http-push: Normalise directory names when pushing to some WebDAV servers
[git/git.git] / http-push.c
CommitLineData
58e60dd2
NH
1#include "cache.h"
2#include "commit.h"
58e60dd2
NH
3#include "tag.h"
4#include "blob.h"
29508e1e 5#include "http.h"
aa1dbc98 6#include "refs.h"
c4e05b1a 7#include "diff.h"
aa1dbc98 8#include "revision.h"
3dfaf7bc 9#include "exec_cmd.h"
6b62816c 10#include "remote.h"
d633c882 11#include "list-objects.h"
4a16d072 12#include "sigchain.h"
29508e1e 13
bee8e79d 14#include <expat.h>
58e60dd2
NH
15
16static const char http_push_usage[] =
1b1dd23f 17"git http-push [--all] [--dry-run] [--force] [--verbose] <remote> [<head>...]\n";
58e60dd2 18
92e2eb9c
JS
19#ifndef XML_STATUS_OK
20enum XML_Status {
21 XML_STATUS_OK = 1,
22 XML_STATUS_ERROR = 0
23};
24#define XML_STATUS_OK 1
25#define XML_STATUS_ERROR 0
26#endif
27
197e8951 28#define PREV_BUF_SIZE 4096
58e60dd2 29
acf59575 30/* DAV methods */
58e60dd2
NH
31#define DAV_LOCK "LOCK"
32#define DAV_MKCOL "MKCOL"
33#define DAV_MOVE "MOVE"
34#define DAV_PROPFIND "PROPFIND"
35#define DAV_PUT "PUT"
36#define DAV_UNLOCK "UNLOCK"
3dfaf7bc 37#define DAV_DELETE "DELETE"
acf59575
NH
38
39/* DAV lock flags */
40#define DAV_PROP_LOCKWR (1u << 0)
41#define DAV_PROP_LOCKEX (1u << 1)
42#define DAV_LOCK_OK (1u << 2)
43
44/* DAV XML properties */
45#define DAV_CTX_LOCKENTRY ".multistatus.response.propstat.prop.supportedlock.lockentry"
46#define DAV_CTX_LOCKTYPE_WRITE ".multistatus.response.propstat.prop.supportedlock.lockentry.locktype.write"
47#define DAV_CTX_LOCKTYPE_EXCLUSIVE ".multistatus.response.propstat.prop.supportedlock.lockentry.lockscope.exclusive"
48#define DAV_ACTIVELOCK_OWNER ".prop.lockdiscovery.activelock.owner.href"
49#define DAV_ACTIVELOCK_TIMEOUT ".prop.lockdiscovery.activelock.timeout"
50#define DAV_ACTIVELOCK_TOKEN ".prop.lockdiscovery.activelock.locktoken.href"
aa1dbc98
NH
51#define DAV_PROPFIND_RESP ".multistatus.response"
52#define DAV_PROPFIND_NAME ".multistatus.response.href"
53#define DAV_PROPFIND_COLLECTION ".multistatus.response.propstat.prop.resourcetype.collection"
acf59575
NH
54
55/* DAV request body templates */
aa1dbc98
NH
56#define PROPFIND_SUPPORTEDLOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:prop xmlns:R=\"%s\">\n<D:supportedlock/>\n</D:prop>\n</D:propfind>"
57#define PROPFIND_ALL_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:allprop/>\n</D:propfind>"
58e60dd2
NH
58#define LOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:lockinfo xmlns:D=\"DAV:\">\n<D:lockscope><D:exclusive/></D:lockscope>\n<D:locktype><D:write/></D:locktype>\n<D:owner>\n<D:href>mailto:%s</D:href>\n</D:owner>\n</D:lockinfo>"
59
75187c9d
NH
60#define LOCK_TIME 600
61#define LOCK_REFRESH 30
62
1b65a5aa 63/* bits #0-15 in revision.h */
aa1dbc98 64
1b65a5aa
JH
65#define LOCAL (1u<<16)
66#define REMOTE (1u<<17)
67#define FETCHING (1u<<18)
68#define PUSHING (1u<<19)
aa1dbc98 69
3dfaf7bc
NH
70/* We allow "recursive" symbolic refs. Only within reason, though */
71#define MAXDEPTH 5
72
96f1e58f
DR
73static int pushing;
74static int aborted;
a3c57c9a 75static signed char remote_dir_exists[256];
58e60dd2 76
96f1e58f 77static int push_verbosely;
28b9d6e5 78static int push_all = MATCH_REFS_NONE;
96f1e58f 79static int force_all;
fe5d1d3e 80static int dry_run;
ae4efe19 81static int helper_status;
58e60dd2 82
96f1e58f 83static struct object_list *objects;
aa1dbc98 84
58e60dd2
NH
85struct repo
86{
87 char *url;
e1f33efe 88 char *path;
aa1dbc98 89 int path_len;
197e8951
NH
90 int has_info_refs;
91 int can_update_info_refs;
92 int has_info_packs;
58e60dd2 93 struct packed_git *packs;
512d632c 94 struct remote_lock *locks;
58e60dd2
NH
95};
96
7b5201a6 97static struct repo *repo;
58e60dd2
NH
98
99enum transfer_state {
197e8951
NH
100 NEED_FETCH,
101 RUN_FETCH_LOOSE,
102 RUN_FETCH_PACKED,
58e60dd2
NH
103 NEED_PUSH,
104 RUN_MKCOL,
105 RUN_PUT,
106 RUN_MOVE,
107 ABORTED,
4b05548f 108 COMPLETE
58e60dd2
NH
109};
110
111struct transfer_request
112{
aa1dbc98 113 struct object *obj;
58e60dd2
NH
114 char *url;
115 char *dest;
aa1dbc98 116 struct remote_lock *lock;
58e60dd2
NH
117 struct curl_slist *headers;
118 struct buffer buffer;
58e60dd2
NH
119 enum transfer_state state;
120 CURLcode curl_result;
121 char errorstr[CURL_ERROR_SIZE];
122 long http_code;
197e8951 123 void *userData;
58e60dd2
NH
124 struct active_request_slot *slot;
125 struct transfer_request *next;
126};
127
96f1e58f 128static struct transfer_request *request_queue_head;
58e60dd2 129
acf59575
NH
130struct xml_ctx
131{
132 char *name;
133 int len;
134 char *cdata;
135 void (*userFunc)(struct xml_ctx *ctx, int tag_closed);
136 void *userData;
137};
138
aa1dbc98 139struct remote_lock
26349b2e 140{
75187c9d 141 char *url;
26349b2e 142 char *owner;
75187c9d 143 char *token;
dfab7c14 144 char tmpfile_suffix[41];
26349b2e
NH
145 time_t start_time;
146 long timeout;
75187c9d 147 int refreshing;
aa1dbc98
NH
148 struct remote_lock *next;
149};
150
3030baa7
NH
151/* Flags that control remote_ls processing */
152#define PROCESS_FILES (1u << 0)
153#define PROCESS_DIRS (1u << 1)
154#define RECURSIVE (1u << 2)
155
156/* Flags that remote_ls passes to callback functions */
157#define IS_DIR (1u << 0)
158
159struct remote_ls_ctx
aa1dbc98 160{
3030baa7
NH
161 char *path;
162 void (*userFunc)(struct remote_ls_ctx *ls);
163 void *userData;
164 int flags;
165 char *dentry_name;
166 int dentry_flags;
167 struct remote_ls_ctx *parent;
26349b2e
NH
168};
169
b1c7d4aa
TRC
170/* get_dav_token_headers options */
171enum dav_header_flag {
172 DAV_HEADER_IF = (1u << 0),
173 DAV_HEADER_LOCK = (1u << 1),
174 DAV_HEADER_TIMEOUT = (1u << 2)
175};
176
519d05be
MH
177static char *xml_entities(char *s)
178{
179 struct strbuf buf = STRBUF_INIT;
180 while (*s) {
181 size_t len = strcspn(s, "\"<>&");
182 strbuf_add(&buf, s, len);
183 s += len;
184 switch (*s) {
185 case '"':
186 strbuf_addstr(&buf, "&quot;");
187 break;
188 case '<':
189 strbuf_addstr(&buf, "&lt;");
190 break;
191 case '>':
192 strbuf_addstr(&buf, "&gt;");
193 break;
194 case '&':
195 strbuf_addstr(&buf, "&amp;");
196 break;
c8400d9e
HS
197 case 0:
198 return strbuf_detach(&buf, NULL);
519d05be
MH
199 }
200 s++;
201 }
202 return strbuf_detach(&buf, NULL);
203}
204
d456c9fd
JH
205static struct curl_slist *get_dav_token_headers(struct remote_lock *lock, enum dav_header_flag options)
206{
b1c7d4aa
TRC
207 struct strbuf buf = STRBUF_INIT;
208 struct curl_slist *dav_headers = NULL;
209
d456c9fd 210 if (options & DAV_HEADER_IF) {
b1c7d4aa
TRC
211 strbuf_addf(&buf, "If: (<%s>)", lock->token);
212 dav_headers = curl_slist_append(dav_headers, buf.buf);
213 strbuf_reset(&buf);
214 }
d456c9fd 215 if (options & DAV_HEADER_LOCK) {
b1c7d4aa
TRC
216 strbuf_addf(&buf, "Lock-Token: <%s>", lock->token);
217 dav_headers = curl_slist_append(dav_headers, buf.buf);
218 strbuf_reset(&buf);
219 }
d456c9fd 220 if (options & DAV_HEADER_TIMEOUT) {
b1c7d4aa
TRC
221 strbuf_addf(&buf, "Timeout: Second-%ld", lock->timeout);
222 dav_headers = curl_slist_append(dav_headers, buf.buf);
223 strbuf_reset(&buf);
224 }
225 strbuf_release(&buf);
226
227 return dav_headers;
228}
229
29508e1e 230static void finish_request(struct transfer_request *request);
197e8951 231static void release_request(struct transfer_request *request);
58e60dd2 232
29508e1e 233static void process_response(void *callback_data)
58e60dd2 234{
29508e1e
NH
235 struct transfer_request *request =
236 (struct transfer_request *)callback_data;
58e60dd2 237
29508e1e 238 finish_request(request);
58e60dd2
NH
239}
240
dd8239f9 241#ifdef USE_CURL_MULTI
dcdb3335 242
197e8951
NH
243static void start_fetch_loose(struct transfer_request *request)
244{
197e8951 245 struct active_request_slot *slot;
5424bc55 246 struct http_object_request *obj_req;
197e8951 247
5424bc55
TRC
248 obj_req = new_http_object_request(repo->url, request->obj->sha1);
249 if (obj_req == NULL) {
197e8951 250 request->state = ABORTED;
197e8951
NH
251 return;
252 }
253
5424bc55 254 slot = obj_req->slot;
197e8951
NH
255 slot->callback_func = process_response;
256 slot->callback_data = request;
257 request->slot = slot;
5424bc55 258 request->userData = obj_req;
197e8951
NH
259
260 /* Try to get the request started, abort the request on error */
261 request->state = RUN_FETCH_LOOSE;
262 if (!start_active_slot(slot)) {
263 fprintf(stderr, "Unable to start GET request\n");
7b5201a6 264 repo->can_update_info_refs = 0;
5424bc55 265 release_http_object_request(obj_req);
197e8951
NH
266 release_request(request);
267 }
268}
269
dd8239f9
JH
270static void start_mkcol(struct transfer_request *request)
271{
272 char *hex = sha1_to_hex(request->obj->sha1);
273 struct active_request_slot *slot;
dd8239f9 274
7b5201a6 275 request->url = get_remote_object_url(repo->url, hex, 1);
dd8239f9
JH
276
277 slot = get_active_slot();
278 slot->callback_func = process_response;
279 slot->callback_data = request;
280 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
281 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
282 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
283 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
284 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
285
286 if (start_active_slot(slot)) {
287 request->slot = slot;
288 request->state = RUN_MKCOL;
289 } else {
290 request->state = ABORTED;
291 free(request->url);
292 request->url = NULL;
293 }
294}
295#endif
296
197e8951
NH
297static void start_fetch_packed(struct transfer_request *request)
298{
197e8951 299 struct packed_git *target;
197e8951
NH
300
301 struct transfer_request *check_request = request_queue_head;
2264dfa5 302 struct http_pack_request *preq;
197e8951 303
7b5201a6 304 target = find_sha1_pack(request->obj->sha1, repo->packs);
197e8951
NH
305 if (!target) {
306 fprintf(stderr, "Unable to fetch %s, will not be able to update server info refs\n", sha1_to_hex(request->obj->sha1));
7b5201a6 307 repo->can_update_info_refs = 0;
197e8951
NH
308 release_request(request);
309 return;
310 }
311
312 fprintf(stderr, "Fetching pack %s\n", sha1_to_hex(target->sha1));
313 fprintf(stderr, " which contains %s\n", sha1_to_hex(request->obj->sha1));
314
2264dfa5
TRC
315 preq = new_http_pack_request(target, repo->url);
316 if (preq == NULL) {
317 release_http_pack_request(preq);
318 repo->can_update_info_refs = 0;
319 return;
320 }
321 preq->lst = &repo->packs;
197e8951
NH
322
323 /* Make sure there isn't another open request for this pack */
324 while (check_request) {
325 if (check_request->state == RUN_FETCH_PACKED &&
2264dfa5
TRC
326 !strcmp(check_request->url, preq->url)) {
327 release_http_pack_request(preq);
197e8951
NH
328 release_request(request);
329 return;
330 }
331 check_request = check_request->next;
332 }
333
2264dfa5
TRC
334 preq->slot->callback_func = process_response;
335 preq->slot->callback_data = request;
336 request->slot = preq->slot;
337 request->userData = preq;
197e8951
NH
338
339 /* Try to get the request started, abort the request on error */
340 request->state = RUN_FETCH_PACKED;
2264dfa5 341 if (!start_active_slot(preq->slot)) {
197e8951 342 fprintf(stderr, "Unable to start GET request\n");
2264dfa5 343 release_http_pack_request(preq);
7b5201a6 344 repo->can_update_info_refs = 0;
197e8951
NH
345 release_request(request);
346 }
347}
348
58e60dd2
NH
349static void start_put(struct transfer_request *request)
350{
aa1dbc98 351 char *hex = sha1_to_hex(request->obj->sha1);
58e60dd2 352 struct active_request_slot *slot;
817d14a8 353 struct strbuf buf = STRBUF_INIT;
21666f1a 354 enum object_type type;
58e60dd2
NH
355 char hdr[50];
356 void *unpacked;
357 unsigned long len;
358 int hdrlen;
359 ssize_t size;
360 z_stream stream;
361
21666f1a
NP
362 unpacked = read_sha1_file(request->obj->sha1, &type, &len);
363 hdrlen = sprintf(hdr, "%s %lu", typename(type), len) + 1;
58e60dd2
NH
364
365 /* Set it up */
366 memset(&stream, 0, sizeof(stream));
12f6c308 367 deflateInit(&stream, zlib_compression_level);
58e60dd2 368 size = deflateBound(&stream, len + hdrlen);
028c2976
MH
369 strbuf_init(&request->buffer.buf, size);
370 request->buffer.posn = 0;
58e60dd2
NH
371
372 /* Compress it */
028c2976 373 stream.next_out = (unsigned char *)request->buffer.buf.buf;
58e60dd2
NH
374 stream.avail_out = size;
375
376 /* First header.. */
377 stream.next_in = (void *)hdr;
378 stream.avail_in = hdrlen;
379 while (deflate(&stream, 0) == Z_OK)
380 /* nothing */;
381
382 /* Then the data itself.. */
383 stream.next_in = unpacked;
384 stream.avail_in = len;
385 while (deflate(&stream, Z_FINISH) == Z_OK)
386 /* nothing */;
387 deflateEnd(&stream);
388 free(unpacked);
389
028c2976 390 request->buffer.buf.len = stream.total_out;
58e60dd2 391
817d14a8 392 strbuf_addstr(&buf, "Destination: ");
7b5201a6 393 append_remote_object_url(&buf, repo->url, hex, 0);
817d14a8
TRC
394 request->dest = strbuf_detach(&buf, NULL);
395
7b5201a6 396 append_remote_object_url(&buf, repo->url, hex, 0);
dfab7c14 397 strbuf_add(&buf, request->lock->tmpfile_suffix, 41);
817d14a8 398 request->url = strbuf_detach(&buf, NULL);
58e60dd2
NH
399
400 slot = get_active_slot();
29508e1e
NH
401 slot->callback_func = process_response;
402 slot->callback_data = request;
58e60dd2 403 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &request->buffer);
028c2976 404 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, request->buffer.buf.len);
58e60dd2 405 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
3944ba0c
MS
406#ifndef NO_CURL_IOCTL
407 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, ioctl_buffer);
408 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, &request->buffer);
409#endif
58e60dd2 410 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
d21f9794 411 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
58e60dd2
NH
412 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
413 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
414 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
58e60dd2
NH
415 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
416
417 if (start_active_slot(slot)) {
418 request->slot = slot;
419 request->state = RUN_PUT;
420 } else {
421 request->state = ABORTED;
422 free(request->url);
7b899967 423 request->url = NULL;
58e60dd2
NH
424 }
425}
426
427static void start_move(struct transfer_request *request)
428{
429 struct active_request_slot *slot;
430 struct curl_slist *dav_headers = NULL;
431
432 slot = get_active_slot();
29508e1e
NH
433 slot->callback_func = process_response;
434 slot->callback_data = request;
58e60dd2
NH
435 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
436 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MOVE);
437 dav_headers = curl_slist_append(dav_headers, request->dest);
438 dav_headers = curl_slist_append(dav_headers, "Overwrite: T");
439 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
440 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
441 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
442
443 if (start_active_slot(slot)) {
444 request->slot = slot;
445 request->state = RUN_MOVE;
446 } else {
447 request->state = ABORTED;
448 free(request->url);
7b899967 449 request->url = NULL;
58e60dd2
NH
450 }
451}
452
512d632c 453static int refresh_lock(struct remote_lock *lock)
75187c9d
NH
454{
455 struct active_request_slot *slot;
baa7b67d 456 struct slot_results results;
b1c7d4aa 457 struct curl_slist *dav_headers;
512d632c 458 int rc = 0;
75187c9d 459
512d632c 460 lock->refreshing = 1;
75187c9d 461
b1c7d4aa 462 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF | DAV_HEADER_TIMEOUT);
75187c9d 463
512d632c
NH
464 slot = get_active_slot();
465 slot->results = &results;
466 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
467 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
468 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
469 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
470 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
75187c9d 471
512d632c
NH
472 if (start_active_slot(slot)) {
473 run_active_slot(slot);
474 if (results.curl_result != CURLE_OK) {
475 fprintf(stderr, "LOCK HTTP error %ld\n",
476 results.http_code);
477 } else {
478 lock->start_time = time(NULL);
479 rc = 1;
480 }
481 }
aa1dbc98 482
512d632c
NH
483 lock->refreshing = 0;
484 curl_slist_free_all(dav_headers);
aa1dbc98 485
512d632c
NH
486 return rc;
487}
488
ec26b4d6 489static void check_locks(void)
512d632c 490{
7b5201a6 491 struct remote_lock *lock = repo->locks;
512d632c
NH
492 time_t current_time = time(NULL);
493 int time_remaining;
494
495 while (lock) {
496 time_remaining = lock->start_time + lock->timeout -
497 current_time;
498 if (!lock->refreshing && time_remaining < LOCK_REFRESH) {
499 if (!refresh_lock(lock)) {
500 fprintf(stderr,
501 "Unable to refresh lock for %s\n",
502 lock->url);
503 aborted = 1;
504 return;
aa1dbc98 505 }
75187c9d 506 }
512d632c 507 lock = lock->next;
75187c9d 508 }
aa1dbc98 509}
75187c9d 510
aa1dbc98
NH
511static void release_request(struct transfer_request *request)
512{
513 struct transfer_request *entry = request_queue_head;
514
515 if (request == request_queue_head) {
516 request_queue_head = request->next;
517 } else {
518 while (entry->next != NULL && entry->next != request)
519 entry = entry->next;
520 if (entry->next == request)
521 entry->next = entry->next->next;
522 }
523
8e0f7003 524 free(request->url);
aa1dbc98 525 free(request);
75187c9d
NH
526}
527
58e60dd2
NH
528static void finish_request(struct transfer_request *request)
529{
2264dfa5 530 struct http_pack_request *preq;
5424bc55 531 struct http_object_request *obj_req;
197e8951
NH
532
533 request->curl_result = request->slot->curl_result;
58e60dd2
NH
534 request->http_code = request->slot->http_code;
535 request->slot = NULL;
75187c9d 536
aa1dbc98 537 /* Keep locks active */
512d632c 538 check_locks();
75187c9d 539
58e60dd2
NH
540 if (request->headers != NULL)
541 curl_slist_free_all(request->headers);
7b899967
NH
542
543 /* URL is reused for MOVE after PUT */
544 if (request->state != RUN_PUT) {
545 free(request->url);
546 request->url = NULL;
aa1dbc98 547 }
7b899967 548
aa1dbc98 549 if (request->state == RUN_MKCOL) {
58e60dd2
NH
550 if (request->curl_result == CURLE_OK ||
551 request->http_code == 405) {
aa1dbc98 552 remote_dir_exists[request->obj->sha1[0]] = 1;
58e60dd2
NH
553 start_put(request);
554 } else {
555 fprintf(stderr, "MKCOL %s failed, aborting (%d/%ld)\n",
aa1dbc98 556 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
557 request->curl_result, request->http_code);
558 request->state = ABORTED;
559 aborted = 1;
560 }
561 } else if (request->state == RUN_PUT) {
562 if (request->curl_result == CURLE_OK) {
563 start_move(request);
564 } else {
565 fprintf(stderr, "PUT %s failed, aborting (%d/%ld)\n",
aa1dbc98 566 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
567 request->curl_result, request->http_code);
568 request->state = ABORTED;
569 aborted = 1;
570 }
571 } else if (request->state == RUN_MOVE) {
572 if (request->curl_result == CURLE_OK) {
1a703cba
NH
573 if (push_verbosely)
574 fprintf(stderr, " sent %s\n",
575 sha1_to_hex(request->obj->sha1));
aa1dbc98
NH
576 request->obj->flags |= REMOTE;
577 release_request(request);
58e60dd2
NH
578 } else {
579 fprintf(stderr, "MOVE %s failed, aborting (%d/%ld)\n",
aa1dbc98 580 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
581 request->curl_result, request->http_code);
582 request->state = ABORTED;
583 aborted = 1;
584 }
197e8951 585 } else if (request->state == RUN_FETCH_LOOSE) {
5424bc55 586 obj_req = (struct http_object_request *)request->userData;
197e8951 587
5424bc55
TRC
588 if (finish_http_object_request(obj_req) == 0)
589 if (obj_req->rename == 0)
590 request->obj->flags |= (LOCAL | REMOTE);
197e8951
NH
591
592 /* Try fetching packed if necessary */
5424bc55
TRC
593 if (request->obj->flags & LOCAL) {
594 release_http_object_request(obj_req);
197e8951 595 release_request(request);
5424bc55 596 } else
197e8951
NH
597 start_fetch_packed(request);
598
599 } else if (request->state == RUN_FETCH_PACKED) {
2264dfa5 600 int fail = 1;
197e8951
NH
601 if (request->curl_result != CURLE_OK) {
602 fprintf(stderr, "Unable to get pack file %s\n%s",
603 request->url, curl_errorstr);
197e8951 604 } else {
2264dfa5
TRC
605 preq = (struct http_pack_request *)request->userData;
606
607 if (preq) {
609621a4 608 if (finish_http_pack_request(preq) == 0)
2264dfa5
TRC
609 fail = 0;
610 release_http_pack_request(preq);
197e8951
NH
611 }
612 }
2264dfa5
TRC
613 if (fail)
614 repo->can_update_info_refs = 0;
197e8951 615 release_request(request);
58e60dd2
NH
616 }
617}
618
b3ca4e4e 619#ifdef USE_CURL_MULTI
4f66250d 620static int is_running_queue;
fc57b6aa 621static int fill_active_slot(void *unused)
58e60dd2 622{
8e24cbae 623 struct transfer_request *request;
58e60dd2 624
4f66250d 625 if (aborted || !is_running_queue)
45c17412 626 return 0;
58e60dd2 627
45c17412 628 for (request = request_queue_head; request; request = request->next) {
197e8951
NH
629 if (request->state == NEED_FETCH) {
630 start_fetch_loose(request);
45c17412 631 return 1;
197e8951 632 } else if (pushing && request->state == NEED_PUSH) {
aa1dbc98 633 if (remote_dir_exists[request->obj->sha1[0]] == 1) {
0dd276b8 634 start_put(request);
aa1dbc98 635 } else {
0dd276b8 636 start_mkcol(request);
aa1dbc98 637 }
45c17412 638 return 1;
58e60dd2 639 }
aa1dbc98 640 }
45c17412 641 return 0;
58e60dd2 642}
b3ca4e4e 643#endif
58e60dd2 644
aa1dbc98
NH
645static void get_remote_object_list(unsigned char parent);
646
197e8951
NH
647static void add_fetch_request(struct object *obj)
648{
649 struct transfer_request *request;
650
651 check_locks();
652
653 /*
654 * Don't fetch the object if it's known to exist locally
655 * or is already in the request queue
656 */
657 if (remote_dir_exists[obj->sha1[0]] == -1)
658 get_remote_object_list(obj->sha1[0]);
659 if (obj->flags & (LOCAL | FETCHING))
660 return;
661
662 obj->flags |= FETCHING;
663 request = xmalloc(sizeof(*request));
664 request->obj = obj;
665 request->url = NULL;
666 request->lock = NULL;
667 request->headers = NULL;
197e8951
NH
668 request->state = NEED_FETCH;
669 request->next = request_queue_head;
670 request_queue_head = request;
671
b3ca4e4e 672#ifdef USE_CURL_MULTI
197e8951
NH
673 fill_active_slots();
674 step_active_slots();
b3ca4e4e 675#endif
197e8951
NH
676}
677
1a703cba 678static int add_send_request(struct object *obj, struct remote_lock *lock)
58e60dd2
NH
679{
680 struct transfer_request *request = request_queue_head;
58e60dd2 681 struct packed_git *target;
58e60dd2 682
512d632c
NH
683 /* Keep locks active */
684 check_locks();
685
aa1dbc98
NH
686 /*
687 * Don't push the object if it's known to exist on the remote
688 * or is already in the request queue
689 */
690 if (remote_dir_exists[obj->sha1[0]] == -1)
691 get_remote_object_list(obj->sha1[0]);
692 if (obj->flags & (REMOTE | PUSHING))
1a703cba 693 return 0;
7b5201a6 694 target = find_sha1_pack(obj->sha1, repo->packs);
aa1dbc98
NH
695 if (target) {
696 obj->flags |= REMOTE;
1a703cba 697 return 0;
aa1dbc98 698 }
58e60dd2 699
aa1dbc98 700 obj->flags |= PUSHING;
58e60dd2 701 request = xmalloc(sizeof(*request));
aa1dbc98 702 request->obj = obj;
58e60dd2 703 request->url = NULL;
26349b2e 704 request->lock = lock;
58e60dd2 705 request->headers = NULL;
aa1dbc98 706 request->state = NEED_PUSH;
c17fb6ee
NH
707 request->next = request_queue_head;
708 request_queue_head = request;
29508e1e 709
b3ca4e4e 710#ifdef USE_CURL_MULTI
29508e1e
NH
711 fill_active_slots();
712 step_active_slots();
b3ca4e4e 713#endif
1a703cba
NH
714
715 return 1;
58e60dd2
NH
716}
717
f4f440a0 718static int fetch_indices(void)
58e60dd2 719{
b8caac2b 720 int ret;
58e60dd2 721
58e60dd2
NH
722 if (push_verbosely)
723 fprintf(stderr, "Getting pack list\n");
1a703cba 724
b8caac2b
TRC
725 switch (http_get_info_packs(repo->url, &repo->packs)) {
726 case HTTP_OK:
727 case HTTP_MISSING_TARGET:
728 ret = 0;
729 break;
730 default:
731 ret = -1;
58e60dd2
NH
732 }
733
b8caac2b 734 return ret;
58e60dd2
NH
735}
736
aa1dbc98
NH
737static void one_remote_object(const char *hex)
738{
739 unsigned char sha1[20];
740 struct object *obj;
741
742 if (get_sha1_hex(hex, sha1) != 0)
743 return;
744
745 obj = lookup_object(sha1);
746 if (!obj)
747 obj = parse_object(sha1);
748
749 /* Ignore remote objects that don't exist locally */
750 if (!obj)
751 return;
752
753 obj->flags |= REMOTE;
754 if (!object_list_contains(objects, obj))
1f1e895f 755 object_list_insert(obj, &objects);
aa1dbc98
NH
756}
757
acf59575 758static void handle_lockprop_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 759{
acf59575
NH
760 int *lock_flags = (int *)ctx->userData;
761
762 if (tag_closed) {
763 if (!strcmp(ctx->name, DAV_CTX_LOCKENTRY)) {
764 if ((*lock_flags & DAV_PROP_LOCKEX) &&
765 (*lock_flags & DAV_PROP_LOCKWR)) {
766 *lock_flags |= DAV_LOCK_OK;
767 }
768 *lock_flags &= DAV_LOCK_OK;
769 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_WRITE)) {
770 *lock_flags |= DAV_PROP_LOCKWR;
771 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_EXCLUSIVE)) {
772 *lock_flags |= DAV_PROP_LOCKEX;
773 }
774 }
26349b2e
NH
775}
776
acf59575 777static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 778{
aa1dbc98 779 struct remote_lock *lock = (struct remote_lock *)ctx->userData;
dfab7c14
TRC
780 git_SHA_CTX sha_ctx;
781 unsigned char lock_token_sha1[20];
acf59575
NH
782
783 if (tag_closed && ctx->cdata) {
784 if (!strcmp(ctx->name, DAV_ACTIVELOCK_OWNER)) {
785 lock->owner = xmalloc(strlen(ctx->cdata) + 1);
786 strcpy(lock->owner, ctx->cdata);
787 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TIMEOUT)) {
cc44c765 788 if (!prefixcmp(ctx->cdata, "Second-"))
acf59575
NH
789 lock->timeout =
790 strtol(ctx->cdata + 7, NULL, 10);
791 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
753bc911
KK
792 lock->token = xmalloc(strlen(ctx->cdata) + 1);
793 strcpy(lock->token, ctx->cdata);
dfab7c14
TRC
794
795 git_SHA1_Init(&sha_ctx);
796 git_SHA1_Update(&sha_ctx, lock->token, strlen(lock->token));
797 git_SHA1_Final(lock_token_sha1, &sha_ctx);
798
799 lock->tmpfile_suffix[0] = '_';
800 memcpy(lock->tmpfile_suffix + 1, sha1_to_hex(lock_token_sha1), 40);
acf59575 801 }
26349b2e
NH
802 }
803}
804
aa1dbc98 805static void one_remote_ref(char *refname);
aa1dbc98 806
26349b2e 807static void
acf59575 808xml_start_tag(void *userData, const char *name, const char **atts)
26349b2e 809{
acf59575 810 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 811 const char *c = strchr(name, ':');
acf59575
NH
812 int new_len;
813
814 if (c == NULL)
815 c = name;
816 else
817 c++;
818
819 new_len = strlen(ctx->name) + strlen(c) + 2;
820
821 if (new_len > ctx->len) {
822 ctx->name = xrealloc(ctx->name, new_len);
823 ctx->len = new_len;
26349b2e 824 }
acf59575
NH
825 strcat(ctx->name, ".");
826 strcat(ctx->name, c);
26349b2e 827
4cac42b1
JH
828 free(ctx->cdata);
829 ctx->cdata = NULL;
acf59575
NH
830
831 ctx->userFunc(ctx, 0);
26349b2e
NH
832}
833
58e60dd2 834static void
acf59575 835xml_end_tag(void *userData, const char *name)
58e60dd2 836{
acf59575 837 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 838 const char *c = strchr(name, ':');
acf59575 839 char *ep;
58e60dd2 840
acf59575
NH
841 ctx->userFunc(ctx, 1);
842
843 if (c == NULL)
844 c = name;
845 else
846 c++;
847
848 ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
849 *ep = 0;
58e60dd2
NH
850}
851
852static void
acf59575 853xml_cdata(void *userData, const XML_Char *s, int len)
58e60dd2 854{
acf59575 855 struct xml_ctx *ctx = (struct xml_ctx *)userData;
4cac42b1 856 free(ctx->cdata);
182af834 857 ctx->cdata = xmemdupz(s, len);
58e60dd2
NH
858}
859
554fe20d 860static struct remote_lock *lock_remote(const char *path, long timeout)
58e60dd2
NH
861{
862 struct active_request_slot *slot;
baa7b67d 863 struct slot_results results;
028c2976
MH
864 struct buffer out_buffer = { STRBUF_INIT, 0 };
865 struct strbuf in_buffer = STRBUF_INIT;
58e60dd2 866 char *url;
0772b9a6 867 char *ep;
58e60dd2 868 char timeout_header[25];
512d632c 869 struct remote_lock *lock = NULL;
58e60dd2 870 struct curl_slist *dav_headers = NULL;
acf59575 871 struct xml_ctx ctx;
519d05be 872 char *escaped;
58e60dd2 873
7b5201a6
AK
874 url = xmalloc(strlen(repo->url) + strlen(path) + 1);
875 sprintf(url, "%s%s", repo->url, path);
aa1dbc98 876
0772b9a6 877 /* Make sure leading directories exist for the remote ref */
7b5201a6 878 ep = strchr(url + strlen(repo->url) + 1, '/');
0772b9a6 879 while (ep) {
466ddf90
JS
880 char saved_character = ep[1];
881 ep[1] = '\0';
0772b9a6 882 slot = get_active_slot();
baa7b67d 883 slot->results = &results;
0772b9a6
NH
884 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
885 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
886 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
887 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
888 if (start_active_slot(slot)) {
889 run_active_slot(slot);
baa7b67d
NH
890 if (results.curl_result != CURLE_OK &&
891 results.http_code != 405) {
0772b9a6
NH
892 fprintf(stderr,
893 "Unable to create branch path %s\n",
894 url);
895 free(url);
896 return NULL;
897 }
898 } else {
1a703cba 899 fprintf(stderr, "Unable to start MKCOL request\n");
0772b9a6
NH
900 free(url);
901 return NULL;
902 }
466ddf90 903 ep[1] = saved_character;
0772b9a6
NH
904 ep = strchr(ep + 1, '/');
905 }
906
519d05be
MH
907 escaped = xml_entities(git_default_email);
908 strbuf_addf(&out_buffer.buf, LOCK_REQUEST, escaped);
909 free(escaped);
26349b2e 910
75187c9d 911 sprintf(timeout_header, "Timeout: Second-%ld", timeout);
58e60dd2
NH
912 dav_headers = curl_slist_append(dav_headers, timeout_header);
913 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
914
915 slot = get_active_slot();
baa7b67d 916 slot->results = &results;
58e60dd2 917 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 918 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2 919 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
3944ba0c
MS
920#ifndef NO_CURL_IOCTL
921 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, ioctl_buffer);
922 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, &out_buffer);
923#endif
26349b2e 924 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 925 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
926 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
927 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
928 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
929 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
930
aa1dbc98 931 lock = xcalloc(1, sizeof(*lock));
aa1dbc98 932 lock->timeout = -1;
acf59575 933
58e60dd2
NH
934 if (start_active_slot(slot)) {
935 run_active_slot(slot);
baa7b67d 936 if (results.curl_result == CURLE_OK) {
472b2570
MH
937 XML_Parser parser = XML_ParserCreate(NULL);
938 enum XML_Status result;
acf59575
NH
939 ctx.name = xcalloc(10, 1);
940 ctx.len = 0;
941 ctx.cdata = NULL;
942 ctx.userFunc = handle_new_lock_ctx;
aa1dbc98 943 ctx.userData = lock;
acf59575
NH
944 XML_SetUserData(parser, &ctx);
945 XML_SetElementHandler(parser, xml_start_tag,
946 xml_end_tag);
947 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
948 result = XML_Parse(parser, in_buffer.buf,
949 in_buffer.len, 1);
acf59575
NH
950 free(ctx.name);
951 if (result != XML_STATUS_OK) {
952 fprintf(stderr, "XML error: %s\n",
953 XML_ErrorString(
954 XML_GetErrorCode(parser)));
aa1dbc98 955 lock->timeout = -1;
acf59575 956 }
472b2570 957 XML_ParserFree(parser);
58e60dd2
NH
958 }
959 } else {
1a703cba 960 fprintf(stderr, "Unable to start LOCK request\n");
58e60dd2
NH
961 }
962
acf59575 963 curl_slist_free_all(dav_headers);
028c2976
MH
964 strbuf_release(&out_buffer.buf);
965 strbuf_release(&in_buffer);
26349b2e 966
aa1dbc98 967 if (lock->token == NULL || lock->timeout <= 0) {
8e0f7003
JM
968 free(lock->token);
969 free(lock->owner);
75187c9d 970 free(url);
aa1dbc98
NH
971 free(lock);
972 lock = NULL;
acf59575 973 } else {
aa1dbc98 974 lock->url = url;
aa1dbc98 975 lock->start_time = time(NULL);
7b5201a6
AK
976 lock->next = repo->locks;
977 repo->locks = lock;
26349b2e
NH
978 }
979
aa1dbc98 980 return lock;
58e60dd2
NH
981}
982
aa1dbc98 983static int unlock_remote(struct remote_lock *lock)
58e60dd2
NH
984{
985 struct active_request_slot *slot;
baa7b67d 986 struct slot_results results;
7b5201a6 987 struct remote_lock *prev = repo->locks;
b1c7d4aa 988 struct curl_slist *dav_headers;
58e60dd2
NH
989 int rc = 0;
990
b1c7d4aa 991 dav_headers = get_dav_token_headers(lock, DAV_HEADER_LOCK);
58e60dd2
NH
992
993 slot = get_active_slot();
baa7b67d 994 slot->results = &results;
58e60dd2 995 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
75187c9d 996 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
997 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_UNLOCK);
998 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
999
1000 if (start_active_slot(slot)) {
1001 run_active_slot(slot);
baa7b67d 1002 if (results.curl_result == CURLE_OK)
58e60dd2
NH
1003 rc = 1;
1004 else
512d632c 1005 fprintf(stderr, "UNLOCK HTTP error %ld\n",
baa7b67d 1006 results.http_code);
58e60dd2 1007 } else {
512d632c 1008 fprintf(stderr, "Unable to start UNLOCK request\n");
58e60dd2
NH
1009 }
1010
1011 curl_slist_free_all(dav_headers);
75187c9d 1012
7b5201a6
AK
1013 if (repo->locks == lock) {
1014 repo->locks = lock->next;
512d632c
NH
1015 } else {
1016 while (prev && prev->next != lock)
1017 prev = prev->next;
1018 if (prev)
1019 prev->next = prev->next->next;
1020 }
1021
8e0f7003 1022 free(lock->owner);
512d632c
NH
1023 free(lock->url);
1024 free(lock->token);
1025 free(lock);
58e60dd2
NH
1026
1027 return rc;
1028}
1029
6a491a17
CB
1030static void remove_locks(void)
1031{
7b5201a6 1032 struct remote_lock *lock = repo->locks;
6a491a17
CB
1033
1034 fprintf(stderr, "Removing remote locks...\n");
1035 while (lock) {
6589ebf1 1036 struct remote_lock *next = lock->next;
6a491a17 1037 unlock_remote(lock);
6589ebf1 1038 lock = next;
6a491a17
CB
1039 }
1040}
1041
1042static void remove_locks_on_signal(int signo)
1043{
1044 remove_locks();
4a16d072 1045 sigchain_pop(signo);
6a491a17
CB
1046 raise(signo);
1047}
1048
3030baa7
NH
1049static void remote_ls(const char *path, int flags,
1050 void (*userFunc)(struct remote_ls_ctx *ls),
1051 void *userData);
aa1dbc98 1052
3030baa7
NH
1053static void process_ls_object(struct remote_ls_ctx *ls)
1054{
1055 unsigned int *parent = (unsigned int *)ls->userData;
1056 char *path = ls->dentry_name;
1057 char *obj_hex;
aa1dbc98 1058
3030baa7
NH
1059 if (!strcmp(ls->path, ls->dentry_name) && (ls->flags & IS_DIR)) {
1060 remote_dir_exists[*parent] = 1;
1061 return;
1062 }
aa1dbc98 1063
3030baa7
NH
1064 if (strlen(path) != 49)
1065 return;
1066 path += 8;
1067 obj_hex = xmalloc(strlen(path));
eecc8367
ER
1068 /* NB: path is not null-terminated, can not use strlcpy here */
1069 memcpy(obj_hex, path, 2);
3030baa7
NH
1070 strcpy(obj_hex + 2, path + 3);
1071 one_remote_object(obj_hex);
1072 free(obj_hex);
1073}
aa1dbc98 1074
3030baa7
NH
1075static void process_ls_ref(struct remote_ls_ctx *ls)
1076{
1077 if (!strcmp(ls->path, ls->dentry_name) && (ls->dentry_flags & IS_DIR)) {
1078 fprintf(stderr, " %s\n", ls->dentry_name);
1079 return;
1080 }
aa1dbc98 1081
3030baa7
NH
1082 if (!(ls->dentry_flags & IS_DIR))
1083 one_remote_ref(ls->dentry_name);
1084}
aa1dbc98 1085
3030baa7
NH
1086static void handle_remote_ls_ctx(struct xml_ctx *ctx, int tag_closed)
1087{
1088 struct remote_ls_ctx *ls = (struct remote_ls_ctx *)ctx->userData;
aa1dbc98 1089
3030baa7
NH
1090 if (tag_closed) {
1091 if (!strcmp(ctx->name, DAV_PROPFIND_RESP) && ls->dentry_name) {
1092 if (ls->dentry_flags & IS_DIR) {
0fdadc50
TRC
1093
1094 /* ensure collection names end with slash */
1095 str_end_url_with_slash(ls->dentry_name, &ls->dentry_name);
1096
3030baa7
NH
1097 if (ls->flags & PROCESS_DIRS) {
1098 ls->userFunc(ls);
1099 }
1100 if (strcmp(ls->dentry_name, ls->path) &&
1101 ls->flags & RECURSIVE) {
1102 remote_ls(ls->dentry_name,
1103 ls->flags,
1104 ls->userFunc,
1105 ls->userData);
1106 }
1107 } else if (ls->flags & PROCESS_FILES) {
1108 ls->userFunc(ls);
aa1dbc98 1109 }
3030baa7 1110 } else if (!strcmp(ctx->name, DAV_PROPFIND_NAME) && ctx->cdata) {
e1f33efe
KK
1111 char *path = ctx->cdata;
1112 if (*ctx->cdata == 'h') {
1113 path = strstr(path, "//");
1114 if (path) {
1115 path = strchr(path+2, '/');
1116 }
1117 }
1118 if (path) {
7b5201a6 1119 path += repo->path_len;
20642801 1120 ls->dentry_name = xstrdup(path);
e1f33efe 1121 }
3030baa7
NH
1122 } else if (!strcmp(ctx->name, DAV_PROPFIND_COLLECTION)) {
1123 ls->dentry_flags |= IS_DIR;
aa1dbc98 1124 }
3030baa7 1125 } else if (!strcmp(ctx->name, DAV_PROPFIND_RESP)) {
4cac42b1 1126 free(ls->dentry_name);
3030baa7
NH
1127 ls->dentry_name = NULL;
1128 ls->dentry_flags = 0;
aa1dbc98 1129 }
aa1dbc98
NH
1130}
1131
20642801
JS
1132/*
1133 * NEEDSWORK: remote_ls() ignores info/refs on the remote side. But it
1134 * should _only_ heed the information from that file, instead of trying to
1135 * determine the refs from the remote file system (badly: it does not even
1136 * know about packed-refs).
1137 */
3030baa7
NH
1138static void remote_ls(const char *path, int flags,
1139 void (*userFunc)(struct remote_ls_ctx *ls),
1140 void *userData)
aa1dbc98 1141{
7b5201a6 1142 char *url = xmalloc(strlen(repo->url) + strlen(path) + 1);
aa1dbc98 1143 struct active_request_slot *slot;
baa7b67d 1144 struct slot_results results;
028c2976
MH
1145 struct strbuf in_buffer = STRBUF_INIT;
1146 struct buffer out_buffer = { STRBUF_INIT, 0 };
aa1dbc98
NH
1147 struct curl_slist *dav_headers = NULL;
1148 struct xml_ctx ctx;
3030baa7
NH
1149 struct remote_ls_ctx ls;
1150
1151 ls.flags = flags;
9befac47 1152 ls.path = xstrdup(path);
3030baa7
NH
1153 ls.dentry_name = NULL;
1154 ls.dentry_flags = 0;
1155 ls.userData = userData;
1156 ls.userFunc = userFunc;
aa1dbc98 1157
7b5201a6 1158 sprintf(url, "%s%s", repo->url, path);
aa1dbc98 1159
028c2976 1160 strbuf_addf(&out_buffer.buf, PROPFIND_ALL_REQUEST);
aa1dbc98
NH
1161
1162 dav_headers = curl_slist_append(dav_headers, "Depth: 1");
1163 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1164
1165 slot = get_active_slot();
baa7b67d 1166 slot->results = &results;
aa1dbc98 1167 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1168 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
aa1dbc98 1169 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
3944ba0c
MS
1170#ifndef NO_CURL_IOCTL
1171 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, ioctl_buffer);
1172 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, &out_buffer);
1173#endif
aa1dbc98
NH
1174 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
1175 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
1176 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1177 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1178 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1179 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1180
1181 if (start_active_slot(slot)) {
1182 run_active_slot(slot);
baa7b67d 1183 if (results.curl_result == CURLE_OK) {
472b2570
MH
1184 XML_Parser parser = XML_ParserCreate(NULL);
1185 enum XML_Status result;
aa1dbc98
NH
1186 ctx.name = xcalloc(10, 1);
1187 ctx.len = 0;
1188 ctx.cdata = NULL;
3030baa7
NH
1189 ctx.userFunc = handle_remote_ls_ctx;
1190 ctx.userData = &ls;
aa1dbc98
NH
1191 XML_SetUserData(parser, &ctx);
1192 XML_SetElementHandler(parser, xml_start_tag,
1193 xml_end_tag);
1194 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
1195 result = XML_Parse(parser, in_buffer.buf,
1196 in_buffer.len, 1);
aa1dbc98
NH
1197 free(ctx.name);
1198
1199 if (result != XML_STATUS_OK) {
1200 fprintf(stderr, "XML error: %s\n",
1201 XML_ErrorString(
1202 XML_GetErrorCode(parser)));
1203 }
472b2570 1204 XML_ParserFree(parser);
aa1dbc98
NH
1205 }
1206 } else {
3030baa7 1207 fprintf(stderr, "Unable to start PROPFIND request\n");
aa1dbc98
NH
1208 }
1209
3030baa7 1210 free(ls.path);
aa1dbc98 1211 free(url);
028c2976
MH
1212 strbuf_release(&out_buffer.buf);
1213 strbuf_release(&in_buffer);
aa1dbc98
NH
1214 curl_slist_free_all(dav_headers);
1215}
1216
3030baa7
NH
1217static void get_remote_object_list(unsigned char parent)
1218{
1219 char path[] = "objects/XX/";
1220 static const char hex[] = "0123456789abcdef";
1221 unsigned int val = parent;
1222
1223 path[8] = hex[val >> 4];
1224 path[9] = hex[val & 0xf];
1225 remote_dir_exists[val] = 0;
1226 remote_ls(path, (PROCESS_FILES | PROCESS_DIRS),
1227 process_ls_object, &val);
1228}
1229
acf59575 1230static int locking_available(void)
58e60dd2
NH
1231{
1232 struct active_request_slot *slot;
baa7b67d 1233 struct slot_results results;
028c2976
MH
1234 struct strbuf in_buffer = STRBUF_INIT;
1235 struct buffer out_buffer = { STRBUF_INIT, 0 };
58e60dd2 1236 struct curl_slist *dav_headers = NULL;
acf59575
NH
1237 struct xml_ctx ctx;
1238 int lock_flags = 0;
519d05be 1239 char *escaped;
58e60dd2 1240
519d05be
MH
1241 escaped = xml_entities(repo->url);
1242 strbuf_addf(&out_buffer.buf, PROPFIND_SUPPORTEDLOCK_REQUEST, escaped);
1243 free(escaped);
58e60dd2
NH
1244
1245 dav_headers = curl_slist_append(dav_headers, "Depth: 0");
1246 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
baa7b67d 1247
58e60dd2 1248 slot = get_active_slot();
baa7b67d 1249 slot->results = &results;
58e60dd2 1250 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1251 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2 1252 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
3944ba0c
MS
1253#ifndef NO_CURL_IOCTL
1254 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, ioctl_buffer);
1255 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, &out_buffer);
1256#endif
58e60dd2 1257 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1258 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
7b5201a6 1259 curl_easy_setopt(slot->curl, CURLOPT_URL, repo->url);
58e60dd2
NH
1260 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1261 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1262 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1263
1264 if (start_active_slot(slot)) {
1265 run_active_slot(slot);
baa7b67d 1266 if (results.curl_result == CURLE_OK) {
472b2570
MH
1267 XML_Parser parser = XML_ParserCreate(NULL);
1268 enum XML_Status result;
acf59575
NH
1269 ctx.name = xcalloc(10, 1);
1270 ctx.len = 0;
1271 ctx.cdata = NULL;
1272 ctx.userFunc = handle_lockprop_ctx;
1273 ctx.userData = &lock_flags;
1274 XML_SetUserData(parser, &ctx);
1275 XML_SetElementHandler(parser, xml_start_tag,
1276 xml_end_tag);
028c2976
MH
1277 result = XML_Parse(parser, in_buffer.buf,
1278 in_buffer.len, 1);
acf59575
NH
1279 free(ctx.name);
1280
1281 if (result != XML_STATUS_OK) {
1282 fprintf(stderr, "XML error: %s\n",
1283 XML_ErrorString(
1284 XML_GetErrorCode(parser)));
1285 lock_flags = 0;
1286 }
472b2570 1287 XML_ParserFree(parser);
325ce395 1288 if (!lock_flags)
d5c87cb4 1289 error("no DAV locking support on %s",
7b5201a6 1290 repo->url);
325ce395
JH
1291
1292 } else {
1293 error("Cannot access URL %s, return code %d",
7b5201a6 1294 repo->url, results.curl_result);
325ce395 1295 lock_flags = 0;
58e60dd2 1296 }
58e60dd2 1297 } else {
7b5201a6 1298 error("Unable to start PROPFIND request on %s", repo->url);
58e60dd2
NH
1299 }
1300
028c2976
MH
1301 strbuf_release(&out_buffer.buf);
1302 strbuf_release(&in_buffer);
acf59575
NH
1303 curl_slist_free_all(dav_headers);
1304
1305 return lock_flags;
58e60dd2
NH
1306}
1307
b5bf7cd6 1308static struct object_list **add_one_object(struct object *obj, struct object_list **p)
1f1e895f
LT
1309{
1310 struct object_list *entry = xmalloc(sizeof(struct object_list));
1311 entry->item = obj;
1312 entry->next = *p;
1313 *p = entry;
1314 return &entry->next;
1315}
1316
aa1dbc98
NH
1317static struct object_list **process_blob(struct blob *blob,
1318 struct object_list **p,
1319 struct name_path *path,
1320 const char *name)
58e60dd2 1321{
aa1dbc98 1322 struct object *obj = &blob->object;
58e60dd2 1323
aa1dbc98
NH
1324 obj->flags |= LOCAL;
1325
1326 if (obj->flags & (UNINTERESTING | SEEN))
1327 return p;
1328
1329 obj->flags |= SEEN;
1f1e895f 1330 return add_one_object(obj, p);
aa1dbc98
NH
1331}
1332
1333static struct object_list **process_tree(struct tree *tree,
1334 struct object_list **p,
1335 struct name_path *path,
1336 const char *name)
1337{
1338 struct object *obj = &tree->object;
2d9c58c6 1339 struct tree_desc desc;
4c068a98 1340 struct name_entry entry;
aa1dbc98
NH
1341 struct name_path me;
1342
1343 obj->flags |= LOCAL;
1344
1345 if (obj->flags & (UNINTERESTING | SEEN))
1346 return p;
1347 if (parse_tree(tree) < 0)
1348 die("bad tree object %s", sha1_to_hex(obj->sha1));
1349
1350 obj->flags |= SEEN;
9befac47 1351 name = xstrdup(name);
1f1e895f 1352 p = add_one_object(obj, p);
aa1dbc98
NH
1353 me.up = path;
1354 me.elem = name;
1355 me.elem_len = strlen(name);
2d9c58c6 1356
6fda5e51 1357 init_tree_desc(&desc, tree->buffer, tree->size);
2d9c58c6 1358
1bbeb4c6
JS
1359 while (tree_entry(&desc, &entry))
1360 switch (object_type(entry.mode)) {
1361 case OBJ_TREE:
4c068a98 1362 p = process_tree(lookup_tree(entry.sha1), p, &me, name);
1bbeb4c6
JS
1363 break;
1364 case OBJ_BLOB:
4c068a98 1365 p = process_blob(lookup_blob(entry.sha1), p, &me, name);
1bbeb4c6
JS
1366 break;
1367 default:
1368 /* Subproject commit - not in this repository */
1369 break;
1370 }
1371
2d9c58c6
LT
1372 free(tree->buffer);
1373 tree->buffer = NULL;
aa1dbc98 1374 return p;
58e60dd2
NH
1375}
1376
1a703cba 1377static int get_delta(struct rev_info *revs, struct remote_lock *lock)
58e60dd2 1378{
1f1e895f 1379 int i;
58e60dd2 1380 struct commit *commit;
1f1e895f 1381 struct object_list **p = &objects;
1a703cba 1382 int count = 0;
58e60dd2 1383
aa1dbc98
NH
1384 while ((commit = get_revision(revs)) != NULL) {
1385 p = process_tree(commit->tree, p, NULL, "");
1386 commit->object.flags |= LOCAL;
1387 if (!(commit->object.flags & UNINTERESTING))
1a703cba 1388 count += add_send_request(&commit->object, lock);
aa1dbc98 1389 }
58e60dd2 1390
1f1e895f
LT
1391 for (i = 0; i < revs->pending.nr; i++) {
1392 struct object_array_entry *entry = revs->pending.objects + i;
1393 struct object *obj = entry->item;
1394 const char *name = entry->name;
58e60dd2 1395
aa1dbc98
NH
1396 if (obj->flags & (UNINTERESTING | SEEN))
1397 continue;
1974632c 1398 if (obj->type == OBJ_TAG) {
aa1dbc98 1399 obj->flags |= SEEN;
1f1e895f 1400 p = add_one_object(obj, p);
aa1dbc98 1401 continue;
58e60dd2 1402 }
1974632c 1403 if (obj->type == OBJ_TREE) {
aa1dbc98
NH
1404 p = process_tree((struct tree *)obj, p, NULL, name);
1405 continue;
58e60dd2 1406 }
1974632c 1407 if (obj->type == OBJ_BLOB) {
aa1dbc98
NH
1408 p = process_blob((struct blob *)obj, p, NULL, name);
1409 continue;
58e60dd2 1410 }
aa1dbc98
NH
1411 die("unknown pending object %s (%s)", sha1_to_hex(obj->sha1), name);
1412 }
1413
1414 while (objects) {
1415 if (!(objects->item->flags & UNINTERESTING))
1a703cba 1416 count += add_send_request(objects->item, lock);
aa1dbc98 1417 objects = objects->next;
58e60dd2 1418 }
1a703cba
NH
1419
1420 return count;
58e60dd2
NH
1421}
1422
aa1dbc98 1423static int update_remote(unsigned char *sha1, struct remote_lock *lock)
58e60dd2
NH
1424{
1425 struct active_request_slot *slot;
baa7b67d 1426 struct slot_results results;
028c2976 1427 struct buffer out_buffer = { STRBUF_INIT, 0 };
b1c7d4aa 1428 struct curl_slist *dav_headers;
58e60dd2 1429
b1c7d4aa 1430 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF);
58e60dd2 1431
028c2976 1432 strbuf_addf(&out_buffer.buf, "%s\n", sha1_to_hex(sha1));
58e60dd2
NH
1433
1434 slot = get_active_slot();
baa7b67d 1435 slot->results = &results;
58e60dd2 1436 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1437 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2 1438 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
3944ba0c
MS
1439#ifndef NO_CURL_IOCTL
1440 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, ioctl_buffer);
1441 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, &out_buffer);
1442#endif
58e60dd2
NH
1443 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1444 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1445 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1446 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1447 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
75187c9d 1448 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1449
1450 if (start_active_slot(slot)) {
1451 run_active_slot(slot);
028c2976 1452 strbuf_release(&out_buffer.buf);
baa7b67d 1453 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1454 fprintf(stderr,
1455 "PUT error: curl result=%d, HTTP code=%ld\n",
baa7b67d 1456 results.curl_result, results.http_code);
58e60dd2
NH
1457 /* We should attempt recovery? */
1458 return 0;
1459 }
1460 } else {
028c2976 1461 strbuf_release(&out_buffer.buf);
58e60dd2
NH
1462 fprintf(stderr, "Unable to start PUT request\n");
1463 return 0;
1464 }
1465
1466 return 1;
1467}
1468
6d2bf96e 1469static struct ref *remote_refs;
aa1dbc98 1470
aa1dbc98
NH
1471static void one_remote_ref(char *refname)
1472{
1473 struct ref *ref;
197e8951 1474 struct object *obj;
aa1dbc98 1475
59c69c0c 1476 ref = alloc_ref(refname);
c13b2633 1477
7b5201a6 1478 if (http_fetch_ref(repo->url, ref) != 0) {
aa1dbc98
NH
1479 fprintf(stderr,
1480 "Unable to fetch ref %s from %s\n",
7b5201a6 1481 refname, repo->url);
c13b2633 1482 free(ref);
aa1dbc98
NH
1483 return;
1484 }
1485
197e8951
NH
1486 /*
1487 * Fetch a copy of the object if it doesn't exist locally - it
1488 * may be required for updating server info later.
1489 */
7b5201a6 1490 if (repo->can_update_info_refs && !has_sha1_file(ref->old_sha1)) {
c13b2633 1491 obj = lookup_unknown_object(ref->old_sha1);
197e8951
NH
1492 if (obj) {
1493 fprintf(stderr, " fetch %s for %s\n",
c13b2633 1494 sha1_to_hex(ref->old_sha1), refname);
197e8951
NH
1495 add_fetch_request(obj);
1496 }
1497 }
1498
6d2bf96e
CB
1499 ref->next = remote_refs;
1500 remote_refs = ref;
aa1dbc98
NH
1501}
1502
aa1dbc98
NH
1503static void get_dav_remote_heads(void)
1504{
3030baa7 1505 remote_ls("refs/", (PROCESS_FILES | PROCESS_DIRS | RECURSIVE), process_ls_ref, NULL);
aa1dbc98
NH
1506}
1507
197e8951
NH
1508static void add_remote_info_ref(struct remote_ls_ctx *ls)
1509{
028c2976 1510 struct strbuf *buf = (struct strbuf *)ls->userData;
197e8951
NH
1511 struct object *o;
1512 int len;
1513 char *ref_info;
c13b2633
DB
1514 struct ref *ref;
1515
59c69c0c 1516 ref = alloc_ref(ls->dentry_name);
197e8951 1517
7b5201a6 1518 if (http_fetch_ref(repo->url, ref) != 0) {
197e8951
NH
1519 fprintf(stderr,
1520 "Unable to fetch ref %s from %s\n",
7b5201a6 1521 ls->dentry_name, repo->url);
197e8951 1522 aborted = 1;
c13b2633 1523 free(ref);
197e8951
NH
1524 return;
1525 }
1526
c13b2633 1527 o = parse_object(ref->old_sha1);
197e8951
NH
1528 if (!o) {
1529 fprintf(stderr,
1530 "Unable to parse object %s for remote ref %s\n",
c13b2633 1531 sha1_to_hex(ref->old_sha1), ls->dentry_name);
197e8951 1532 aborted = 1;
c13b2633 1533 free(ref);
197e8951
NH
1534 return;
1535 }
1536
1537 len = strlen(ls->dentry_name) + 42;
1538 ref_info = xcalloc(len + 1, 1);
1539 sprintf(ref_info, "%s %s\n",
c13b2633 1540 sha1_to_hex(ref->old_sha1), ls->dentry_name);
197e8951
NH
1541 fwrite_buffer(ref_info, 1, len, buf);
1542 free(ref_info);
1543
1974632c 1544 if (o->type == OBJ_TAG) {
197e8951
NH
1545 o = deref_tag(o, ls->dentry_name, 0);
1546 if (o) {
1547 len = strlen(ls->dentry_name) + 45;
1548 ref_info = xcalloc(len + 1, 1);
1549 sprintf(ref_info, "%s %s^{}\n",
1550 sha1_to_hex(o->sha1), ls->dentry_name);
1551 fwrite_buffer(ref_info, 1, len, buf);
1552 free(ref_info);
1553 }
1554 }
c13b2633 1555 free(ref);
197e8951
NH
1556}
1557
1558static void update_remote_info_refs(struct remote_lock *lock)
1559{
028c2976 1560 struct buffer buffer = { STRBUF_INIT, 0 };
197e8951
NH
1561 struct active_request_slot *slot;
1562 struct slot_results results;
b1c7d4aa 1563 struct curl_slist *dav_headers;
197e8951 1564
197e8951 1565 remote_ls("refs/", (PROCESS_FILES | RECURSIVE),
028c2976 1566 add_remote_info_ref, &buffer.buf);
197e8951 1567 if (!aborted) {
b1c7d4aa 1568 dav_headers = get_dav_token_headers(lock, DAV_HEADER_IF);
197e8951
NH
1569
1570 slot = get_active_slot();
1571 slot->results = &results;
1572 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &buffer);
028c2976 1573 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, buffer.buf.len);
197e8951 1574 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
3944ba0c
MS
1575#ifndef NO_CURL_IOCTL
1576 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, ioctl_buffer);
1577 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, &buffer);
1578#endif
197e8951
NH
1579 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1580 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1581 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1582 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1583 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
1584 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
1585
197e8951
NH
1586 if (start_active_slot(slot)) {
1587 run_active_slot(slot);
1588 if (results.curl_result != CURLE_OK) {
1589 fprintf(stderr,
1590 "PUT error: curl result=%d, HTTP code=%ld\n",
1591 results.curl_result, results.http_code);
1592 }
1593 }
197e8951 1594 }
028c2976 1595 strbuf_release(&buffer.buf);
197e8951
NH
1596}
1597
1598static int remote_exists(const char *path)
1599{
7b5201a6 1600 char *url = xmalloc(strlen(repo->url) + strlen(path) + 1);
446b941a 1601 int ret;
197e8951 1602
7b5201a6 1603 sprintf(url, "%s%s", repo->url, path);
197e8951 1604
446b941a
MH
1605 switch (http_get_strbuf(url, NULL, 0)) {
1606 case HTTP_OK:
1607 ret = 1;
1608 break;
1609 case HTTP_MISSING_TARGET:
1610 ret = 0;
1611 break;
1612 case HTTP_ERROR:
1613 http_error(url, HTTP_ERROR);
1614 default:
1615 ret = -1;
197e8951 1616 }
3a462bc9
MH
1617 free(url);
1618 return ret;
197e8951
NH
1619}
1620
554fe20d 1621static void fetch_symref(const char *path, char **symref, unsigned char *sha1)
3dfaf7bc
NH
1622{
1623 char *url;
028c2976 1624 struct strbuf buffer = STRBUF_INIT;
3dfaf7bc 1625
7b5201a6
AK
1626 url = xmalloc(strlen(repo->url) + strlen(path) + 1);
1627 sprintf(url, "%s%s", repo->url, path);
3dfaf7bc 1628
9af5abd9
MH
1629 if (http_get_strbuf(url, &buffer, 0) != HTTP_OK)
1630 die("Couldn't get %s for remote symref\n%s", url,
1631 curl_errorstr);
3dfaf7bc
NH
1632 free(url);
1633
8e0f7003 1634 free(*symref);
3dfaf7bc 1635 *symref = NULL;
a8e0d16d 1636 hashclr(sha1);
3dfaf7bc 1637
028c2976 1638 if (buffer.len == 0)
3dfaf7bc
NH
1639 return;
1640
1641 /* If it's a symref, set the refname; otherwise try for a sha1 */
028c2976
MH
1642 if (!prefixcmp((char *)buffer.buf, "ref: ")) {
1643 *symref = xmemdupz((char *)buffer.buf + 5, buffer.len - 6);
3dfaf7bc 1644 } else {
028c2976 1645 get_sha1_hex(buffer.buf, sha1);
3dfaf7bc
NH
1646 }
1647
028c2976 1648 strbuf_release(&buffer);
3dfaf7bc
NH
1649}
1650
1651static int verify_merge_base(unsigned char *head_sha1, unsigned char *branch_sha1)
1652{
61ffbcb9
JS
1653 struct commit *head = lookup_commit(head_sha1);
1654 struct commit *branch = lookup_commit(branch_sha1);
1655 struct commit_list *merge_bases = get_merge_bases(head, branch, 1);
3dfaf7bc 1656
0bc87ffb 1657 return (merge_bases && !merge_bases->next && merge_bases->item == branch);
3dfaf7bc
NH
1658}
1659
1660static int delete_remote_branch(char *pattern, int force)
1661{
1662 struct ref *refs = remote_refs;
1663 struct ref *remote_ref = NULL;
1664 unsigned char head_sha1[20];
1665 char *symref = NULL;
1666 int match;
1667 int patlen = strlen(pattern);
1668 int i;
1669 struct active_request_slot *slot;
1670 struct slot_results results;
1671 char *url;
1672
1673 /* Find the remote branch(es) matching the specified branch name */
1674 for (match = 0; refs; refs = refs->next) {
1675 char *name = refs->name;
1676 int namelen = strlen(name);
1677 if (namelen < patlen ||
1678 memcmp(name + namelen - patlen, pattern, patlen))
1679 continue;
1680 if (namelen != patlen && name[namelen - patlen - 1] != '/')
1681 continue;
1682 match++;
1683 remote_ref = refs;
1684 }
1685 if (match == 0)
1686 return error("No remote branch matches %s", pattern);
1687 if (match != 1)
1688 return error("More than one remote branch matches %s",
1689 pattern);
1690
1691 /*
1692 * Remote HEAD must be a symref (not exactly foolproof; a remote
1693 * symlink to a symref will look like a symref)
1694 */
1695 fetch_symref("HEAD", &symref, head_sha1);
1696 if (!symref)
1697 return error("Remote HEAD is not a symref");
1698
1699 /* Remote branch must not be the remote HEAD */
1700 for (i=0; symref && i<MAXDEPTH; i++) {
1701 if (!strcmp(remote_ref->name, symref))
1702 return error("Remote branch %s is the current HEAD",
1703 remote_ref->name);
1704 fetch_symref(symref, &symref, head_sha1);
1705 }
1706
1707 /* Run extra sanity checks if delete is not forced */
1708 if (!force) {
1709 /* Remote HEAD must resolve to a known object */
1710 if (symref)
1711 return error("Remote HEAD symrefs too deep");
0bf8c1f9 1712 if (is_null_sha1(head_sha1))
3dfaf7bc
NH
1713 return error("Unable to resolve remote HEAD");
1714 if (!has_sha1_file(head_sha1))
1715 return error("Remote HEAD resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", sha1_to_hex(head_sha1));
1716
1717 /* Remote branch must resolve to a known object */
0bf8c1f9 1718 if (is_null_sha1(remote_ref->old_sha1))
3dfaf7bc
NH
1719 return error("Unable to resolve remote branch %s",
1720 remote_ref->name);
1721 if (!has_sha1_file(remote_ref->old_sha1))
1722 return error("Remote branch %s resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", remote_ref->name, sha1_to_hex(remote_ref->old_sha1));
1723
1724 /* Remote branch must be an ancestor of remote HEAD */
1725 if (!verify_merge_base(head_sha1, remote_ref->old_sha1)) {
00ae8289
BF
1726 return error("The branch '%s' is not an ancestor "
1727 "of your current HEAD.\n"
1728 "If you are sure you want to delete it,"
1729 " run:\n\t'git http-push -D %s %s'",
7b5201a6 1730 remote_ref->name, repo->url, pattern);
3dfaf7bc
NH
1731 }
1732 }
1733
1734 /* Send delete request */
1735 fprintf(stderr, "Removing remote branch '%s'\n", remote_ref->name);
6eaf4060
CB
1736 if (dry_run)
1737 return 0;
7b5201a6
AK
1738 url = xmalloc(strlen(repo->url) + strlen(remote_ref->name) + 1);
1739 sprintf(url, "%s%s", repo->url, remote_ref->name);
3dfaf7bc
NH
1740 slot = get_active_slot();
1741 slot->results = &results;
1742 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
1743 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1744 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1745 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_DELETE);
1746 if (start_active_slot(slot)) {
1747 run_active_slot(slot);
1748 free(url);
1749 if (results.curl_result != CURLE_OK)
1750 return error("DELETE request failed (%d/%ld)\n",
1751 results.curl_result, results.http_code);
1752 } else {
1753 free(url);
1754 return error("Unable to start DELETE request");
1755 }
1756
1757 return 0;
1758}
1759
2af202be 1760static void run_request_queue(void)
4f66250d
TRC
1761{
1762#ifdef USE_CURL_MULTI
1763 is_running_queue = 1;
1764 fill_active_slots();
1765 add_fill_function(NULL, fill_active_slot);
1766#endif
1767 do {
1768 finish_all_active_slots();
1769#ifdef USE_CURL_MULTI
1770 fill_active_slots();
1771#endif
1772 } while (request_queue_head && !aborted);
1773
1774#ifdef USE_CURL_MULTI
1775 is_running_queue = 0;
1776#endif
1777}
1778
58e60dd2
NH
1779int main(int argc, char **argv)
1780{
58e60dd2
NH
1781 struct transfer_request *request;
1782 struct transfer_request *next_request;
1783 int nr_refspec = 0;
1784 char **refspec = NULL;
512d632c 1785 struct remote_lock *ref_lock = NULL;
197e8951 1786 struct remote_lock *info_ref_lock = NULL;
aa1dbc98 1787 struct rev_info revs;
3dfaf7bc
NH
1788 int delete_branch = 0;
1789 int force_delete = 0;
1a703cba 1790 int objects_to_send;
58e60dd2
NH
1791 int rc = 0;
1792 int i;
8c9e7947 1793 int new_refs;
454e2025 1794 struct ref *ref, *local_refs;
44d808c2 1795 struct remote *remote;
3057ded0 1796 char *rewritten_url = NULL;
58e60dd2 1797
2fb3f6db
SP
1798 git_extract_argv0_path(argv[0]);
1799
7b5201a6 1800 repo = xcalloc(sizeof(*repo), 1);
58e60dd2
NH
1801
1802 argv++;
1803 for (i = 1; i < argc; i++, argv++) {
1804 char *arg = *argv;
1805
1806 if (*arg == '-') {
aa1dbc98 1807 if (!strcmp(arg, "--all")) {
28b9d6e5 1808 push_all = MATCH_REFS_ALL;
58e60dd2
NH
1809 continue;
1810 }
1811 if (!strcmp(arg, "--force")) {
1812 force_all = 1;
1813 continue;
1814 }
fe5d1d3e
SP
1815 if (!strcmp(arg, "--dry-run")) {
1816 dry_run = 1;
1817 continue;
1818 }
ae4efe19
SP
1819 if (!strcmp(arg, "--helper-status")) {
1820 helper_status = 1;
1821 continue;
1822 }
58e60dd2
NH
1823 if (!strcmp(arg, "--verbose")) {
1824 push_verbosely = 1;
e9176745 1825 http_is_verbose = 1;
58e60dd2
NH
1826 continue;
1827 }
3dfaf7bc
NH
1828 if (!strcmp(arg, "-d")) {
1829 delete_branch = 1;
1830 continue;
1831 }
1832 if (!strcmp(arg, "-D")) {
1833 delete_branch = 1;
1834 force_delete = 1;
1835 continue;
1836 }
548d3464
JN
1837 if (!strcmp(arg, "-h"))
1838 usage(http_push_usage);
58e60dd2 1839 }
7b5201a6 1840 if (!repo->url) {
aa1dbc98 1841 char *path = strstr(arg, "//");
7b5201a6
AK
1842 repo->url = arg;
1843 repo->path_len = strlen(arg);
aa1dbc98 1844 if (path) {
7b5201a6
AK
1845 repo->path = strchr(path+2, '/');
1846 if (repo->path)
1847 repo->path_len = strlen(repo->path);
aa1dbc98 1848 }
58e60dd2
NH
1849 continue;
1850 }
1851 refspec = argv;
1852 nr_refspec = argc - i;
1853 break;
1854 }
1855
f854824b
GB
1856#ifndef USE_CURL_MULTI
1857 die("git-push is not available for http/https repository when not compiled with USE_CURL_MULTI");
1858#endif
1859
7b5201a6 1860 if (!repo->url)
3e9fabc8
NH
1861 usage(http_push_usage);
1862
3dfaf7bc
NH
1863 if (delete_branch && nr_refspec != 1)
1864 die("You must specify only one branch name when deleting a remote branch");
1865
548d3464
JN
1866 setup_git_directory();
1867
aa1dbc98 1868 memset(remote_dir_exists, -1, 256);
0dd276b8 1869
44d808c2
AK
1870 /*
1871 * Create a minimum remote by hand to give to http_init(),
1872 * primarily to allow it to look at the URL.
1873 */
1874 remote = xcalloc(sizeof(*remote), 1);
1875 ALLOC_GROW(remote->url, remote->url_nr + 1, remote->url_alloc);
1876 remote->url[remote->url_nr++] = repo->url;
1877 http_init(remote);
58e60dd2 1878
7b5201a6
AK
1879 if (repo->url && repo->url[strlen(repo->url)-1] != '/') {
1880 rewritten_url = xmalloc(strlen(repo->url)+2);
1881 strcpy(rewritten_url, repo->url);
3057ded0 1882 strcat(rewritten_url, "/");
7b5201a6
AK
1883 repo->path = rewritten_url + (repo->path - repo->url);
1884 repo->path_len++;
1885 repo->url = rewritten_url;
3057ded0
GB
1886 }
1887
68862a31 1888#ifdef USE_CURL_MULTI
4f66250d 1889 is_running_queue = 0;
68862a31 1890#endif
4f66250d 1891
58e60dd2 1892 /* Verify DAV compliance/lock support */
acf59575 1893 if (!locking_available()) {
58e60dd2
NH
1894 rc = 1;
1895 goto cleanup;
1896 }
1897
57b235a4 1898 sigchain_push_common(remove_locks_on_signal);
6a491a17 1899
197e8951 1900 /* Check whether the remote has server info files */
7b5201a6
AK
1901 repo->can_update_info_refs = 0;
1902 repo->has_info_refs = remote_exists("info/refs");
1903 repo->has_info_packs = remote_exists("objects/info/packs");
1904 if (repo->has_info_refs) {
197e8951
NH
1905 info_ref_lock = lock_remote("info/refs", LOCK_TIME);
1906 if (info_ref_lock)
7b5201a6 1907 repo->can_update_info_refs = 1;
9bdbabad 1908 else {
d5c87cb4 1909 error("cannot lock existing info/refs");
9bdbabad
GB
1910 rc = 1;
1911 goto cleanup;
1912 }
197e8951 1913 }
7b5201a6 1914 if (repo->has_info_packs)
197e8951
NH
1915 fetch_indices();
1916
aa1dbc98 1917 /* Get a list of all local and remote heads to validate refspecs */
454e2025 1918 local_refs = get_local_heads();
aa1dbc98
NH
1919 fprintf(stderr, "Fetching remote heads...\n");
1920 get_dav_remote_heads();
4f66250d 1921 run_request_queue();
aa1dbc98 1922
3dfaf7bc
NH
1923 /* Remove a remote branch if -d or -D was specified */
1924 if (delete_branch) {
ae4efe19 1925 if (delete_remote_branch(refspec[0], force_delete) == -1) {
3dfaf7bc
NH
1926 fprintf(stderr, "Unable to delete remote branch %s\n",
1927 refspec[0]);
ae4efe19
SP
1928 if (helper_status)
1929 printf("error %s cannot remove\n", refspec[0]);
1930 }
3dfaf7bc
NH
1931 goto cleanup;
1932 }
1933
aa1dbc98 1934 /* match them up */
6d2bf96e 1935 if (match_refs(local_refs, &remote_refs,
9116de59
GB
1936 nr_refspec, (const char **) refspec, push_all)) {
1937 rc = -1;
1938 goto cleanup;
1939 }
aa1dbc98
NH
1940 if (!remote_refs) {
1941 fprintf(stderr, "No refs in common and none specified; doing nothing.\n");
ae4efe19
SP
1942 if (helper_status)
1943 printf("error null no match\n");
9116de59
GB
1944 rc = 0;
1945 goto cleanup;
aa1dbc98
NH
1946 }
1947
8c9e7947 1948 new_refs = 0;
aa1dbc98
NH
1949 for (ref = remote_refs; ref; ref = ref->next) {
1950 char old_hex[60], *new_hex;
a80aad7b 1951 const char *commit_argv[5];
8c9e7947
JH
1952 int commit_argc;
1953 char *new_sha1_hex, *old_sha1_hex;
1954
aa1dbc98
NH
1955 if (!ref->peer_ref)
1956 continue;
6eaf4060 1957
0bf8c1f9 1958 if (is_null_sha1(ref->peer_ref->new_sha1)) {
6eaf4060
CB
1959 if (delete_remote_branch(ref->name, 1) == -1) {
1960 error("Could not remove %s", ref->name);
ae4efe19
SP
1961 if (helper_status)
1962 printf("error %s cannot remove\n", ref->name);
6eaf4060
CB
1963 rc = -4;
1964 }
ae4efe19
SP
1965 else if (helper_status)
1966 printf("ok %s\n", ref->name);
6eaf4060
CB
1967 new_refs++;
1968 continue;
1969 }
1970
a89fccd2 1971 if (!hashcmp(ref->old_sha1, ref->peer_ref->new_sha1)) {
b5e59989 1972 if (push_verbosely)
aa1dbc98 1973 fprintf(stderr, "'%s': up-to-date\n", ref->name);
ae4efe19
SP
1974 if (helper_status)
1975 printf("ok %s up to date\n", ref->name);
aa1dbc98
NH
1976 continue;
1977 }
1978
1979 if (!force_all &&
0bf8c1f9 1980 !is_null_sha1(ref->old_sha1) &&
aa1dbc98
NH
1981 !ref->force) {
1982 if (!has_sha1_file(ref->old_sha1) ||
1983 !ref_newer(ref->peer_ref->new_sha1,
1984 ref->old_sha1)) {
00ae8289
BF
1985 /*
1986 * We do not have the remote ref, or
aa1dbc98
NH
1987 * we know that the remote ref is not
1988 * an ancestor of what we are trying to
1989 * push. Either way this can be losing
1990 * commits at the remote end and likely
1991 * we were not up to date to begin with.
1992 */
00ae8289
BF
1993 error("remote '%s' is not an ancestor of\n"
1994 "local '%s'.\n"
1995 "Maybe you are not up-to-date and "
aa1dbc98
NH
1996 "need to pull first?",
1997 ref->name,
1998 ref->peer_ref->name);
ae4efe19
SP
1999 if (helper_status)
2000 printf("error %s non-fast forward\n", ref->name);
1a703cba 2001 rc = -2;
aa1dbc98
NH
2002 continue;
2003 }
58e60dd2 2004 }
e702496e 2005 hashcpy(ref->new_sha1, ref->peer_ref->new_sha1);
aa1dbc98
NH
2006 new_refs++;
2007 strcpy(old_hex, sha1_to_hex(ref->old_sha1));
2008 new_hex = sha1_to_hex(ref->new_sha1);
2009
2010 fprintf(stderr, "updating '%s'", ref->name);
2011 if (strcmp(ref->name, ref->peer_ref->name))
2012 fprintf(stderr, " using '%s'", ref->peer_ref->name);
2013 fprintf(stderr, "\n from %s\n to %s\n", old_hex, new_hex);
ae4efe19
SP
2014 if (dry_run) {
2015 if (helper_status)
2016 printf("ok %s\n", ref->name);
fe5d1d3e 2017 continue;
ae4efe19 2018 }
58e60dd2
NH
2019
2020 /* Lock remote branch ref */
aa1dbc98
NH
2021 ref_lock = lock_remote(ref->name, LOCK_TIME);
2022 if (ref_lock == NULL) {
58e60dd2 2023 fprintf(stderr, "Unable to lock remote branch %s\n",
aa1dbc98 2024 ref->name);
ae4efe19
SP
2025 if (helper_status)
2026 printf("error %s lock error\n", ref->name);
58e60dd2
NH
2027 rc = 1;
2028 continue;
2029 }
2030
aa1dbc98 2031 /* Set up revision info for this refspec */
8c9e7947 2032 commit_argc = 3;
9befac47 2033 new_sha1_hex = xstrdup(sha1_to_hex(ref->new_sha1));
8c9e7947 2034 old_sha1_hex = NULL;
5241bfe6
NH
2035 commit_argv[1] = "--objects";
2036 commit_argv[2] = new_sha1_hex;
0bf8c1f9 2037 if (!push_all && !is_null_sha1(ref->old_sha1)) {
aa1dbc98
NH
2038 old_sha1_hex = xmalloc(42);
2039 sprintf(old_sha1_hex, "^%s",
2040 sha1_to_hex(ref->old_sha1));
5241bfe6 2041 commit_argv[3] = old_sha1_hex;
aa1dbc98 2042 commit_argc++;
58e60dd2 2043 }
a80aad7b 2044 commit_argv[commit_argc] = NULL;
db6296a5 2045 init_revisions(&revs, setup_git_directory());
aa1dbc98 2046 setup_revisions(commit_argc, commit_argv, &revs, NULL);
d633c882 2047 revs.edge_hint = 0; /* just in case */
aa1dbc98
NH
2048 free(new_sha1_hex);
2049 if (old_sha1_hex) {
2050 free(old_sha1_hex);
2051 commit_argv[1] = NULL;
58e60dd2
NH
2052 }
2053
aa1dbc98 2054 /* Generate a list of objects that need to be pushed */
58e60dd2 2055 pushing = 0;
3d51e1b5
MK
2056 if (prepare_revision_walk(&revs))
2057 die("revision walk setup failed");
d633c882 2058 mark_edges_uninteresting(revs.commits, &revs, NULL);
1a703cba 2059 objects_to_send = get_delta(&revs, ref_lock);
29508e1e 2060 finish_all_active_slots();
58e60dd2
NH
2061
2062 /* Push missing objects to remote, this would be a
2063 convenient time to pack them first if appropriate. */
2064 pushing = 1;
1a703cba
NH
2065 if (objects_to_send)
2066 fprintf(stderr, " sending %d objects\n",
2067 objects_to_send);
4f66250d
TRC
2068
2069 run_request_queue();
58e60dd2
NH
2070
2071 /* Update the remote branch if all went well */
7fea9c55 2072 if (aborted || !update_remote(ref->new_sha1, ref_lock))
aa1dbc98 2073 rc = 1;
58e60dd2 2074
aa1dbc98
NH
2075 if (!rc)
2076 fprintf(stderr, " done\n");
ae4efe19
SP
2077 if (helper_status)
2078 printf("%s %s\n", !rc ? "ok" : "error", ref->name);
aa1dbc98 2079 unlock_remote(ref_lock);
512d632c 2080 check_locks();
58e60dd2
NH
2081 }
2082
197e8951 2083 /* Update remote server info if appropriate */
7b5201a6
AK
2084 if (repo->has_info_refs && new_refs) {
2085 if (info_ref_lock && repo->can_update_info_refs) {
197e8951 2086 fprintf(stderr, "Updating remote server info\n");
fe5d1d3e
SP
2087 if (!dry_run)
2088 update_remote_info_refs(info_ref_lock);
197e8951
NH
2089 } else {
2090 fprintf(stderr, "Unable to update server info\n");
2091 }
2092 }
197e8951 2093
58e60dd2 2094 cleanup:
8e0f7003 2095 free(rewritten_url);
9116de59
GB
2096 if (info_ref_lock)
2097 unlock_remote(info_ref_lock);
7b5201a6 2098 free(repo);
58e60dd2 2099
29508e1e 2100 http_cleanup();
58e60dd2
NH
2101
2102 request = request_queue_head;
2103 while (request != NULL) {
2104 next_request = request->next;
2105 release_request(request);
58e60dd2
NH
2106 request = next_request;
2107 }
2108
58e60dd2
NH
2109 return rc;
2110}