connect: tighten check for unexpected early hang up
[git/git.git] / connect.c
CommitLineData
731043fd 1#include "git-compat-util.h"
f7192598 2#include "cache.h"
41cb7488 3#include "pkt-line.h"
b10d0ec7 4#include "quote.h"
6abf5c0c 5#include "refs.h"
15a1c012 6#include "run-command.h"
6b62816c 7#include "remote.h"
47a59185 8#include "connect.h"
9d2e9420 9#include "url.h"
a45b5f05 10#include "string-list.h"
13eb4626 11#include "sha1-array.h"
a5adaced 12#include "transport.h"
f7192598 13
96f1e58f 14static char *server_capabilities;
5d54cffc 15static const char *parse_feature_value(const char *, const char *, int *);
211b5f9e 16
be0b3f82 17static int check_ref(const char *name, unsigned int flags)
2718ff09
LT
18{
19 if (!flags)
20 return 1;
21
be0b3f82 22 if (!skip_prefix(name, "refs/", &name))
2718ff09
LT
23 return 0;
24
2718ff09 25 /* REF_NORMAL means that we don't want the magic fake tag refs */
8d9c5010 26 if ((flags & REF_NORMAL) && check_refname_format(name, 0))
2718ff09
LT
27 return 0;
28
29 /* REF_HEADS means that we want regular branch heads */
be0b3f82 30 if ((flags & REF_HEADS) && starts_with(name, "heads/"))
2718ff09
LT
31 return 1;
32
33 /* REF_TAGS means that we want tags */
be0b3f82 34 if ((flags & REF_TAGS) && starts_with(name, "tags/"))
2718ff09
LT
35 return 1;
36
37 /* All type bits clear means that we are ok with anything */
38 return !(flags & ~REF_NORMAL);
39}
40
4577370e
DB
41int check_ref_type(const struct ref *ref, int flags)
42{
be0b3f82 43 return check_ref(ref->name, flags);
4577370e
DB
44}
45
55e4f936 46static void die_initial_contact(int unexpected)
46284dd1 47{
55e4f936 48 if (unexpected)
46284dd1
HV
49 die("The remote end hung up upon initial contact");
50 else
51 die("Could not read from remote repository.\n\n"
52 "Please make sure you have the correct access rights\n"
53 "and the repository exists.");
54}
55
a45b5f05
JH
56static void parse_one_symref_info(struct string_list *symref, const char *val, int len)
57{
58 char *sym, *target;
59 struct string_list_item *item;
60
61 if (!len)
62 return; /* just "symref" */
63 /* e.g. "symref=HEAD:refs/heads/master" */
5c0b13f8 64 sym = xmemdupz(val, len);
a45b5f05
JH
65 target = strchr(sym, ':');
66 if (!target)
67 /* just "symref=something" */
68 goto reject;
69 *(target++) = '\0';
70 if (check_refname_format(sym, REFNAME_ALLOW_ONELEVEL) ||
71 check_refname_format(target, REFNAME_ALLOW_ONELEVEL))
72 /* "symref=bogus:pair */
73 goto reject;
74 item = string_list_append(symref, sym);
75 item->util = target;
76 return;
77reject:
78 free(sym);
79 return;
80}
81
82static void annotate_refs_with_symref_info(struct ref *ref)
83{
84 struct string_list symref = STRING_LIST_INIT_DUP;
85 const char *feature_list = server_capabilities;
86
87 while (feature_list) {
88 int len;
89 const char *val;
90
91 val = parse_feature_value(feature_list, "symref", &len);
92 if (!val)
93 break;
94 parse_one_symref_info(&symref, val, len);
95 feature_list = val + 1;
96 }
3383e199 97 string_list_sort(&symref);
a45b5f05
JH
98
99 for (; ref; ref = ref->next) {
100 struct string_list_item *item;
101 item = string_list_lookup(&symref, ref->name);
102 if (!item)
103 continue;
104 ref->symref = xstrdup((char *)item->util);
105 }
106 string_list_clear(&symref, 0);
107}
108
d1c133f5
LT
109/*
110 * Read all the refs from the other end
111 */
85edf4f5
JK
112struct ref **get_remote_heads(int in, char *src_buf, size_t src_len,
113 struct ref **list, unsigned int flags,
b06dcd7d
NTND
114 struct sha1_array *extra_have,
115 struct sha1_array *shallow_points)
d1c133f5 116{
a45b5f05 117 struct ref **orig_list = list;
55e4f936
JN
118
119 /*
120 * A hang-up after seeing some response from the other end
121 * means that it is unexpected, as we know the other end is
122 * willing to talk to us. A hang-up before seeing any
123 * response does not necessarily mean an ACL problem, though.
124 */
125 int saw_response;
46284dd1 126
d1c133f5 127 *list = NULL;
55e4f936 128 for (saw_response = 0; ; saw_response = 1) {
d1c133f5 129 struct ref *ref;
e96b16cc 130 struct object_id old_oid;
d1c133f5 131 char *name;
211b5f9e 132 int len, name_len;
74543a04 133 char *buffer = packet_buffer;
ae021d87 134 const char *arg;
d1c133f5 135
85edf4f5 136 len = packet_read(in, &src_buf, &src_len,
4981fe75 137 packet_buffer, sizeof(packet_buffer),
819b929d
JK
138 PACKET_READ_GENTLE_ON_EOF |
139 PACKET_READ_CHOMP_NEWLINE);
46284dd1 140 if (len < 0)
55e4f936 141 die_initial_contact(saw_response);
46284dd1 142
d1c133f5
LT
143 if (!len)
144 break;
d1c133f5 145
ae021d87
JK
146 if (len > 4 && skip_prefix(buffer, "ERR ", &arg))
147 die("remote error: %s", arg);
a8073289 148
e96b16cc 149 if (len == GIT_SHA1_HEXSZ + strlen("shallow ") &&
150 skip_prefix(buffer, "shallow ", &arg)) {
151 if (get_oid_hex(arg, &old_oid))
ae021d87 152 die("protocol error: expected shallow sha-1, got '%s'", arg);
b06dcd7d
NTND
153 if (!shallow_points)
154 die("repository on the other end cannot be shallow");
e96b16cc 155 sha1_array_append(shallow_points, old_oid.hash);
b06dcd7d
NTND
156 continue;
157 }
158
e96b16cc 159 if (len < GIT_SHA1_HEXSZ + 2 || get_oid_hex(buffer, &old_oid) ||
160 buffer[GIT_SHA1_HEXSZ] != ' ')
d1c133f5 161 die("protocol error: expected sha/ref, got '%s'", buffer);
e96b16cc 162 name = buffer + GIT_SHA1_HEXSZ + 1;
1a7141ff 163
211b5f9e 164 name_len = strlen(name);
e96b16cc 165 if (len != name_len + GIT_SHA1_HEXSZ + 1) {
8e0f7003 166 free(server_capabilities);
9befac47 167 server_capabilities = xstrdup(name + name_len + 1);
211b5f9e
JS
168 }
169
2ae7f90f 170 if (extra_have && !strcmp(name, ".have")) {
e96b16cc 171 sha1_array_append(extra_have, old_oid.hash);
40c155ff
JH
172 continue;
173 }
174
be0b3f82 175 if (!check_ref(name, flags))
cfee10a7 176 continue;
e96b16cc 177 ref = alloc_ref(buffer + GIT_SHA1_HEXSZ + 1);
178 oidcpy(&ref->old_oid, &old_oid);
d1c133f5
LT
179 *list = ref;
180 list = &ref->next;
181 }
a45b5f05
JH
182
183 annotate_refs_with_symref_info(*orig_list);
184
d1c133f5
LT
185 return list;
186}
187
5d54cffc 188static const char *parse_feature_value(const char *feature_list, const char *feature, int *lenp)
f47182c8
JH
189{
190 int len;
191
192 if (!feature_list)
193 return NULL;
194
195 len = strlen(feature);
196 while (*feature_list) {
197 const char *found = strstr(feature_list, feature);
198 if (!found)
199 return NULL;
94427108
JK
200 if (feature_list == found || isspace(found[-1])) {
201 const char *value = found + len;
202 /* feature with no value (e.g., "thin-pack") */
203 if (!*value || isspace(*value)) {
204 if (lenp)
205 *lenp = 0;
206 return value;
207 }
208 /* feature with a value (e.g., "agent=git/1.2.3") */
209 else if (*value == '=') {
210 value++;
211 if (lenp)
212 *lenp = strcspn(value, " \t\n");
213 return value;
214 }
215 /*
216 * otherwise we matched a substring of another feature;
217 * keep looking
218 */
219 }
f47182c8
JH
220 feature_list = found + 1;
221 }
222 return NULL;
211b5f9e
JS
223}
224
94427108
JK
225int parse_feature_request(const char *feature_list, const char *feature)
226{
227 return !!parse_feature_value(feature_list, feature, NULL);
228}
229
230const char *server_feature_value(const char *feature, int *len)
231{
232 return parse_feature_value(server_capabilities, feature, len);
233}
234
235int server_supports(const char *feature)
236{
237 return !!server_feature_value(feature, NULL);
238}
239
2386d658
LT
240enum protocol {
241 PROTO_LOCAL = 1,
c59ab2e5 242 PROTO_FILE,
2386d658 243 PROTO_SSH,
4b05548f 244 PROTO_GIT
2386d658
LT
245};
246
c59ab2e5
TB
247int url_is_local_not_ssh(const char *url)
248{
249 const char *colon = strchr(url, ':');
250 const char *slash = strchr(url, '/');
251 return !colon || (slash && slash < colon) ||
252 has_dos_drive_prefix(url);
253}
254
5610b7c0
TB
255static const char *prot_name(enum protocol protocol)
256{
257 switch (protocol) {
258 case PROTO_LOCAL:
c59ab2e5 259 case PROTO_FILE:
5610b7c0
TB
260 return "file";
261 case PROTO_SSH:
262 return "ssh";
263 case PROTO_GIT:
264 return "git";
265 default:
83e6bda3 266 return "unknown protocol";
5610b7c0
TB
267 }
268}
269
2386d658
LT
270static enum protocol get_protocol(const char *name)
271{
272 if (!strcmp(name, "ssh"))
273 return PROTO_SSH;
274 if (!strcmp(name, "git"))
275 return PROTO_GIT;
07c7782c 276 if (!strcmp(name, "git+ssh")) /* deprecated - do not use */
c05186cc 277 return PROTO_SSH;
07c7782c 278 if (!strcmp(name, "ssh+git")) /* deprecated - do not use */
c05186cc 279 return PROTO_SSH;
72a4f4b6 280 if (!strcmp(name, "file"))
c59ab2e5 281 return PROTO_FILE;
2386d658
LT
282 die("I don't handle protocol '%s'", name);
283}
284
86ceb337
TB
285static char *host_end(char **hoststart, int removebrackets)
286{
287 char *host = *hoststart;
288 char *end;
289 char *start = strstr(host, "@[");
290 if (start)
291 start++; /* Jump over '@' */
292 else
293 start = host;
294 if (start[0] == '[') {
295 end = strchr(start + 1, ']');
296 if (end) {
297 if (removebrackets) {
298 *end = 0;
299 memmove(start, start + 1, end - start);
300 end++;
301 }
302 } else
303 end = host;
304 } else
305 end = host;
306 return end;
307}
308
5ba88448
YH
309#define STR_(s) # s
310#define STR(s) STR_(s)
2386d658 311
72a534da
ML
312static void get_host_and_port(char **host, const char **port)
313{
314 char *colon, *end;
86ceb337 315 end = host_end(host, 1);
72a534da 316 colon = strchr(end, ':');
72a534da 317 if (colon) {
86ceb337
TB
318 long portnr = strtol(colon + 1, &end, 10);
319 if (end != colon + 1 && *end == '\0' && 0 <= portnr && portnr < 65536) {
320 *colon = 0;
321 *port = colon + 1;
6b6c5f7a
TB
322 } else if (!colon[1]) {
323 *colon = 0;
86ceb337 324 }
72a534da
ML
325 }
326}
327
e47a8583
EW
328static void enable_keepalive(int sockfd)
329{
330 int ka = 1;
331
332 if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, &ka, sizeof(ka)) < 0)
333 fprintf(stderr, "unable to set SO_KEEPALIVE on socket: %s\n",
334 strerror(errno));
335}
336
49744d63 337#ifndef NO_IPV6
4c505f71 338
ba505322
AR
339static const char *ai_name(const struct addrinfo *ai)
340{
785a9857
BK
341 static char addr[NI_MAXHOST];
342 if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0,
343 NI_NUMERICHOST) != 0)
5096d490 344 xsnprintf(addr, sizeof(addr), "(unknown)");
785a9857 345
ba505322
AR
346 return addr;
347}
348
5ad312be
JL
349/*
350 * Returns a connected socket() fd, or else die()s.
351 */
7841ce79 352static int git_tcp_connect_sock(char *host, int flags)
2386d658 353{
63a995b6
DZ
354 struct strbuf error_message = STRBUF_INIT;
355 int sockfd = -1;
554fe20d 356 const char *port = STR(DEFAULT_GIT_PORT);
5ba88448
YH
357 struct addrinfo hints, *ai0, *ai;
358 int gai;
ba505322 359 int cnt = 0;
5ba88448 360
72a534da
ML
361 get_host_and_port(&host, &port);
362 if (!*port)
363 port = "<none>";
5ba88448
YH
364
365 memset(&hints, 0, sizeof(hints));
c915f11e
EW
366 if (flags & CONNECT_IPV4)
367 hints.ai_family = AF_INET;
368 else if (flags & CONNECT_IPV6)
369 hints.ai_family = AF_INET6;
5ba88448
YH
370 hints.ai_socktype = SOCK_STREAM;
371 hints.ai_protocol = IPPROTO_TCP;
372
7841ce79
MT
373 if (flags & CONNECT_VERBOSE)
374 fprintf(stderr, "Looking up %s ... ", host);
375
5ba88448
YH
376 gai = getaddrinfo(host, port, &hints, &ai);
377 if (gai)
608d48b2 378 die("Unable to look up %s (port %s) (%s)", host, port, gai_strerror(gai));
5ba88448 379
7841ce79
MT
380 if (flags & CONNECT_VERBOSE)
381 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
382
e08afecd 383 for (ai0 = ai; ai; ai = ai->ai_next, cnt++) {
5ad312be
JL
384 sockfd = socket(ai->ai_family,
385 ai->ai_socktype, ai->ai_protocol);
63a995b6
DZ
386 if ((sockfd < 0) ||
387 (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0)) {
388 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
389 host, cnt, ai_name(ai), strerror(errno));
390 if (0 <= sockfd)
391 close(sockfd);
5ba88448
YH
392 sockfd = -1;
393 continue;
2386d658 394 }
ba505322
AR
395 if (flags & CONNECT_VERBOSE)
396 fprintf(stderr, "%s ", ai_name(ai));
5ba88448 397 break;
2386d658
LT
398 }
399
5ba88448 400 freeaddrinfo(ai0);
2386d658 401
2386d658 402 if (sockfd < 0)
63a995b6 403 die("unable to connect to %s:\n%s", host, error_message.buf);
5ba88448 404
e47a8583
EW
405 enable_keepalive(sockfd);
406
7841ce79
MT
407 if (flags & CONNECT_VERBOSE)
408 fprintf(stderr, "done.\n");
409
63a995b6
DZ
410 strbuf_release(&error_message);
411
5ad312be 412 return sockfd;
2386d658
LT
413}
414
49744d63 415#else /* NO_IPV6 */
4c505f71 416
5ad312be
JL
417/*
418 * Returns a connected socket() fd, or else die()s.
419 */
7841ce79 420static int git_tcp_connect_sock(char *host, int flags)
4c505f71 421{
7203a2d1
EFL
422 struct strbuf error_message = STRBUF_INIT;
423 int sockfd = -1;
72a534da
ML
424 const char *port = STR(DEFAULT_GIT_PORT);
425 char *ep;
4c505f71
PA
426 struct hostent *he;
427 struct sockaddr_in sa;
428 char **ap;
429 unsigned int nport;
ba505322 430 int cnt;
4c505f71 431
72a534da 432 get_host_and_port(&host, &port);
4c505f71 433
7841ce79
MT
434 if (flags & CONNECT_VERBOSE)
435 fprintf(stderr, "Looking up %s ... ", host);
436
4c505f71
PA
437 he = gethostbyname(host);
438 if (!he)
439 die("Unable to look up %s (%s)", host, hstrerror(h_errno));
440 nport = strtoul(port, &ep, 10);
441 if ( ep == port || *ep ) {
442 /* Not numeric */
443 struct servent *se = getservbyname(port,"tcp");
444 if ( !se )
d7530708 445 die("Unknown port %s", port);
4c505f71
PA
446 nport = se->s_port;
447 }
448
7841ce79
MT
449 if (flags & CONNECT_VERBOSE)
450 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
451
ba505322 452 for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) {
4c505f71
PA
453 memset(&sa, 0, sizeof sa);
454 sa.sin_family = he->h_addrtype;
6573faff 455 sa.sin_port = htons(nport);
c6164218 456 memcpy(&sa.sin_addr, *ap, he->h_length);
4c505f71 457
7203a2d1
EFL
458 sockfd = socket(he->h_addrtype, SOCK_STREAM, 0);
459 if ((sockfd < 0) ||
460 connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) {
461 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
ba505322
AR
462 host,
463 cnt,
464 inet_ntoa(*(struct in_addr *)&sa.sin_addr),
7203a2d1
EFL
465 strerror(errno));
466 if (0 <= sockfd)
467 close(sockfd);
4c505f71
PA
468 sockfd = -1;
469 continue;
470 }
ba505322
AR
471 if (flags & CONNECT_VERBOSE)
472 fprintf(stderr, "%s ",
473 inet_ntoa(*(struct in_addr *)&sa.sin_addr));
4c505f71
PA
474 break;
475 }
476
477 if (sockfd < 0)
7203a2d1 478 die("unable to connect to %s:\n%s", host, error_message.buf);
4c505f71 479
e47a8583
EW
480 enable_keepalive(sockfd);
481
7841ce79
MT
482 if (flags & CONNECT_VERBOSE)
483 fprintf(stderr, "done.\n");
484
5ad312be
JL
485 return sockfd;
486}
487
488#endif /* NO_IPV6 */
489
490
7841ce79 491static void git_tcp_connect(int fd[2], char *host, int flags)
5ad312be 492{
7841ce79 493 int sockfd = git_tcp_connect_sock(host, flags);
5ad312be 494
4c505f71 495 fd[0] = sockfd;
ec587fde 496 fd[1] = dup(sockfd);
4c505f71
PA
497}
498
4c505f71 499
96f1e58f 500static char *git_proxy_command;
f8014776 501
ef90d6d4
JS
502static int git_proxy_command_options(const char *var, const char *value,
503 void *cb)
f8014776 504{
e814bc4d 505 if (!strcmp(var, "core.gitproxy")) {
c3df8568
YH
506 const char *for_pos;
507 int matchlen = -1;
508 int hostlen;
15112c95
EFL
509 const char *rhost_name = cb;
510 int rhost_len = strlen(rhost_name);
c3df8568 511
e814bc4d 512 if (git_proxy_command)
f8014776 513 return 0;
c64b9ad0
JH
514 if (!value)
515 return config_error_nonbool(var);
e814bc4d
JH
516 /* [core]
517 * ;# matches www.kernel.org as well
518 * gitproxy = netcatter-1 for kernel.org
519 * gitproxy = netcatter-2 for sample.xz
520 * gitproxy = netcatter-default
521 */
c3df8568 522 for_pos = strstr(value, " for ");
e814bc4d
JH
523 if (!for_pos)
524 /* matches everybody */
525 matchlen = strlen(value);
526 else {
527 hostlen = strlen(for_pos + 5);
528 if (rhost_len < hostlen)
529 matchlen = -1;
530 else if (!strncmp(for_pos + 5,
531 rhost_name + rhost_len - hostlen,
532 hostlen) &&
533 ((rhost_len == hostlen) ||
534 rhost_name[rhost_len - hostlen -1] == '.'))
535 matchlen = for_pos - value;
536 else
537 matchlen = -1;
538 }
539 if (0 <= matchlen) {
540 /* core.gitproxy = none for kernel.org */
a6080a0a 541 if (matchlen == 4 &&
e814bc4d
JH
542 !memcmp(value, "none", 4))
543 matchlen = 0;
182af834 544 git_proxy_command = xmemdupz(value, matchlen);
f8014776 545 }
e814bc4d 546 return 0;
f8014776
PC
547 }
548
ef90d6d4 549 return git_default_config(var, value, cb);
f8014776
PC
550}
551
e814bc4d 552static int git_use_proxy(const char *host)
f8014776
PC
553{
554 git_proxy_command = getenv("GIT_PROXY_COMMAND");
15112c95 555 git_config(git_proxy_command_options, (void*)host);
e814bc4d 556 return (git_proxy_command && *git_proxy_command);
f8014776
PC
557}
558
5cbf8246 559static struct child_process *git_proxy_connect(int fd[2], char *host)
f8014776 560{
554fe20d 561 const char *port = STR(DEFAULT_GIT_PORT);
5cbf8246 562 struct child_process *proxy;
f8014776 563
72a534da 564 get_host_and_port(&host, &port);
f8014776 565
483bbd4e
RS
566 proxy = xmalloc(sizeof(*proxy));
567 child_process_init(proxy);
1823bea1
JK
568 argv_array_push(&proxy->args, git_proxy_command);
569 argv_array_push(&proxy->args, host);
570 argv_array_push(&proxy->args, port);
5cbf8246
JK
571 proxy->in = -1;
572 proxy->out = -1;
573 if (start_command(proxy))
1823bea1 574 die("cannot start proxy %s", git_proxy_command);
5cbf8246
JK
575 fd[0] = proxy->out; /* read from proxy stdout */
576 fd[1] = proxy->in; /* write to proxy stdin */
577 return proxy;
f8014776
PC
578}
579
86ceb337 580static char *get_port(char *host)
2e776665
LT
581{
582 char *end;
86ceb337
TB
583 char *p = strchr(host, ':');
584
2e776665 585 if (p) {
8f148253
RS
586 long port = strtol(p + 1, &end, 10);
587 if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) {
86ceb337
TB
588 *p = '\0';
589 return p+1;
2e776665
LT
590 }
591 }
592
593 return NULL;
594}
595
f7192598 596/*
cabc3c12
JS
597 * Extract protocol and relevant parts from the specified connection URL.
598 * The caller must free() the returned strings.
f7192598 599 */
cabc3c12 600static enum protocol parse_connect_url(const char *url_orig, char **ret_host,
83b05875 601 char **ret_path)
f7192598 602{
9d2e9420 603 char *url;
8e76bf3f 604 char *host, *path;
356bece0 605 char *end;
c59ab2e5 606 int separator = '/';
faea9ccb 607 enum protocol protocol = PROTO_LOCAL;
f0b7367c 608
9d2e9420
JK
609 if (is_url(url_orig))
610 url = url_decode(url_orig);
611 else
612 url = xstrdup(url_orig);
613
faea9ccb 614 host = strstr(url, "://");
eeefa7c9 615 if (host) {
faea9ccb
AE
616 *host = '\0';
617 protocol = get_protocol(url);
618 host += 3;
356bece0 619 } else {
f7192598 620 host = url;
c59ab2e5
TB
621 if (!url_is_local_not_ssh(url)) {
622 protocol = PROTO_SSH;
623 separator = ':';
624 }
356bece0
YH
625 }
626
9aa5053d 627 /*
83b05875
TB
628 * Don't do destructive transforms as protocol code does
629 * '[]' unwrapping in get_host_and_port()
9aa5053d 630 */
86ceb337 631 end = host_end(&host, 0);
356bece0 632
c59ab2e5 633 if (protocol == PROTO_LOCAL)
72a4f4b6 634 path = end;
c59ab2e5
TB
635 else if (protocol == PROTO_FILE && has_dos_drive_prefix(end))
636 path = end; /* "file://$(pwd)" may be "file://C:/projects/repo" */
637 else
638 path = strchr(end, separator);
2386d658 639
faea9ccb
AE
640 if (!path || !*path)
641 die("No path specified. See 'man git-pull' for valid url syntax");
642
643 /*
644 * null-terminate hostname and point path to ~ for URL's like this:
645 * ssh://host.xz/~user/repo
646 */
c59ab2e5
TB
647
648 end = path; /* Need to \0 terminate host here */
649 if (separator == ':')
650 path++; /* path starts after ':' */
651 if (protocol == PROTO_GIT || protocol == PROTO_SSH) {
faea9ccb
AE
652 if (path[1] == '~')
653 path++;
faea9ccb
AE
654 }
655
c59ab2e5
TB
656 path = xstrdup(path);
657 *end = '\0';
658
cabc3c12 659 *ret_host = xstrdup(host);
c59ab2e5 660 *ret_path = path;
cabc3c12
JS
661 free(url);
662 return protocol;
663}
664
d3180279 665static struct child_process no_fork = CHILD_PROCESS_INIT;
cabc3c12
JS
666
667/*
668 * This returns a dummy child_process if the transport protocol does not
669 * need fork(2), or a struct child_process object if it does. Once done,
670 * finish the connection with finish_connect() with the value returned from
671 * this function (it is safe to call finish_connect() with NULL to support
672 * the former case).
673 *
674 * If it returns, the connect is successful; it just dies on errors (this
675 * will hopefully be changed in a libification effort, to return NULL when
676 * the connection failed).
677 */
678struct child_process *git_connect(int fd[2], const char *url,
679 const char *prog, int flags)
680{
a2036d7e 681 char *hostandport, *path;
cabc3c12
JS
682 struct child_process *conn = &no_fork;
683 enum protocol protocol;
cabc3c12
JS
684 struct strbuf cmd = STRBUF_INIT;
685
686 /* Without this we cannot rely on waitpid() to tell
687 * what happened to our children.
2e776665 688 */
cabc3c12 689 signal(SIGCHLD, SIG_DFL);
2e776665 690
a2036d7e 691 protocol = parse_connect_url(url, &hostandport, &path);
3f55ccab 692 if ((flags & CONNECT_DIAG_URL) && (protocol != PROTO_SSH)) {
5610b7c0
TB
693 printf("Diag: url=%s\n", url ? url : "NULL");
694 printf("Diag: protocol=%s\n", prot_name(protocol));
a2036d7e 695 printf("Diag: hostandport=%s\n", hostandport ? hostandport : "NULL");
5610b7c0 696 printf("Diag: path=%s\n", path ? path : "NULL");
a2036d7e
TB
697 conn = NULL;
698 } else if (protocol == PROTO_GIT) {
94bc83c5
JK
699 /*
700 * Set up virtual host information based on where we will
701 * connect, unless the user has overridden us in
702 * the environment.
703 */
704 char *target_host = getenv("GIT_OVERRIDE_VIRTUAL_HOST");
705 if (target_host)
706 target_host = xstrdup(target_host);
707 else
708 target_host = xstrdup(hostandport);
709
a5adaced
JK
710 transport_check_allowed("git");
711
5ad312be
JL
712 /* These underlying connection commands die() if they
713 * cannot connect.
714 */
a2036d7e
TB
715 if (git_use_proxy(hostandport))
716 conn = git_proxy_connect(fd, hostandport);
da2a95b2 717 else
a2036d7e 718 git_tcp_connect(fd, hostandport, flags);
5ad312be
JL
719 /*
720 * Separate original protocol components prog and path
73bb33a9
SP
721 * from extended host header with a NUL byte.
722 *
723 * Note: Do not add any other headers here! Doing so
724 * will cause older git-daemon servers to crash.
5ad312be
JL
725 */
726 packet_write(fd[1],
727 "%s %s%chost=%s%c",
728 prog, path, 0,
729 target_host, 0);
730 free(target_host);
a2036d7e 731 } else {
483bbd4e
RS
732 conn = xmalloc(sizeof(*conn));
733 child_process_init(conn);
a2036d7e
TB
734
735 strbuf_addstr(&cmd, prog);
736 strbuf_addch(&cmd, ' ');
737 sq_quote_buf(&cmd, path);
738
aab40438
JK
739 /* remove repo-local variables from the environment */
740 conn->env = local_repo_env;
a48b409f 741 conn->use_shell = 1;
a2036d7e 742 conn->in = conn->out = -1;
a2036d7e 743 if (protocol == PROTO_SSH) {
39942766 744 const char *ssh;
a48b409f 745 int putty = 0, tortoiseplink = 0;
a2036d7e
TB
746 char *ssh_host = hostandport;
747 const char *port = NULL;
a5adaced 748 transport_check_allowed("ssh");
a2036d7e 749 get_host_and_port(&ssh_host, &port);
a2036d7e 750
86ceb337
TB
751 if (!port)
752 port = get_port(ssh_host);
42da4840 753
3f55ccab
TB
754 if (flags & CONNECT_DIAG_URL) {
755 printf("Diag: url=%s\n", url ? url : "NULL");
756 printf("Diag: protocol=%s\n", prot_name(protocol));
757 printf("Diag: userandhost=%s\n", ssh_host ? ssh_host : "NULL");
758 printf("Diag: port=%s\n", port ? port : "NONE");
759 printf("Diag: path=%s\n", path ? path : "NULL");
a2036d7e 760
3f55ccab
TB
761 free(hostandport);
762 free(path);
04f20c04 763 free(conn);
3f55ccab 764 return NULL;
37ee646e 765 }
766
767 ssh = getenv("GIT_SSH_COMMAND");
a48b409f 768 if (!ssh) {
baaf2337 769 const char *base;
770 char *ssh_dup;
771
a48b409f
JK
772 /*
773 * GIT_SSH is the no-shell version of
774 * GIT_SSH_COMMAND (and must remain so for
775 * historical compatibility).
776 */
777 conn->use_shell = 0;
778
37ee646e 779 ssh = getenv("GIT_SSH");
780 if (!ssh)
781 ssh = "ssh";
baaf2337 782
783 ssh_dup = xstrdup(ssh);
784 base = basename(ssh_dup);
785
786 tortoiseplink = !strcasecmp(base, "tortoiseplink") ||
787 !strcasecmp(base, "tortoiseplink.exe");
a48b409f
JK
788 putty = tortoiseplink ||
789 !strcasecmp(base, "plink") ||
790 !strcasecmp(base, "plink.exe");
baaf2337 791
792 free(ssh_dup);
37ee646e 793 }
794
795 argv_array_push(&conn->args, ssh);
c915f11e
EW
796 if (flags & CONNECT_IPV4)
797 argv_array_push(&conn->args, "-4");
798 else if (flags & CONNECT_IPV6)
799 argv_array_push(&conn->args, "-6");
baaf2337 800 if (tortoiseplink)
37ee646e 801 argv_array_push(&conn->args, "-batch");
802 if (port) {
803 /* P is for PuTTY, p is for OpenSSH */
804 argv_array_push(&conn->args, putty ? "-P" : "-p");
805 argv_array_push(&conn->args, port);
a2036d7e 806 }
37ee646e 807 argv_array_push(&conn->args, ssh_host);
c049b61d 808 } else {
a5adaced 809 transport_check_allowed("file");
4852f723 810 }
1823bea1 811 argv_array_push(&conn->args, cmd.buf);
f364cb88 812
a2036d7e
TB
813 if (start_command(conn))
814 die("unable to fork");
f364cb88 815
a2036d7e
TB
816 fd[0] = conn->out; /* read from child's stdout */
817 fd[1] = conn->in; /* write to child's stdin */
818 strbuf_release(&cmd);
819 }
820 free(hostandport);
cabc3c12 821 free(path);
98158e9c 822 return conn;
f7192598
LT
823}
824
7ffe853b
JK
825int git_connection_is_socket(struct child_process *conn)
826{
827 return conn == &no_fork;
828}
829
98158e9c 830int finish_connect(struct child_process *conn)
f7192598 831{
f364cb88 832 int code;
7ffe853b 833 if (!conn || git_connection_is_socket(conn))
f42a5c4e
FBH
834 return 0;
835
f364cb88 836 code = finish_command(conn);
98158e9c 837 free(conn);
f364cb88 838 return code;
f7192598 839}