19ba
JK
1105 packet_buf_write(&preamble, "%s\n", specs[i]);
1106 packet_buf_flush(&preamble);
de1a2fdd
SP
1107
1108 memset(&rpc, 0, sizeof(rpc));
1109 rpc.service_name = "git-receive-pack",
de1a2fdd 1110
5d916693 1111 err = rpc_service(&rpc, heads, args.argv, &preamble);
de1a2fdd 1112 if (rpc.result.len)
cdf4fb8e 1113 write_or_die(1, rpc.result.buf, rpc.result.len);
de1a2fdd 1114 strbuf_release(&rpc.result);
26be19ba 1115 strbuf_release(&preamble);
222b1212 1116 argv_array_clear(&args);
de1a2fdd
SP
1117 return err;
1118}
1119
1120static int push(int nr_spec, char **specs)
1121{
2a455202 1122 struct discovery *heads = discover_refs("git-receive-pack", 1);
de1a2fdd
SP
1123 int ret;
1124
1125 if (heads->proto_git)
1126 ret = push_git(heads, nr_spec, specs);
1127 else
1128 ret = push_dav(nr_spec, specs);
1129 free_discovery(heads);
1130 return ret;
1131}
1132
ae4efe19
SP
1133static void parse_push(struct strbuf *buf)
1134{
1135 char **specs = NULL;
5238cbf6 1136 int alloc_spec = 0, nr_spec = 0, i, ret;
ae4efe19
SP
1137
1138 do {
59556548 1139 if (starts_with(buf->buf, "push ")) {
ae4efe19
SP
1140 ALLOC_GROW(specs, nr_spec + 1, alloc_spec);
1141 specs[nr_spec++] = xstrdup(buf->buf + 5);
1142 }
1143 else
1144 die("http transport does not support %s", buf->buf);
1145
1146 strbuf_reset(buf);
8f309aeb 1147 if (strbuf_getline_lf(buf, stdin) == EOF)
dc4cd767 1148 goto free_specs;
ae4efe19
SP
1149 if (!*buf->buf)
1150 break;
1151 } while (1);
1152
5238cbf6 1153 ret = push(nr_spec, specs);
ae4efe19
SP
1154 printf("\n");
1155 fflush(stdout);
dc4cd767 1156
5238cbf6
SP
1157 if (ret)
1158 exit(128); /* error already reported */
1159
dc4cd767
JM
1160 free_specs:
1161 for (i = 0; i < nr_spec; i++)
1162 free(specs[i]);
1163 free(specs);
ae4efe19
SP
1164}
1165
0f1dc53f
BW
1166/*
1167 * Used to represent the state of a connection to an HTTP server when
1168 * communicating using git's wire-protocol version 2.
1169 */
1170struct proxy_state {
1171 char *service_name;
1172 char *service_url;
1173 struct curl_slist *headers;
1174 struct strbuf request_buffer;
1175 int in;
1176 int out;
1177 struct packet_reader reader;
1178 size_t pos;
1179 int seen_flush;
1180};
1181
1182static void proxy_state_init(struct proxy_state *p, const char *service_name,
1183 enum protocol_version version)
1184{
1185 struct strbuf buf = STRBUF_INIT;
1186
1187 memset(p, 0, sizeof(*p));
1188 p->service_name = xstrdup(service_name);
1189
1190 p->in = 0;
1191 p->out = 1;
1192 strbuf_init(&p->request_buffer, 0);
1193
1194 strbuf_addf(&buf, "%s%s", url.buf, p->service_name);
1195 p->service_url = strbuf_detach(&buf, NULL);
1196
1197 p->headers = http_copy_default_headers();
1198
1199 strbuf_addf(&buf, "Content-Type: application/x-%s-request", p->service_name);
1200 p->headers = curl_slist_append(p->headers, buf.buf);
1201 strbuf_reset(&buf);
1202
1203 strbuf_addf(&buf, "Accept: application/x-%s-result", p->service_name);
1204 p->headers = curl_slist_append(p->headers, buf.buf);
1205 strbuf_reset(&buf);
1206
1207 p->headers = curl_slist_append(p->headers, "Transfer-Encoding: chunked");
1208
1209 /* Add the Git-Protocol header */
1210 if (get_protocol_http_header(version, &buf))
1211 p->headers = curl_slist_append(p->headers, buf.buf);
1212
1213 packet_reader_init(&p->reader, p->in, NULL, 0,
2d103c31
MS
1214 PACKET_READ_GENTLE_ON_EOF |
1215 PACKET_READ_DIE_ON_ERR_PACKET);
0f1dc53f
BW
1216
1217 strbuf_release(&buf);
1218}
1219
1220static void proxy_state_clear(struct proxy_state *p)
1221{
1222 free(p->service_name);
1223 free(p->service_url);
1224 curl_slist_free_all(p->headers);
1225 strbuf_release(&p->request_buffer);
1226}
1227
1228/*
1229 * CURLOPT_READFUNCTION callback function.
1230 * Attempts to copy over a single packet-line at a time into the
1231 * curl provided buffer.
1232 */
1233static size_t proxy_in(char *buffer, size_t eltsize,
1234 size_t nmemb, void *userdata)
1235{
1236 size_t max;
1237 struct proxy_state *p = userdata;
1238 size_t avail = p->request_buffer.len - p->pos;
1239
1240
1241 if (eltsize != 1)
1242 BUG("curl read callback called with size = %"PRIuMAX" != 1",
1243 (uintmax_t)eltsize);
1244 max = nmemb;
1245
1246 if (!avail) {
1247 if (p->seen_flush) {
1248 p->seen_flush = 0;
1249 return 0;
1250 }
1251
1252 strbuf_reset(&p->request_buffer);
1253 switch (packet_reader_read(&p->reader)) {
1254 case PACKET_READ_EOF:
1255 die("unexpected EOF when reading from parent process");
1256 case PACKET_READ_NORMAL:
1257 packet_buf_write_len(&p->request_buffer, p->reader.line,
1258 p->reader.pktlen);
1259 break;
1260 case PACKET_READ_DELIM:
1261 packet_buf_delim(&p->request_buffer);
1262 break;
1263 case PACKET_READ_FLUSH:
1264 packet_buf_flush(&p->request_buffer);
1265 p->seen_flush = 1;
1266 break;
1267 }
1268 p->pos = 0;
1269 avail = p->request_buffer.len;
1270 }
1271
1272 if (max < avail)
1273 avail = max;
1274 memcpy(buffer, p->request_buffer.buf + p->pos, avail);
1275 p->pos += avail;
1276 return avail;
1277}
1278
1279static size_t proxy_out(char *buffer, size_t eltsize,
1280 size_t nmemb, void *userdata)
1281{
1282 size_t size;
1283 struct proxy_state *p = userdata;
1284
1285 if (eltsize != 1)
1286 BUG("curl read callback called with size = %"PRIuMAX" != 1",
1287 (uintmax_t)eltsize);
1288 size = nmemb;
1289
1290 write_or_die(p->out, buffer, size);
1291 return size;
1292}
1293
1294/* Issues a request to the HTTP server configured in `p` */
1295static int proxy_request(struct proxy_state *p)
1296{
1297 struct active_request_slot *slot;
1298
1299 slot = get_active_slot();
1300
eaf6a1b6 1301 curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "");
0f1dc53f
BW
1302 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
1303 curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
1304 curl_easy_setopt(slot->curl, CURLOPT_URL, p->service_url);
1305 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, p->headers);
1306
1307 /* Setup function to read request from client */
1308 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, proxy_in);
1309 curl_easy_setopt(slot->curl, CURLOPT_READDATA, p);
1310
1311 /* Setup function to write server response to client */
1312 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, proxy_out);
1313 curl_easy_setopt(slot->curl, CURLOPT_WRITEDATA, p);
1314
1315 if (run_slot(slot, NULL) != HTTP_OK)
1316 return -1;
1317
1318 return 0;
1319}
1320
1321static int stateless_connect(const char *service_name)
1322{
1323 struct discovery *discover;
1324 struct proxy_state p;
1325
1326 /*
1327 * Run the info/refs request and see if the server supports protocol
1328 * v2. If and only if the server supports v2 can we successfully
1329 * establish a stateless connection, otherwise we need to tell the
1330 * client to fallback to using other transport helper functions to
1331 * complete their request.
1332 */
1333 discover = discover_refs(service_name, 0);
1334 if (discover->version != protocol_v2) {
1335 printf("fallback\n");
1336 fflush(stdout);
1337 return -1;
1338 } else {
1339 /* Stateless Connection established */
1340 printf("\n");
1341 fflush(stdout);
1342 }
1343
1344 proxy_state_init(&p, service_name, discover->version);
1345
1346 /*
1347 * Dump the capability listing that we got from the server earlier
1348 * during the info/refs request.
1349 */
1350 write_or_die(p.out, discover->buf, discover->len);
1351
1352 /* Peek the next packet line. Until we see EOF keep sending POSTs */
1353 while (packet_reader_peek(&p.reader) != PACKET_READ_EOF) {
1354 if (proxy_request(&p)) {
1355 /* We would have an err here */
1356 break;
1357 }
1358 }
1359
1360 proxy_state_clear(&p);
1361 return 0;
1362}
1363
3f2e2297 1364int cmd_main(int argc, const char **argv)
a2d725b7 1365{
a2d725b7 1366 struct strbuf buf = STRBUF_INIT;
a45d3d7e 1367 int nongit;
a2d725b7 1368
a45d3d7e 1369 setup_git_directory_gently(&nongit);
a2d725b7 1370 if (argc < 2) {
cdaa4e98 1371 error("remote-curl: usage: git remote-curl <remote> [<url>]");
a2d725b7
DB
1372 return 1;
1373 }
1374
ef08ef9e
SP
1375 options.verbosity = 1;
1376 options.progress = !!isatty(2);
de1a2fdd 1377 options.thin = 1;
a45a2600 1378 string_list_init(&options.deepen_not, 1);
511155db 1379 string_list_init(&options.push_options, 1);
ef08ef9e 1380
a2d725b7
DB
1381 remote = remote_get(argv[1]);
1382
1383 if (argc > 2) {
b227bbc4 1384 end_url_with_slash(&url, argv[2]);
a2d725b7 1385 } else {
b227bbc4 1386 end_url_with_slash(&url, remote->url[0]);
a2d725b7
DB
1387 }
1388
b227bbc4 1389 http_init(remote, url.buf, 0);
888692b7 1390
a2d725b7 1391 do {
95b567c7
JK
1392 const char *arg;
1393
8f309aeb 1394 if (strbuf_getline_lf(&buf, stdin) == EOF) {
1843f0ce 1395 if (ferror(stdin))
cdaa4e98 1396 error("remote-curl: error reading command stream from git");
1843f0ce
SR
1397 return 1;
1398 }
1399 if (buf.len == 0)
a2d725b7 1400 break;
59556548 1401 if (starts_with(buf.buf, "fetch ")) {
a45d3d7e 1402 if (nongit)
cdaa4e98 1403 die("remote-curl: fetch attempted without a local repo");
292ce46b
SP
1404 parse_fetch(&buf);
1405
59556548 1406 } else if (!strcmp(buf.buf, "list") || starts_with(buf.buf, "list ")) {
97cc7bc4
SP
1407 int for_push = !!strstr(buf.buf + 4, "for-push");
1408 output_refs(get_refs(for_push));
ae4efe19 1409
59556548 1410 } else if (starts_with(buf.buf, "push ")) {
ae4efe19
SP
1411 parse_push(&buf);
1412
95b567c7
JK
1413 } else if (skip_prefix(buf.buf, "option ", &arg)) {
1414 char *value = strchr(arg, ' ');
ef08ef9e
SP
1415 int result;
1416
1417 if (value)
1418 *value++ = '\0';
1419 else
1420 value = "true";
1421
95b567c7 1422 result = set_option(arg, value);
ef08ef9e
SP
1423 if (!result)
1424 printf("ok\n");
1425 else if (result < 0)
1426 printf("error invalid value\n");
1427 else
1428 printf("unsupported\n");
a2d725b7 1429 fflush(stdout);
ef08ef9e 1430
a2d725b7 1431 } else if (!strcmp(buf.buf, "capabilities")) {
0f1dc53f 1432 printf("stateless-connect\n");
a2d725b7 1433 printf("fetch\n");
ef08ef9e 1434 printf("option\n");
ae4efe19 1435 printf("push\n");
9ba38048 1436 printf("check-connectivity\n");
a2d725b7
DB
1437 printf("\n");
1438 fflush(stdout);
0f1dc53f
BW
1439 } else if (skip_prefix(buf.buf, "stateless-connect ", &arg)) {
1440 if (!stateless_connect(arg))
1441 break;
a2d725b7 1442 } else {
cdaa4e98 1443 error("remote-curl: unknown command '%s' from git", buf.buf);
a2d725b7
DB
1444 return 1;
1445 }
1446 strbuf_reset(&buf);
1447 } while (1);
888692b7
TRC
1448
1449 http_cleanup();
1450
a2d725b7
DB
1451 return 0;
1452}