GIT 1.6.1
[git/git.git] / http-push.c
CommitLineData
58e60dd2
NH
1#include "cache.h"
2#include "commit.h"
3#include "pack.h"
58e60dd2
NH
4#include "tag.h"
5#include "blob.h"
29508e1e 6#include "http.h"
aa1dbc98 7#include "refs.h"
c4e05b1a 8#include "diff.h"
aa1dbc98 9#include "revision.h"
3dfaf7bc 10#include "exec_cmd.h"
6b62816c 11#include "remote.h"
d633c882 12#include "list-objects.h"
29508e1e 13
bee8e79d 14#include <expat.h>
58e60dd2
NH
15
16static const char http_push_usage[] =
1b1dd23f 17"git http-push [--all] [--dry-run] [--force] [--verbose] <remote> [<head>...]\n";
58e60dd2 18
92e2eb9c
JS
19#ifndef XML_STATUS_OK
20enum XML_Status {
21 XML_STATUS_OK = 1,
22 XML_STATUS_ERROR = 0
23};
24#define XML_STATUS_OK 1
25#define XML_STATUS_ERROR 0
26#endif
27
197e8951 28#define PREV_BUF_SIZE 4096
58e60dd2
NH
29#define RANGE_HEADER_SIZE 30
30
acf59575 31/* DAV methods */
58e60dd2
NH
32#define DAV_LOCK "LOCK"
33#define DAV_MKCOL "MKCOL"
34#define DAV_MOVE "MOVE"
35#define DAV_PROPFIND "PROPFIND"
36#define DAV_PUT "PUT"
37#define DAV_UNLOCK "UNLOCK"
3dfaf7bc 38#define DAV_DELETE "DELETE"
acf59575
NH
39
40/* DAV lock flags */
41#define DAV_PROP_LOCKWR (1u << 0)
42#define DAV_PROP_LOCKEX (1u << 1)
43#define DAV_LOCK_OK (1u << 2)
44
45/* DAV XML properties */
46#define DAV_CTX_LOCKENTRY ".multistatus.response.propstat.prop.supportedlock.lockentry"
47#define DAV_CTX_LOCKTYPE_WRITE ".multistatus.response.propstat.prop.supportedlock.lockentry.locktype.write"
48#define DAV_CTX_LOCKTYPE_EXCLUSIVE ".multistatus.response.propstat.prop.supportedlock.lockentry.lockscope.exclusive"
49#define DAV_ACTIVELOCK_OWNER ".prop.lockdiscovery.activelock.owner.href"
50#define DAV_ACTIVELOCK_TIMEOUT ".prop.lockdiscovery.activelock.timeout"
51#define DAV_ACTIVELOCK_TOKEN ".prop.lockdiscovery.activelock.locktoken.href"
aa1dbc98
NH
52#define DAV_PROPFIND_RESP ".multistatus.response"
53#define DAV_PROPFIND_NAME ".multistatus.response.href"
54#define DAV_PROPFIND_COLLECTION ".multistatus.response.propstat.prop.resourcetype.collection"
acf59575
NH
55
56/* DAV request body templates */
aa1dbc98
NH
57#define PROPFIND_SUPPORTEDLOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:prop xmlns:R=\"%s\">\n<D:supportedlock/>\n</D:prop>\n</D:propfind>"
58#define PROPFIND_ALL_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:allprop/>\n</D:propfind>"
58e60dd2
NH
59#define LOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:lockinfo xmlns:D=\"DAV:\">\n<D:lockscope><D:exclusive/></D:lockscope>\n<D:locktype><D:write/></D:locktype>\n<D:owner>\n<D:href>mailto:%s</D:href>\n</D:owner>\n</D:lockinfo>"
60
75187c9d
NH
61#define LOCK_TIME 600
62#define LOCK_REFRESH 30
63
1b65a5aa 64/* bits #0-15 in revision.h */
aa1dbc98 65
1b65a5aa
JH
66#define LOCAL (1u<<16)
67#define REMOTE (1u<<17)
68#define FETCHING (1u<<18)
69#define PUSHING (1u<<19)
aa1dbc98 70
3dfaf7bc
NH
71/* We allow "recursive" symbolic refs. Only within reason, though */
72#define MAXDEPTH 5
73
96f1e58f
DR
74static int pushing;
75static int aborted;
a3c57c9a 76static signed char remote_dir_exists[256];
58e60dd2 77
58e60dd2 78static struct curl_slist *no_pragma_header;
58e60dd2 79
96f1e58f 80static int push_verbosely;
28b9d6e5 81static int push_all = MATCH_REFS_NONE;
96f1e58f 82static int force_all;
fe5d1d3e 83static int dry_run;
58e60dd2 84
96f1e58f 85static struct object_list *objects;
aa1dbc98 86
58e60dd2
NH
87struct repo
88{
89 char *url;
aa1dbc98 90 int path_len;
197e8951
NH
91 int has_info_refs;
92 int can_update_info_refs;
93 int has_info_packs;
58e60dd2 94 struct packed_git *packs;
512d632c 95 struct remote_lock *locks;
58e60dd2
NH
96};
97
96f1e58f 98static struct repo *remote;
58e60dd2
NH
99
100enum transfer_state {
197e8951
NH
101 NEED_FETCH,
102 RUN_FETCH_LOOSE,
103 RUN_FETCH_PACKED,
58e60dd2
NH
104 NEED_PUSH,
105 RUN_MKCOL,
106 RUN_PUT,
107 RUN_MOVE,
108 ABORTED,
109 COMPLETE,
110};
111
112struct transfer_request
113{
aa1dbc98 114 struct object *obj;
58e60dd2
NH
115 char *url;
116 char *dest;
aa1dbc98 117 struct remote_lock *lock;
58e60dd2
NH
118 struct curl_slist *headers;
119 struct buffer buffer;
120 char filename[PATH_MAX];
121 char tmpfile[PATH_MAX];
197e8951
NH
122 int local_fileno;
123 FILE *local_stream;
58e60dd2
NH
124 enum transfer_state state;
125 CURLcode curl_result;
126 char errorstr[CURL_ERROR_SIZE];
127 long http_code;
128 unsigned char real_sha1[20];
9126f009 129 git_SHA_CTX c;
58e60dd2
NH
130 z_stream stream;
131 int zret;
132 int rename;
197e8951 133 void *userData;
58e60dd2
NH
134 struct active_request_slot *slot;
135 struct transfer_request *next;
136};
137
96f1e58f 138static struct transfer_request *request_queue_head;
58e60dd2 139
acf59575
NH
140struct xml_ctx
141{
142 char *name;
143 int len;
144 char *cdata;
145 void (*userFunc)(struct xml_ctx *ctx, int tag_closed);
146 void *userData;
147};
148
aa1dbc98 149struct remote_lock
26349b2e 150{
75187c9d 151 char *url;
26349b2e 152 char *owner;
75187c9d 153 char *token;
26349b2e
NH
154 time_t start_time;
155 long timeout;
75187c9d 156 int refreshing;
aa1dbc98
NH
157 struct remote_lock *next;
158};
159
3030baa7
NH
160/* Flags that control remote_ls processing */
161#define PROCESS_FILES (1u << 0)
162#define PROCESS_DIRS (1u << 1)
163#define RECURSIVE (1u << 2)
164
165/* Flags that remote_ls passes to callback functions */
166#define IS_DIR (1u << 0)
167
168struct remote_ls_ctx
aa1dbc98 169{
3030baa7
NH
170 char *path;
171 void (*userFunc)(struct remote_ls_ctx *ls);
172 void *userData;
173 int flags;
174 char *dentry_name;
175 int dentry_flags;
176 struct remote_ls_ctx *parent;
26349b2e
NH
177};
178
29508e1e 179static void finish_request(struct transfer_request *request);
197e8951 180static void release_request(struct transfer_request *request);
58e60dd2 181
29508e1e 182static void process_response(void *callback_data)
58e60dd2 183{
29508e1e
NH
184 struct transfer_request *request =
185 (struct transfer_request *)callback_data;
58e60dd2 186
29508e1e 187 finish_request(request);
58e60dd2
NH
188}
189
dd8239f9 190#ifdef USE_CURL_MULTI
197e8951
NH
191static size_t fwrite_sha1_file(void *ptr, size_t eltsize, size_t nmemb,
192 void *data)
193{
194 unsigned char expn[4096];
195 size_t size = eltsize * nmemb;
196 int posn = 0;
197 struct transfer_request *request = (struct transfer_request *)data;
198 do {
93822c22 199 ssize_t retval = xwrite(request->local_fileno,
1d7f171c 200 (char *) ptr + posn, size - posn);
197e8951
NH
201 if (retval < 0)
202 return posn;
203 posn += retval;
204 } while (posn < size);
205
206 request->stream.avail_in = size;
207 request->stream.next_in = ptr;
208 do {
209 request->stream.next_out = expn;
210 request->stream.avail_out = sizeof(expn);
211 request->zret = inflate(&request->stream, Z_SYNC_FLUSH);
9126f009 212 git_SHA1_Update(&request->c, expn,
197e8951
NH
213 sizeof(expn) - request->stream.avail_out);
214 } while (request->stream.avail_in && request->zret == Z_OK);
215 data_received++;
216 return size;
217}
218
219static void start_fetch_loose(struct transfer_request *request)
220{
221 char *hex = sha1_to_hex(request->obj->sha1);
222 char *filename;
223 char prevfile[PATH_MAX];
224 char *url;
225 char *posn;
226 int prevlocal;
227 unsigned char prev_buf[PREV_BUF_SIZE];
228 ssize_t prev_read = 0;
229 long prev_posn = 0;
230 char range[RANGE_HEADER_SIZE];
231 struct curl_slist *range_header = NULL;
232 struct active_request_slot *slot;
233
234 filename = sha1_file_name(request->obj->sha1);
235 snprintf(request->filename, sizeof(request->filename), "%s", filename);
236 snprintf(request->tmpfile, sizeof(request->tmpfile),
237 "%s.temp", filename);
238
239 snprintf(prevfile, sizeof(prevfile), "%s.prev", request->filename);
240 unlink(prevfile);
241 rename(request->tmpfile, prevfile);
242 unlink(request->tmpfile);
243
244 if (request->local_fileno != -1)
245 error("fd leakage in start: %d", request->local_fileno);
246 request->local_fileno = open(request->tmpfile,
247 O_WRONLY | O_CREAT | O_EXCL, 0666);
248 /* This could have failed due to the "lazy directory creation";
249 * try to mkdir the last path component.
250 */
251 if (request->local_fileno < 0 && errno == ENOENT) {
252 char *dir = strrchr(request->tmpfile, '/');
253 if (dir) {
254 *dir = 0;
255 mkdir(request->tmpfile, 0777);
256 *dir = '/';
257 }
258 request->local_fileno = open(request->tmpfile,
259 O_WRONLY | O_CREAT | O_EXCL, 0666);
260 }
261
262 if (request->local_fileno < 0) {
263 request->state = ABORTED;
264 error("Couldn't create temporary file %s for %s: %s",
265 request->tmpfile, request->filename, strerror(errno));
266 return;
267 }
268
269 memset(&request->stream, 0, sizeof(request->stream));
270
271 inflateInit(&request->stream);
272
9126f009 273 git_SHA1_Init(&request->c);
197e8951
NH
274
275 url = xmalloc(strlen(remote->url) + 50);
276 request->url = xmalloc(strlen(remote->url) + 50);
277 strcpy(url, remote->url);
278 posn = url + strlen(remote->url);
279 strcpy(posn, "objects/");
280 posn += 8;
281 memcpy(posn, hex, 2);
282 posn += 2;
283 *(posn++) = '/';
284 strcpy(posn, hex + 2);
285 strcpy(request->url, url);
286
287 /* If a previous temp file is present, process what was already
288 fetched. */
289 prevlocal = open(prevfile, O_RDONLY);
290 if (prevlocal != -1) {
291 do {
93d26e4c 292 prev_read = xread(prevlocal, prev_buf, PREV_BUF_SIZE);
197e8951
NH
293 if (prev_read>0) {
294 if (fwrite_sha1_file(prev_buf,
295 1,
296 prev_read,
297 request) == prev_read) {
298 prev_posn += prev_read;
299 } else {
300 prev_read = -1;
301 }
302 }
303 } while (prev_read > 0);
304 close(prevlocal);
305 }
306 unlink(prevfile);
307
308 /* Reset inflate/SHA1 if there was an error reading the previous temp
309 file; also rewind to the beginning of the local file. */
310 if (prev_read == -1) {
311 memset(&request->stream, 0, sizeof(request->stream));
312 inflateInit(&request->stream);
9126f009 313 git_SHA1_Init(&request->c);
197e8951
NH
314 if (prev_posn>0) {
315 prev_posn = 0;
b5da2467 316 lseek(request->local_fileno, 0, SEEK_SET);
197e8951
NH
317 ftruncate(request->local_fileno, 0);
318 }
319 }
320
321 slot = get_active_slot();
322 slot->callback_func = process_response;
323 slot->callback_data = request;
324 request->slot = slot;
325
326 curl_easy_setopt(slot->curl, CURLOPT_FILE, request);
327 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_sha1_file);
328 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
329 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
330 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
331
332 /* If we have successfully processed data from a previous fetch
333 attempt, only fetch the data we don't already have. */
334 if (prev_posn>0) {
335 if (push_verbosely)
336 fprintf(stderr,
337 "Resuming fetch of object %s at byte %ld\n",
338 hex, prev_posn);
339 sprintf(range, "Range: bytes=%ld-", prev_posn);
340 range_header = curl_slist_append(range_header, range);
341 curl_easy_setopt(slot->curl,
342 CURLOPT_HTTPHEADER, range_header);
343 }
344
345 /* Try to get the request started, abort the request on error */
346 request->state = RUN_FETCH_LOOSE;
347 if (!start_active_slot(slot)) {
348 fprintf(stderr, "Unable to start GET request\n");
349 remote->can_update_info_refs = 0;
350 release_request(request);
351 }
352}
353
dd8239f9
JH
354static void start_mkcol(struct transfer_request *request)
355{
356 char *hex = sha1_to_hex(request->obj->sha1);
357 struct active_request_slot *slot;
358 char *posn;
359
360 request->url = xmalloc(strlen(remote->url) + 13);
361 strcpy(request->url, remote->url);
362 posn = request->url + strlen(remote->url);
363 strcpy(posn, "objects/");
364 posn += 8;
365 memcpy(posn, hex, 2);
366 posn += 2;
367 strcpy(posn, "/");
368
369 slot = get_active_slot();
370 slot->callback_func = process_response;
371 slot->callback_data = request;
372 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
373 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
374 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
375 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
376 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
377
378 if (start_active_slot(slot)) {
379 request->slot = slot;
380 request->state = RUN_MKCOL;
381 } else {
382 request->state = ABORTED;
383 free(request->url);
384 request->url = NULL;
385 }
386}
387#endif
388
197e8951
NH
389static void start_fetch_packed(struct transfer_request *request)
390{
391 char *url;
392 struct packed_git *target;
393 FILE *packfile;
394 char *filename;
395 long prev_posn = 0;
396 char range[RANGE_HEADER_SIZE];
397 struct curl_slist *range_header = NULL;
398
399 struct transfer_request *check_request = request_queue_head;
400 struct active_request_slot *slot;
401
402 target = find_sha1_pack(request->obj->sha1, remote->packs);
403 if (!target) {
404 fprintf(stderr, "Unable to fetch %s, will not be able to update server info refs\n", sha1_to_hex(request->obj->sha1));
405 remote->can_update_info_refs = 0;
406 release_request(request);
407 return;
408 }
409
410 fprintf(stderr, "Fetching pack %s\n", sha1_to_hex(target->sha1));
411 fprintf(stderr, " which contains %s\n", sha1_to_hex(request->obj->sha1));
412
413 filename = sha1_pack_name(target->sha1);
414 snprintf(request->filename, sizeof(request->filename), "%s", filename);
415 snprintf(request->tmpfile, sizeof(request->tmpfile),
416 "%s.temp", filename);
417
418 url = xmalloc(strlen(remote->url) + 64);
419 sprintf(url, "%sobjects/pack/pack-%s.pack",
420 remote->url, sha1_to_hex(target->sha1));
421
422 /* Make sure there isn't another open request for this pack */
423 while (check_request) {
424 if (check_request->state == RUN_FETCH_PACKED &&
425 !strcmp(check_request->url, url)) {
426 free(url);
427 release_request(request);
428 return;
429 }
430 check_request = check_request->next;
431 }
432
433 packfile = fopen(request->tmpfile, "a");
434 if (!packfile) {
435 fprintf(stderr, "Unable to open local file %s for pack",
84ef0338 436 request->tmpfile);
197e8951
NH
437 remote->can_update_info_refs = 0;
438 free(url);
439 return;
440 }
441
442 slot = get_active_slot();
443 slot->callback_func = process_response;
444 slot->callback_data = request;
445 request->slot = slot;
446 request->local_stream = packfile;
447 request->userData = target;
448
449 request->url = url;
450 curl_easy_setopt(slot->curl, CURLOPT_FILE, packfile);
451 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
452 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
453 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
454 slot->local = packfile;
455
456 /* If there is data present from a previous transfer attempt,
457 resume where it left off */
458 prev_posn = ftell(packfile);
459 if (prev_posn>0) {
460 if (push_verbosely)
461 fprintf(stderr,
462 "Resuming fetch of pack %s at byte %ld\n",
463 sha1_to_hex(target->sha1), prev_posn);
464 sprintf(range, "Range: bytes=%ld-", prev_posn);
465 range_header = curl_slist_append(range_header, range);
466 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
467 }
468
469 /* Try to get the request started, abort the request on error */
470 request->state = RUN_FETCH_PACKED;
471 if (!start_active_slot(slot)) {
472 fprintf(stderr, "Unable to start GET request\n");
473 remote->can_update_info_refs = 0;
474 release_request(request);
475 }
476}
477
58e60dd2
NH
478static void start_put(struct transfer_request *request)
479{
aa1dbc98 480 char *hex = sha1_to_hex(request->obj->sha1);
58e60dd2
NH
481 struct active_request_slot *slot;
482 char *posn;
21666f1a 483 enum object_type type;
58e60dd2
NH
484 char hdr[50];
485 void *unpacked;
486 unsigned long len;
487 int hdrlen;
488 ssize_t size;
489 z_stream stream;
490
21666f1a
NP
491 unpacked = read_sha1_file(request->obj->sha1, &type, &len);
492 hdrlen = sprintf(hdr, "%s %lu", typename(type), len) + 1;
58e60dd2
NH
493
494 /* Set it up */
495 memset(&stream, 0, sizeof(stream));
12f6c308 496 deflateInit(&stream, zlib_compression_level);
58e60dd2 497 size = deflateBound(&stream, len + hdrlen);
028c2976
MH
498 strbuf_init(&request->buffer.buf, size);
499 request->buffer.posn = 0;
58e60dd2
NH
500
501 /* Compress it */
028c2976 502 stream.next_out = (unsigned char *)request->buffer.buf.buf;
58e60dd2
NH
503 stream.avail_out = size;
504
505 /* First header.. */
506 stream.next_in = (void *)hdr;
507 stream.avail_in = hdrlen;
508 while (deflate(&stream, 0) == Z_OK)
509 /* nothing */;
510
511 /* Then the data itself.. */
512 stream.next_in = unpacked;
513 stream.avail_in = len;
514 while (deflate(&stream, Z_FINISH) == Z_OK)
515 /* nothing */;
516 deflateEnd(&stream);
517 free(unpacked);
518
028c2976 519 request->buffer.buf.len = stream.total_out;
58e60dd2 520
a6080a0a 521 request->url = xmalloc(strlen(remote->url) +
26349b2e 522 strlen(request->lock->token) + 51);
58e60dd2
NH
523 strcpy(request->url, remote->url);
524 posn = request->url + strlen(remote->url);
525 strcpy(posn, "objects/");
526 posn += 8;
527 memcpy(posn, hex, 2);
528 posn += 2;
529 *(posn++) = '/';
530 strcpy(posn, hex + 2);
531 request->dest = xmalloc(strlen(request->url) + 14);
532 sprintf(request->dest, "Destination: %s", request->url);
533 posn += 38;
1e8d3045 534 *(posn++) = '_';
26349b2e 535 strcpy(posn, request->lock->token);
58e60dd2
NH
536
537 slot = get_active_slot();
29508e1e
NH
538 slot->callback_func = process_response;
539 slot->callback_data = request;
58e60dd2 540 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &request->buffer);
028c2976 541 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, request->buffer.buf.len);
58e60dd2
NH
542 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
543 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
544 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
545 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
546 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
547 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
548 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
549
550 if (start_active_slot(slot)) {
551 request->slot = slot;
552 request->state = RUN_PUT;
553 } else {
554 request->state = ABORTED;
555 free(request->url);
7b899967 556 request->url = NULL;
58e60dd2
NH
557 }
558}
559
560static void start_move(struct transfer_request *request)
561{
562 struct active_request_slot *slot;
563 struct curl_slist *dav_headers = NULL;
564
565 slot = get_active_slot();
29508e1e
NH
566 slot->callback_func = process_response;
567 slot->callback_data = request;
58e60dd2
NH
568 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
569 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MOVE);
570 dav_headers = curl_slist_append(dav_headers, request->dest);
571 dav_headers = curl_slist_append(dav_headers, "Overwrite: T");
572 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
573 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
574 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
575
576 if (start_active_slot(slot)) {
577 request->slot = slot;
578 request->state = RUN_MOVE;
579 } else {
580 request->state = ABORTED;
581 free(request->url);
7b899967 582 request->url = NULL;
58e60dd2
NH
583 }
584}
585
512d632c 586static int refresh_lock(struct remote_lock *lock)
75187c9d
NH
587{
588 struct active_request_slot *slot;
baa7b67d 589 struct slot_results results;
75187c9d
NH
590 char *if_header;
591 char timeout_header[25];
592 struct curl_slist *dav_headers = NULL;
512d632c 593 int rc = 0;
75187c9d 594
512d632c 595 lock->refreshing = 1;
75187c9d 596
512d632c 597 if_header = xmalloc(strlen(lock->token) + 25);
753bc911 598 sprintf(if_header, "If: (<%s>)", lock->token);
512d632c
NH
599 sprintf(timeout_header, "Timeout: Second-%ld", lock->timeout);
600 dav_headers = curl_slist_append(dav_headers, if_header);
601 dav_headers = curl_slist_append(dav_headers, timeout_header);
75187c9d 602
512d632c
NH
603 slot = get_active_slot();
604 slot->results = &results;
605 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
606 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
607 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
608 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
609 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
75187c9d 610
512d632c
NH
611 if (start_active_slot(slot)) {
612 run_active_slot(slot);
613 if (results.curl_result != CURLE_OK) {
614 fprintf(stderr, "LOCK HTTP error %ld\n",
615 results.http_code);
616 } else {
617 lock->start_time = time(NULL);
618 rc = 1;
619 }
620 }
aa1dbc98 621
512d632c
NH
622 lock->refreshing = 0;
623 curl_slist_free_all(dav_headers);
624 free(if_header);
aa1dbc98 625
512d632c
NH
626 return rc;
627}
628
ec26b4d6 629static void check_locks(void)
512d632c
NH
630{
631 struct remote_lock *lock = remote->locks;
632 time_t current_time = time(NULL);
633 int time_remaining;
634
635 while (lock) {
636 time_remaining = lock->start_time + lock->timeout -
637 current_time;
638 if (!lock->refreshing && time_remaining < LOCK_REFRESH) {
639 if (!refresh_lock(lock)) {
640 fprintf(stderr,
641 "Unable to refresh lock for %s\n",
642 lock->url);
643 aborted = 1;
644 return;
aa1dbc98 645 }
75187c9d 646 }
512d632c 647 lock = lock->next;
75187c9d 648 }
aa1dbc98 649}
75187c9d 650
aa1dbc98
NH
651static void release_request(struct transfer_request *request)
652{
653 struct transfer_request *entry = request_queue_head;
654
655 if (request == request_queue_head) {
656 request_queue_head = request->next;
657 } else {
658 while (entry->next != NULL && entry->next != request)
659 entry = entry->next;
660 if (entry->next == request)
661 entry->next = entry->next->next;
662 }
663
197e8951
NH
664 if (request->local_fileno != -1)
665 close(request->local_fileno);
666 if (request->local_stream)
667 fclose(request->local_stream);
8e0f7003 668 free(request->url);
aa1dbc98 669 free(request);
75187c9d
NH
670}
671
58e60dd2
NH
672static void finish_request(struct transfer_request *request)
673{
197e8951
NH
674 struct stat st;
675 struct packed_git *target;
676 struct packed_git **lst;
677
678 request->curl_result = request->slot->curl_result;
58e60dd2
NH
679 request->http_code = request->slot->http_code;
680 request->slot = NULL;
75187c9d 681
aa1dbc98 682 /* Keep locks active */
512d632c 683 check_locks();
75187c9d 684
58e60dd2
NH
685 if (request->headers != NULL)
686 curl_slist_free_all(request->headers);
7b899967
NH
687
688 /* URL is reused for MOVE after PUT */
689 if (request->state != RUN_PUT) {
690 free(request->url);
691 request->url = NULL;
aa1dbc98 692 }
7b899967 693
aa1dbc98 694 if (request->state == RUN_MKCOL) {
58e60dd2
NH
695 if (request->curl_result == CURLE_OK ||
696 request->http_code == 405) {
aa1dbc98 697 remote_dir_exists[request->obj->sha1[0]] = 1;
58e60dd2
NH
698 start_put(request);
699 } else {
700 fprintf(stderr, "MKCOL %s failed, aborting (%d/%ld)\n",
aa1dbc98 701 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
702 request->curl_result, request->http_code);
703 request->state = ABORTED;
704 aborted = 1;
705 }
706 } else if (request->state == RUN_PUT) {
707 if (request->curl_result == CURLE_OK) {
708 start_move(request);
709 } else {
710 fprintf(stderr, "PUT %s failed, aborting (%d/%ld)\n",
aa1dbc98 711 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
712 request->curl_result, request->http_code);
713 request->state = ABORTED;
714 aborted = 1;
715 }
716 } else if (request->state == RUN_MOVE) {
717 if (request->curl_result == CURLE_OK) {
1a703cba
NH
718 if (push_verbosely)
719 fprintf(stderr, " sent %s\n",
720 sha1_to_hex(request->obj->sha1));
aa1dbc98
NH
721 request->obj->flags |= REMOTE;
722 release_request(request);
58e60dd2
NH
723 } else {
724 fprintf(stderr, "MOVE %s failed, aborting (%d/%ld)\n",
aa1dbc98 725 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
726 request->curl_result, request->http_code);
727 request->state = ABORTED;
728 aborted = 1;
729 }
197e8951
NH
730 } else if (request->state == RUN_FETCH_LOOSE) {
731 fchmod(request->local_fileno, 0444);
732 close(request->local_fileno); request->local_fileno = -1;
733
734 if (request->curl_result != CURLE_OK &&
735 request->http_code != 416) {
736 if (stat(request->tmpfile, &st) == 0) {
737 if (st.st_size == 0)
738 unlink(request->tmpfile);
739 }
740 } else {
741 if (request->http_code == 416)
742 fprintf(stderr, "Warning: requested range invalid; we may already have all the data.\n");
743
744 inflateEnd(&request->stream);
9126f009 745 git_SHA1_Final(request->real_sha1, &request->c);
197e8951
NH
746 if (request->zret != Z_STREAM_END) {
747 unlink(request->tmpfile);
a89fccd2 748 } else if (hashcmp(request->obj->sha1, request->real_sha1)) {
197e8951
NH
749 unlink(request->tmpfile);
750 } else {
751 request->rename =
752 move_temp_to_file(
753 request->tmpfile,
754 request->filename);
755 if (request->rename == 0) {
756 request->obj->flags |= (LOCAL | REMOTE);
757 }
758 }
759 }
760
761 /* Try fetching packed if necessary */
762 if (request->obj->flags & LOCAL)
763 release_request(request);
764 else
765 start_fetch_packed(request);
766
767 } else if (request->state == RUN_FETCH_PACKED) {
768 if (request->curl_result != CURLE_OK) {
769 fprintf(stderr, "Unable to get pack file %s\n%s",
770 request->url, curl_errorstr);
771 remote->can_update_info_refs = 0;
772 } else {
1c23d794
SP
773 off_t pack_size = ftell(request->local_stream);
774
197e8951
NH
775 fclose(request->local_stream);
776 request->local_stream = NULL;
777 if (!move_temp_to_file(request->tmpfile,
778 request->filename)) {
779 target = (struct packed_git *)request->userData;
1c23d794 780 target->pack_size = pack_size;
197e8951
NH
781 lst = &remote->packs;
782 while (*lst != target)
783 lst = &((*lst)->next);
784 *lst = (*lst)->next;
785
77d3ecee 786 if (!verify_pack(target))
197e8951
NH
787 install_packed_git(target);
788 else
789 remote->can_update_info_refs = 0;
790 }
791 }
792 release_request(request);
58e60dd2
NH
793 }
794}
795
b3ca4e4e 796#ifdef USE_CURL_MULTI
fc57b6aa 797static int fill_active_slot(void *unused)
58e60dd2
NH
798{
799 struct transfer_request *request = request_queue_head;
58e60dd2
NH
800
801 if (aborted)
45c17412 802 return 0;
58e60dd2 803
45c17412 804 for (request = request_queue_head; request; request = request->next) {
197e8951
NH
805 if (request->state == NEED_FETCH) {
806 start_fetch_loose(request);
45c17412 807 return 1;
197e8951 808 } else if (pushing && request->state == NEED_PUSH) {
aa1dbc98 809 if (remote_dir_exists[request->obj->sha1[0]] == 1) {
0dd276b8 810 start_put(request);
aa1dbc98 811 } else {
0dd276b8 812 start_mkcol(request);
aa1dbc98 813 }
45c17412 814 return 1;
58e60dd2 815 }
aa1dbc98 816 }
45c17412 817 return 0;
58e60dd2 818}
b3ca4e4e 819#endif
58e60dd2 820
aa1dbc98
NH
821static void get_remote_object_list(unsigned char parent);
822
197e8951
NH
823static void add_fetch_request(struct object *obj)
824{
825 struct transfer_request *request;
826
827 check_locks();
828
829 /*
830 * Don't fetch the object if it's known to exist locally
831 * or is already in the request queue
832 */
833 if (remote_dir_exists[obj->sha1[0]] == -1)
834 get_remote_object_list(obj->sha1[0]);
835 if (obj->flags & (LOCAL | FETCHING))
836 return;
837
838 obj->flags |= FETCHING;
839 request = xmalloc(sizeof(*request));
840 request->obj = obj;
841 request->url = NULL;
842 request->lock = NULL;
843 request->headers = NULL;
844 request->local_fileno = -1;
845 request->local_stream = NULL;
846 request->state = NEED_FETCH;
847 request->next = request_queue_head;
848 request_queue_head = request;
849
b3ca4e4e 850#ifdef USE_CURL_MULTI
197e8951
NH
851 fill_active_slots();
852 step_active_slots();
b3ca4e4e 853#endif
197e8951
NH
854}
855
1a703cba 856static int add_send_request(struct object *obj, struct remote_lock *lock)
58e60dd2
NH
857{
858 struct transfer_request *request = request_queue_head;
58e60dd2 859 struct packed_git *target;
58e60dd2 860
512d632c
NH
861 /* Keep locks active */
862 check_locks();
863
aa1dbc98
NH
864 /*
865 * Don't push the object if it's known to exist on the remote
866 * or is already in the request queue
867 */
868 if (remote_dir_exists[obj->sha1[0]] == -1)
869 get_remote_object_list(obj->sha1[0]);
870 if (obj->flags & (REMOTE | PUSHING))
1a703cba 871 return 0;
aa1dbc98
NH
872 target = find_sha1_pack(obj->sha1, remote->packs);
873 if (target) {
874 obj->flags |= REMOTE;
1a703cba 875 return 0;
aa1dbc98 876 }
58e60dd2 877
aa1dbc98 878 obj->flags |= PUSHING;
58e60dd2 879 request = xmalloc(sizeof(*request));
aa1dbc98 880 request->obj = obj;
58e60dd2 881 request->url = NULL;
26349b2e 882 request->lock = lock;
58e60dd2 883 request->headers = NULL;
197e8951
NH
884 request->local_fileno = -1;
885 request->local_stream = NULL;
aa1dbc98 886 request->state = NEED_PUSH;
c17fb6ee
NH
887 request->next = request_queue_head;
888 request_queue_head = request;
29508e1e 889
b3ca4e4e 890#ifdef USE_CURL_MULTI
29508e1e
NH
891 fill_active_slots();
892 step_active_slots();
b3ca4e4e 893#endif
1a703cba
NH
894
895 return 1;
58e60dd2
NH
896}
897
898static int fetch_index(unsigned char *sha1)
899{
900 char *hex = sha1_to_hex(sha1);
901 char *filename;
902 char *url;
903 char tmpfile[PATH_MAX];
904 long prev_posn = 0;
905 char range[RANGE_HEADER_SIZE];
906 struct curl_slist *range_header = NULL;
907
908 FILE *indexfile;
909 struct active_request_slot *slot;
baa7b67d 910 struct slot_results results;
58e60dd2 911
c17fb6ee 912 /* Don't use the index if the pack isn't there */
1a703cba
NH
913 url = xmalloc(strlen(remote->url) + 64);
914 sprintf(url, "%sobjects/pack/pack-%s.pack", remote->url, hex);
c17fb6ee 915 slot = get_active_slot();
baa7b67d 916 slot->results = &results;
c17fb6ee
NH
917 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
918 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
919 if (start_active_slot(slot)) {
920 run_active_slot(slot);
baa7b67d 921 if (results.curl_result != CURLE_OK) {
c17fb6ee
NH
922 free(url);
923 return error("Unable to verify pack %s is available",
924 hex);
925 }
926 } else {
3b683b91 927 free(url);
c17fb6ee
NH
928 return error("Unable to start request");
929 }
930
3b683b91
MH
931 if (has_pack_index(sha1)) {
932 free(url);
58e60dd2 933 return 0;
3b683b91 934 }
58e60dd2
NH
935
936 if (push_verbosely)
937 fprintf(stderr, "Getting index for pack %s\n", hex);
1a703cba
NH
938
939 sprintf(url, "%sobjects/pack/pack-%s.idx", remote->url, hex);
940
58e60dd2
NH
941 filename = sha1_pack_index_name(sha1);
942 snprintf(tmpfile, sizeof(tmpfile), "%s.temp", filename);
943 indexfile = fopen(tmpfile, "a");
3b683b91
MH
944 if (!indexfile) {
945 free(url);
58e60dd2 946 return error("Unable to open local file %s for pack index",
84ef0338 947 tmpfile);
3b683b91 948 }
58e60dd2
NH
949
950 slot = get_active_slot();
baa7b67d 951 slot->results = &results;
c17fb6ee
NH
952 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
953 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
58e60dd2
NH
954 curl_easy_setopt(slot->curl, CURLOPT_FILE, indexfile);
955 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
956 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
957 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
958 slot->local = indexfile;
959
960 /* If there is data present from a previous transfer attempt,
961 resume where it left off */
962 prev_posn = ftell(indexfile);
963 if (prev_posn>0) {
964 if (push_verbosely)
965 fprintf(stderr,
966 "Resuming fetch of index for pack %s at byte %ld\n",
967 hex, prev_posn);
968 sprintf(range, "Range: bytes=%ld-", prev_posn);
969 range_header = curl_slist_append(range_header, range);
970 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
971 }
972
973 if (start_active_slot(slot)) {
974 run_active_slot(slot);
baa7b67d 975 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
976 free(url);
977 fclose(indexfile);
978 return error("Unable to get pack index %s\n%s", url,
979 curl_errorstr);
980 }
981 } else {
982 free(url);
7b899967 983 fclose(indexfile);
58e60dd2
NH
984 return error("Unable to start request");
985 }
986
987 free(url);
988 fclose(indexfile);
989
990 return move_temp_to_file(tmpfile, filename);
991}
992
993static int setup_index(unsigned char *sha1)
994{
995 struct packed_git *new_pack;
58e60dd2
NH
996
997 if (fetch_index(sha1))
998 return -1;
999
1000 new_pack = parse_pack_index(sha1);
1001 new_pack->next = remote->packs;
1002 remote->packs = new_pack;
1003 return 0;
1004}
1005
f4f440a0 1006static int fetch_indices(void)
58e60dd2
NH
1007{
1008 unsigned char sha1[20];
1009 char *url;
028c2976 1010 struct strbuf buffer = STRBUF_INIT;
58e60dd2
NH
1011 char *data;
1012 int i = 0;
1013
1014 struct active_request_slot *slot;
baa7b67d 1015 struct slot_results results;
58e60dd2 1016
58e60dd2
NH
1017 if (push_verbosely)
1018 fprintf(stderr, "Getting pack list\n");
1a703cba
NH
1019
1020 url = xmalloc(strlen(remote->url) + 20);
1021 sprintf(url, "%sobjects/info/packs", remote->url);
58e60dd2
NH
1022
1023 slot = get_active_slot();
baa7b67d 1024 slot->results = &results;
58e60dd2 1025 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
29508e1e 1026 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1027 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1028 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
1029 if (start_active_slot(slot)) {
1030 run_active_slot(slot);
baa7b67d 1031 if (results.curl_result != CURLE_OK) {
028c2976 1032 strbuf_release(&buffer);
58e60dd2 1033 free(url);
baa7b67d 1034 if (results.http_code == 404)
58e60dd2
NH
1035 return 0;
1036 else
1037 return error("%s", curl_errorstr);
1038 }
1039 } else {
028c2976 1040 strbuf_release(&buffer);
58e60dd2
NH
1041 free(url);
1042 return error("Unable to start request");
1043 }
1044 free(url);
1045
028c2976
MH
1046 data = buffer.buf;
1047 while (i < buffer.len) {
58e60dd2
NH
1048 switch (data[i]) {
1049 case 'P':
1050 i++;
028c2976 1051 if (i + 52 < buffer.len &&
cc44c765 1052 !prefixcmp(data + i, " pack-") &&
1968d77d 1053 !prefixcmp(data + i + 46, ".pack\n")) {
58e60dd2
NH
1054 get_sha1_hex(data + i + 6, sha1);
1055 setup_index(sha1);
1056 i += 51;
1057 break;
1058 }
1059 default:
1060 while (data[i] != '\n')
1061 i++;
1062 }
1063 i++;
1064 }
1065
028c2976 1066 strbuf_release(&buffer);
58e60dd2
NH
1067 return 0;
1068}
1069
aa1dbc98
NH
1070static void one_remote_object(const char *hex)
1071{
1072 unsigned char sha1[20];
1073 struct object *obj;
1074
1075 if (get_sha1_hex(hex, sha1) != 0)
1076 return;
1077
1078 obj = lookup_object(sha1);
1079 if (!obj)
1080 obj = parse_object(sha1);
1081
1082 /* Ignore remote objects that don't exist locally */
1083 if (!obj)
1084 return;
1085
1086 obj->flags |= REMOTE;
1087 if (!object_list_contains(objects, obj))
1f1e895f 1088 object_list_insert(obj, &objects);
aa1dbc98
NH
1089}
1090
acf59575 1091static void handle_lockprop_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1092{
acf59575
NH
1093 int *lock_flags = (int *)ctx->userData;
1094
1095 if (tag_closed) {
1096 if (!strcmp(ctx->name, DAV_CTX_LOCKENTRY)) {
1097 if ((*lock_flags & DAV_PROP_LOCKEX) &&
1098 (*lock_flags & DAV_PROP_LOCKWR)) {
1099 *lock_flags |= DAV_LOCK_OK;
1100 }
1101 *lock_flags &= DAV_LOCK_OK;
1102 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_WRITE)) {
1103 *lock_flags |= DAV_PROP_LOCKWR;
1104 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_EXCLUSIVE)) {
1105 *lock_flags |= DAV_PROP_LOCKEX;
1106 }
1107 }
26349b2e
NH
1108}
1109
acf59575 1110static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1111{
aa1dbc98 1112 struct remote_lock *lock = (struct remote_lock *)ctx->userData;
acf59575
NH
1113
1114 if (tag_closed && ctx->cdata) {
1115 if (!strcmp(ctx->name, DAV_ACTIVELOCK_OWNER)) {
1116 lock->owner = xmalloc(strlen(ctx->cdata) + 1);
1117 strcpy(lock->owner, ctx->cdata);
1118 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TIMEOUT)) {
cc44c765 1119 if (!prefixcmp(ctx->cdata, "Second-"))
acf59575
NH
1120 lock->timeout =
1121 strtol(ctx->cdata + 7, NULL, 10);
1122 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
753bc911
KK
1123 lock->token = xmalloc(strlen(ctx->cdata) + 1);
1124 strcpy(lock->token, ctx->cdata);
acf59575 1125 }
26349b2e
NH
1126 }
1127}
1128
aa1dbc98 1129static void one_remote_ref(char *refname);
aa1dbc98 1130
26349b2e 1131static void
acf59575 1132xml_start_tag(void *userData, const char *name, const char **atts)
26349b2e 1133{
acf59575 1134 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1135 const char *c = strchr(name, ':');
acf59575
NH
1136 int new_len;
1137
1138 if (c == NULL)
1139 c = name;
1140 else
1141 c++;
1142
1143 new_len = strlen(ctx->name) + strlen(c) + 2;
1144
1145 if (new_len > ctx->len) {
1146 ctx->name = xrealloc(ctx->name, new_len);
1147 ctx->len = new_len;
26349b2e 1148 }
acf59575
NH
1149 strcat(ctx->name, ".");
1150 strcat(ctx->name, c);
26349b2e 1151
4cac42b1
JH
1152 free(ctx->cdata);
1153 ctx->cdata = NULL;
acf59575
NH
1154
1155 ctx->userFunc(ctx, 0);
26349b2e
NH
1156}
1157
58e60dd2 1158static void
acf59575 1159xml_end_tag(void *userData, const char *name)
58e60dd2 1160{
acf59575 1161 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1162 const char *c = strchr(name, ':');
acf59575 1163 char *ep;
58e60dd2 1164
acf59575
NH
1165 ctx->userFunc(ctx, 1);
1166
1167 if (c == NULL)
1168 c = name;
1169 else
1170 c++;
1171
1172 ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
1173 *ep = 0;
58e60dd2
NH
1174}
1175
1176static void
acf59575 1177xml_cdata(void *userData, const XML_Char *s, int len)
58e60dd2 1178{
acf59575 1179 struct xml_ctx *ctx = (struct xml_ctx *)userData;
4cac42b1 1180 free(ctx->cdata);
182af834 1181 ctx->cdata = xmemdupz(s, len);
58e60dd2
NH
1182}
1183
554fe20d 1184static struct remote_lock *lock_remote(const char *path, long timeout)
58e60dd2
NH
1185{
1186 struct active_request_slot *slot;
baa7b67d 1187 struct slot_results results;
028c2976
MH
1188 struct buffer out_buffer = { STRBUF_INIT, 0 };
1189 struct strbuf in_buffer = STRBUF_INIT;
58e60dd2 1190 char *url;
0772b9a6 1191 char *ep;
58e60dd2 1192 char timeout_header[25];
512d632c 1193 struct remote_lock *lock = NULL;
58e60dd2 1194 struct curl_slist *dav_headers = NULL;
acf59575 1195 struct xml_ctx ctx;
58e60dd2 1196
aa1dbc98
NH
1197 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
1198 sprintf(url, "%s%s", remote->url, path);
1199
0772b9a6 1200 /* Make sure leading directories exist for the remote ref */
2c46759d 1201 ep = strchr(url + strlen(remote->url) + 1, '/');
0772b9a6
NH
1202 while (ep) {
1203 *ep = 0;
1204 slot = get_active_slot();
baa7b67d 1205 slot->results = &results;
0772b9a6
NH
1206 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
1207 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1208 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
1209 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1210 if (start_active_slot(slot)) {
1211 run_active_slot(slot);
baa7b67d
NH
1212 if (results.curl_result != CURLE_OK &&
1213 results.http_code != 405) {
0772b9a6
NH
1214 fprintf(stderr,
1215 "Unable to create branch path %s\n",
1216 url);
1217 free(url);
1218 return NULL;
1219 }
1220 } else {
1a703cba 1221 fprintf(stderr, "Unable to start MKCOL request\n");
0772b9a6
NH
1222 free(url);
1223 return NULL;
1224 }
1225 *ep = '/';
1226 ep = strchr(ep + 1, '/');
1227 }
1228
028c2976 1229 strbuf_addf(&out_buffer.buf, LOCK_REQUEST, git_default_email);
26349b2e 1230
75187c9d 1231 sprintf(timeout_header, "Timeout: Second-%ld", timeout);
58e60dd2
NH
1232 dav_headers = curl_slist_append(dav_headers, timeout_header);
1233 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1234
1235 slot = get_active_slot();
baa7b67d 1236 slot->results = &results;
58e60dd2 1237 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1238 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2 1239 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
26349b2e 1240 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1241 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1242 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1243 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1244 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
1245 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1246
aa1dbc98 1247 lock = xcalloc(1, sizeof(*lock));
aa1dbc98 1248 lock->timeout = -1;
acf59575 1249
58e60dd2
NH
1250 if (start_active_slot(slot)) {
1251 run_active_slot(slot);
baa7b67d 1252 if (results.curl_result == CURLE_OK) {
472b2570
MH
1253 XML_Parser parser = XML_ParserCreate(NULL);
1254 enum XML_Status result;
acf59575
NH
1255 ctx.name = xcalloc(10, 1);
1256 ctx.len = 0;
1257 ctx.cdata = NULL;
1258 ctx.userFunc = handle_new_lock_ctx;
aa1dbc98 1259 ctx.userData = lock;
acf59575
NH
1260 XML_SetUserData(parser, &ctx);
1261 XML_SetElementHandler(parser, xml_start_tag,
1262 xml_end_tag);
1263 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
1264 result = XML_Parse(parser, in_buffer.buf,
1265 in_buffer.len, 1);
acf59575
NH
1266 free(ctx.name);
1267 if (result != XML_STATUS_OK) {
1268 fprintf(stderr, "XML error: %s\n",
1269 XML_ErrorString(
1270 XML_GetErrorCode(parser)));
aa1dbc98 1271 lock->timeout = -1;
acf59575 1272 }
472b2570 1273 XML_ParserFree(parser);
58e60dd2
NH
1274 }
1275 } else {
1a703cba 1276 fprintf(stderr, "Unable to start LOCK request\n");
58e60dd2
NH
1277 }
1278
acf59575 1279 curl_slist_free_all(dav_headers);
028c2976
MH
1280 strbuf_release(&out_buffer.buf);
1281 strbuf_release(&in_buffer);
26349b2e 1282
aa1dbc98 1283 if (lock->token == NULL || lock->timeout <= 0) {
8e0f7003
JM
1284 free(lock->token);
1285 free(lock->owner);
75187c9d 1286 free(url);
aa1dbc98
NH
1287 free(lock);
1288 lock = NULL;
acf59575 1289 } else {
aa1dbc98 1290 lock->url = url;
aa1dbc98 1291 lock->start_time = time(NULL);
512d632c
NH
1292 lock->next = remote->locks;
1293 remote->locks = lock;
26349b2e
NH
1294 }
1295
aa1dbc98 1296 return lock;
58e60dd2
NH
1297}
1298
aa1dbc98 1299static int unlock_remote(struct remote_lock *lock)
58e60dd2
NH
1300{
1301 struct active_request_slot *slot;
baa7b67d 1302 struct slot_results results;
512d632c 1303 struct remote_lock *prev = remote->locks;
58e60dd2
NH
1304 char *lock_token_header;
1305 struct curl_slist *dav_headers = NULL;
1306 int rc = 0;
1307
26349b2e 1308 lock_token_header = xmalloc(strlen(lock->token) + 31);
753bc911 1309 sprintf(lock_token_header, "Lock-Token: <%s>",
26349b2e 1310 lock->token);
58e60dd2
NH
1311 dav_headers = curl_slist_append(dav_headers, lock_token_header);
1312
1313 slot = get_active_slot();
baa7b67d 1314 slot->results = &results;
58e60dd2 1315 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
75187c9d 1316 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1317 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_UNLOCK);
1318 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1319
1320 if (start_active_slot(slot)) {
1321 run_active_slot(slot);
baa7b67d 1322 if (results.curl_result == CURLE_OK)
58e60dd2
NH
1323 rc = 1;
1324 else
512d632c 1325 fprintf(stderr, "UNLOCK HTTP error %ld\n",
baa7b67d 1326 results.http_code);
58e60dd2 1327 } else {
512d632c 1328 fprintf(stderr, "Unable to start UNLOCK request\n");
58e60dd2
NH
1329 }
1330
1331 curl_slist_free_all(dav_headers);
1332 free(lock_token_header);
75187c9d 1333
512d632c
NH
1334 if (remote->locks == lock) {
1335 remote->locks = lock->next;
1336 } else {
1337 while (prev && prev->next != lock)
1338 prev = prev->next;
1339 if (prev)
1340 prev->next = prev->next->next;
1341 }
1342
8e0f7003 1343 free(lock->owner);
512d632c
NH
1344 free(lock->url);
1345 free(lock->token);
1346 free(lock);
58e60dd2
NH
1347
1348 return rc;
1349}
1350
6a491a17
CB
1351static void remove_locks(void)
1352{
1353 struct remote_lock *lock = remote->locks;
1354
1355 fprintf(stderr, "Removing remote locks...\n");
1356 while (lock) {
1357 unlock_remote(lock);
1358 lock = lock->next;
1359 }
1360}
1361
1362static void remove_locks_on_signal(int signo)
1363{
1364 remove_locks();
1365 signal(signo, SIG_DFL);
1366 raise(signo);
1367}
1368
3030baa7
NH
1369static void remote_ls(const char *path, int flags,
1370 void (*userFunc)(struct remote_ls_ctx *ls),
1371 void *userData);
aa1dbc98 1372
3030baa7
NH
1373static void process_ls_object(struct remote_ls_ctx *ls)
1374{
1375 unsigned int *parent = (unsigned int *)ls->userData;
1376 char *path = ls->dentry_name;
1377 char *obj_hex;
aa1dbc98 1378
3030baa7
NH
1379 if (!strcmp(ls->path, ls->dentry_name) && (ls->flags & IS_DIR)) {
1380 remote_dir_exists[*parent] = 1;
1381 return;
1382 }
aa1dbc98 1383
3030baa7
NH
1384 if (strlen(path) != 49)
1385 return;
1386 path += 8;
1387 obj_hex = xmalloc(strlen(path));
eecc8367
ER
1388 /* NB: path is not null-terminated, can not use strlcpy here */
1389 memcpy(obj_hex, path, 2);
3030baa7
NH
1390 strcpy(obj_hex + 2, path + 3);
1391 one_remote_object(obj_hex);
1392 free(obj_hex);
1393}
aa1dbc98 1394
3030baa7
NH
1395static void process_ls_ref(struct remote_ls_ctx *ls)
1396{
1397 if (!strcmp(ls->path, ls->dentry_name) && (ls->dentry_flags & IS_DIR)) {
1398 fprintf(stderr, " %s\n", ls->dentry_name);
1399 return;
1400 }
aa1dbc98 1401
3030baa7
NH
1402 if (!(ls->dentry_flags & IS_DIR))
1403 one_remote_ref(ls->dentry_name);
1404}
aa1dbc98 1405
3030baa7
NH
1406static void handle_remote_ls_ctx(struct xml_ctx *ctx, int tag_closed)
1407{
1408 struct remote_ls_ctx *ls = (struct remote_ls_ctx *)ctx->userData;
aa1dbc98 1409
3030baa7
NH
1410 if (tag_closed) {
1411 if (!strcmp(ctx->name, DAV_PROPFIND_RESP) && ls->dentry_name) {
1412 if (ls->dentry_flags & IS_DIR) {
1413 if (ls->flags & PROCESS_DIRS) {
1414 ls->userFunc(ls);
1415 }
1416 if (strcmp(ls->dentry_name, ls->path) &&
1417 ls->flags & RECURSIVE) {
1418 remote_ls(ls->dentry_name,
1419 ls->flags,
1420 ls->userFunc,
1421 ls->userData);
1422 }
1423 } else if (ls->flags & PROCESS_FILES) {
1424 ls->userFunc(ls);
aa1dbc98 1425 }
3030baa7
NH
1426 } else if (!strcmp(ctx->name, DAV_PROPFIND_NAME) && ctx->cdata) {
1427 ls->dentry_name = xmalloc(strlen(ctx->cdata) -
1428 remote->path_len + 1);
1429 strcpy(ls->dentry_name, ctx->cdata + remote->path_len);
1430 } else if (!strcmp(ctx->name, DAV_PROPFIND_COLLECTION)) {
1431 ls->dentry_flags |= IS_DIR;
aa1dbc98 1432 }
3030baa7 1433 } else if (!strcmp(ctx->name, DAV_PROPFIND_RESP)) {
4cac42b1 1434 free(ls->dentry_name);
3030baa7
NH
1435 ls->dentry_name = NULL;
1436 ls->dentry_flags = 0;
aa1dbc98 1437 }
aa1dbc98
NH
1438}
1439
3030baa7
NH
1440static void remote_ls(const char *path, int flags,
1441 void (*userFunc)(struct remote_ls_ctx *ls),
1442 void *userData)
aa1dbc98 1443{
3030baa7 1444 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
aa1dbc98 1445 struct active_request_slot *slot;
baa7b67d 1446 struct slot_results results;
028c2976
MH
1447 struct strbuf in_buffer = STRBUF_INIT;
1448 struct buffer out_buffer = { STRBUF_INIT, 0 };
aa1dbc98
NH
1449 struct curl_slist *dav_headers = NULL;
1450 struct xml_ctx ctx;
3030baa7
NH
1451 struct remote_ls_ctx ls;
1452
1453 ls.flags = flags;
9befac47 1454 ls.path = xstrdup(path);
3030baa7
NH
1455 ls.dentry_name = NULL;
1456 ls.dentry_flags = 0;
1457 ls.userData = userData;
1458 ls.userFunc = userFunc;
aa1dbc98 1459
aa1dbc98
NH
1460 sprintf(url, "%s%s", remote->url, path);
1461
028c2976 1462 strbuf_addf(&out_buffer.buf, PROPFIND_ALL_REQUEST);
aa1dbc98
NH
1463
1464 dav_headers = curl_slist_append(dav_headers, "Depth: 1");
1465 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1466
1467 slot = get_active_slot();
baa7b67d 1468 slot->results = &results;
aa1dbc98 1469 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1470 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
aa1dbc98
NH
1471 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1472 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
1473 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
1474 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1475 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1476 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1477 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1478
1479 if (start_active_slot(slot)) {
1480 run_active_slot(slot);
baa7b67d 1481 if (results.curl_result == CURLE_OK) {
472b2570
MH
1482 XML_Parser parser = XML_ParserCreate(NULL);
1483 enum XML_Status result;
aa1dbc98
NH
1484 ctx.name = xcalloc(10, 1);
1485 ctx.len = 0;
1486 ctx.cdata = NULL;
3030baa7
NH
1487 ctx.userFunc = handle_remote_ls_ctx;
1488 ctx.userData = &ls;
aa1dbc98
NH
1489 XML_SetUserData(parser, &ctx);
1490 XML_SetElementHandler(parser, xml_start_tag,
1491 xml_end_tag);
1492 XML_SetCharacterDataHandler(parser, xml_cdata);
028c2976
MH
1493 result = XML_Parse(parser, in_buffer.buf,
1494 in_buffer.len, 1);
aa1dbc98
NH
1495 free(ctx.name);
1496
1497 if (result != XML_STATUS_OK) {
1498 fprintf(stderr, "XML error: %s\n",
1499 XML_ErrorString(
1500 XML_GetErrorCode(parser)));
1501 }
472b2570 1502 XML_ParserFree(parser);
aa1dbc98
NH
1503 }
1504 } else {
3030baa7 1505 fprintf(stderr, "Unable to start PROPFIND request\n");
aa1dbc98
NH
1506 }
1507
3030baa7 1508 free(ls.path);
aa1dbc98 1509 free(url);
028c2976
MH
1510 strbuf_release(&out_buffer.buf);
1511 strbuf_release(&in_buffer);
aa1dbc98
NH
1512 curl_slist_free_all(dav_headers);
1513}
1514
3030baa7
NH
1515static void get_remote_object_list(unsigned char parent)
1516{
1517 char path[] = "objects/XX/";
1518 static const char hex[] = "0123456789abcdef";
1519 unsigned int val = parent;
1520
1521 path[8] = hex[val >> 4];
1522 path[9] = hex[val & 0xf];
1523 remote_dir_exists[val] = 0;
1524 remote_ls(path, (PROCESS_FILES | PROCESS_DIRS),
1525 process_ls_object, &val);
1526}
1527
acf59575 1528static int locking_available(void)
58e60dd2
NH
1529{
1530 struct active_request_slot *slot;
baa7b67d 1531 struct slot_results results;
028c2976
MH
1532 struct strbuf in_buffer = STRBUF_INIT;
1533 struct buffer out_buffer = { STRBUF_INIT, 0 };
58e60dd2 1534 struct curl_slist *dav_headers = NULL;
acf59575
NH
1535 struct xml_ctx ctx;
1536 int lock_flags = 0;
58e60dd2 1537
028c2976 1538 strbuf_addf(&out_buffer.buf, PROPFIND_SUPPORTEDLOCK_REQUEST, remote->url);
58e60dd2
NH
1539
1540 dav_headers = curl_slist_append(dav_headers, "Depth: 0");
1541 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
baa7b67d 1542
58e60dd2 1543 slot = get_active_slot();
baa7b67d 1544 slot->results = &results;
58e60dd2 1545 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1546 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2
NH
1547 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1548 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1549 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1550 curl_easy_setopt(slot->curl, CURLOPT_URL, remote->url);
1551 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1552 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1553 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1554
1555 if (start_active_slot(slot)) {
1556 run_active_slot(slot);
baa7b67d 1557 if (results.curl_result == CURLE_OK) {
472b2570
MH
1558 XML_Parser parser = XML_ParserCreate(NULL);
1559 enum XML_Status result;
acf59575
NH
1560 ctx.name = xcalloc(10, 1);
1561 ctx.len = 0;
1562 ctx.cdata = NULL;
1563 ctx.userFunc = handle_lockprop_ctx;
1564 ctx.userData = &lock_flags;
1565 XML_SetUserData(parser, &ctx);
1566 XML_SetElementHandler(parser, xml_start_tag,
1567 xml_end_tag);
028c2976
MH
1568 result = XML_Parse(parser, in_buffer.buf,
1569 in_buffer.len, 1);
acf59575
NH
1570 free(ctx.name);
1571
1572 if (result != XML_STATUS_OK) {
1573 fprintf(stderr, "XML error: %s\n",
1574 XML_ErrorString(
1575 XML_GetErrorCode(parser)));
1576 lock_flags = 0;
1577 }
472b2570 1578 XML_ParserFree(parser);
325ce395
JH
1579 if (!lock_flags)
1580 error("Error: no DAV locking support on %s",
1581 remote->url);
1582
1583 } else {
1584 error("Cannot access URL %s, return code %d",
1585 remote->url, results.curl_result);
1586 lock_flags = 0;
58e60dd2 1587 }
58e60dd2 1588 } else {
325ce395 1589 error("Unable to start PROPFIND request on %s", remote->url);
58e60dd2
NH
1590 }
1591
028c2976
MH
1592 strbuf_release(&out_buffer.buf);
1593 strbuf_release(&in_buffer);
acf59575
NH
1594 curl_slist_free_all(dav_headers);
1595
1596 return lock_flags;
58e60dd2
NH
1597}
1598
b5bf7cd6 1599static struct object_list **add_one_object(struct object *obj, struct object_list **p)
1f1e895f
LT
1600{
1601 struct object_list *entry = xmalloc(sizeof(struct object_list));
1602 entry->item = obj;
1603 entry->next = *p;
1604 *p = entry;
1605 return &entry->next;
1606}
1607
aa1dbc98
NH
1608static struct object_list **process_blob(struct blob *blob,
1609 struct object_list **p,
1610 struct name_path *path,
1611 const char *name)
58e60dd2 1612{
aa1dbc98 1613 struct object *obj = &blob->object;
58e60dd2 1614
aa1dbc98
NH
1615 obj->flags |= LOCAL;
1616
1617 if (obj->flags & (UNINTERESTING | SEEN))
1618 return p;
1619
1620 obj->flags |= SEEN;
1f1e895f 1621 return add_one_object(obj, p);
aa1dbc98
NH
1622}
1623
1624static struct object_list **process_tree(struct tree *tree,
1625 struct object_list **p,
1626 struct name_path *path,
1627 const char *name)
1628{
1629 struct object *obj = &tree->object;
2d9c58c6 1630 struct tree_desc desc;
4c068a98 1631 struct name_entry entry;
aa1dbc98
NH
1632 struct name_path me;
1633
1634 obj->flags |= LOCAL;
1635
1636 if (obj->flags & (UNINTERESTING | SEEN))
1637 return p;
1638 if (parse_tree(tree) < 0)
1639 die("bad tree object %s", sha1_to_hex(obj->sha1));
1640
1641 obj->flags |= SEEN;
9befac47 1642 name = xstrdup(name);
1f1e895f 1643 p = add_one_object(obj, p);
aa1dbc98
NH
1644 me.up = path;
1645 me.elem = name;
1646 me.elem_len = strlen(name);
2d9c58c6 1647
6fda5e51 1648 init_tree_desc(&desc, tree->buffer, tree->size);
2d9c58c6 1649
1bbeb4c6
JS
1650 while (tree_entry(&desc, &entry))
1651 switch (object_type(entry.mode)) {
1652 case OBJ_TREE:
4c068a98 1653 p = process_tree(lookup_tree(entry.sha1), p, &me, name);
1bbeb4c6
JS
1654 break;
1655 case OBJ_BLOB:
4c068a98 1656 p = process_blob(lookup_blob(entry.sha1), p, &me, name);
1bbeb4c6
JS
1657 break;
1658 default:
1659 /* Subproject commit - not in this repository */
1660 break;
1661 }
1662
2d9c58c6
LT
1663 free(tree->buffer);
1664 tree->buffer = NULL;
aa1dbc98 1665 return p;
58e60dd2
NH
1666}
1667
1a703cba 1668static int get_delta(struct rev_info *revs, struct remote_lock *lock)
58e60dd2 1669{
1f1e895f 1670 int i;
58e60dd2 1671 struct commit *commit;
1f1e895f 1672 struct object_list **p = &objects;
1a703cba 1673 int count = 0;
58e60dd2 1674
aa1dbc98
NH
1675 while ((commit = get_revision(revs)) != NULL) {
1676 p = process_tree(commit->tree, p, NULL, "");
1677 commit->object.flags |= LOCAL;
1678 if (!(commit->object.flags & UNINTERESTING))
1a703cba 1679 count += add_send_request(&commit->object, lock);
aa1dbc98 1680 }
58e60dd2 1681
1f1e895f
LT
1682 for (i = 0; i < revs->pending.nr; i++) {
1683 struct object_array_entry *entry = revs->pending.objects + i;
1684 struct object *obj = entry->item;
1685 const char *name = entry->name;
58e60dd2 1686
aa1dbc98
NH
1687 if (obj->flags & (UNINTERESTING | SEEN))
1688 continue;
1974632c 1689 if (obj->type == OBJ_TAG) {
aa1dbc98 1690 obj->flags |= SEEN;
1f1e895f 1691 p = add_one_object(obj, p);
aa1dbc98 1692 continue;
58e60dd2 1693 }
1974632c 1694 if (obj->type == OBJ_TREE) {
aa1dbc98
NH
1695 p = process_tree((struct tree *)obj, p, NULL, name);
1696 continue;
58e60dd2 1697 }
1974632c 1698 if (obj->type == OBJ_BLOB) {
aa1dbc98
NH
1699 p = process_blob((struct blob *)obj, p, NULL, name);
1700 continue;
58e60dd2 1701 }
aa1dbc98
NH
1702 die("unknown pending object %s (%s)", sha1_to_hex(obj->sha1), name);
1703 }
1704
1705 while (objects) {
1706 if (!(objects->item->flags & UNINTERESTING))
1a703cba 1707 count += add_send_request(objects->item, lock);
aa1dbc98 1708 objects = objects->next;
58e60dd2 1709 }
1a703cba
NH
1710
1711 return count;
58e60dd2
NH
1712}
1713
aa1dbc98 1714static int update_remote(unsigned char *sha1, struct remote_lock *lock)
58e60dd2
NH
1715{
1716 struct active_request_slot *slot;
baa7b67d 1717 struct slot_results results;
58e60dd2 1718 char *if_header;
028c2976 1719 struct buffer out_buffer = { STRBUF_INIT, 0 };
58e60dd2 1720 struct curl_slist *dav_headers = NULL;
58e60dd2 1721
26349b2e 1722 if_header = xmalloc(strlen(lock->token) + 25);
753bc911 1723 sprintf(if_header, "If: (<%s>)", lock->token);
58e60dd2
NH
1724 dav_headers = curl_slist_append(dav_headers, if_header);
1725
028c2976 1726 strbuf_addf(&out_buffer.buf, "%s\n", sha1_to_hex(sha1));
58e60dd2
NH
1727
1728 slot = get_active_slot();
baa7b67d 1729 slot->results = &results;
58e60dd2 1730 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
028c2976 1731 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.buf.len);
58e60dd2
NH
1732 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1733 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1734 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1735 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1736 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1737 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
75187c9d 1738 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1739
1740 if (start_active_slot(slot)) {
1741 run_active_slot(slot);
028c2976 1742 strbuf_release(&out_buffer.buf);
58e60dd2 1743 free(if_header);
baa7b67d 1744 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1745 fprintf(stderr,
1746 "PUT error: curl result=%d, HTTP code=%ld\n",
baa7b67d 1747 results.curl_result, results.http_code);
58e60dd2
NH
1748 /* We should attempt recovery? */
1749 return 0;
1750 }
1751 } else {
028c2976 1752 strbuf_release(&out_buffer.buf);
58e60dd2 1753 free(if_header);
58e60dd2
NH
1754 fprintf(stderr, "Unable to start PUT request\n");
1755 return 0;
1756 }
1757
1758 return 1;
1759}
1760
aa1dbc98
NH
1761static struct ref *local_refs, **local_tail;
1762static struct ref *remote_refs, **remote_tail;
1763
8da19775 1764static int one_local_ref(const char *refname, const unsigned char *sha1, int flag, void *cb_data)
aa1dbc98
NH
1765{
1766 struct ref *ref;
1767 int len = strlen(refname) + 1;
1768 ref = xcalloc(1, sizeof(*ref) + len);
e702496e 1769 hashcpy(ref->new_sha1, sha1);
aa1dbc98
NH
1770 memcpy(ref->name, refname, len);
1771 *local_tail = ref;
1772 local_tail = &ref->next;
1773 return 0;
1774}
1775
1776static void one_remote_ref(char *refname)
1777{
1778 struct ref *ref;
197e8951 1779 struct object *obj;
aa1dbc98 1780
59c69c0c 1781 ref = alloc_ref(refname);
c13b2633
DB
1782
1783 if (http_fetch_ref(remote->url, ref) != 0) {
aa1dbc98
NH
1784 fprintf(stderr,
1785 "Unable to fetch ref %s from %s\n",
1786 refname, remote->url);
c13b2633 1787 free(ref);
aa1dbc98
NH
1788 return;
1789 }
1790
197e8951
NH
1791 /*
1792 * Fetch a copy of the object if it doesn't exist locally - it
1793 * may be required for updating server info later.
1794 */
c13b2633
DB
1795 if (remote->can_update_info_refs && !has_sha1_file(ref->old_sha1)) {
1796 obj = lookup_unknown_object(ref->old_sha1);
197e8951
NH
1797 if (obj) {
1798 fprintf(stderr, " fetch %s for %s\n",
c13b2633 1799 sha1_to_hex(ref->old_sha1), refname);
197e8951
NH
1800 add_fetch_request(obj);
1801 }
1802 }
1803
aa1dbc98
NH
1804 *remote_tail = ref;
1805 remote_tail = &ref->next;
1806}
1807
1808static void get_local_heads(void)
1809{
1810 local_tail = &local_refs;
cb5d709f 1811 for_each_ref(one_local_ref, NULL);
aa1dbc98
NH
1812}
1813
1814static void get_dav_remote_heads(void)
1815{
1816 remote_tail = &remote_refs;
3030baa7 1817 remote_ls("refs/", (PROCESS_FILES | PROCESS_DIRS | RECURSIVE), process_ls_ref, NULL);
aa1dbc98
NH
1818}
1819
1820static int is_zero_sha1(const unsigned char *sha1)
1821{
1822 int i;
1823
1824 for (i = 0; i < 20; i++) {
1825 if (*sha1++)
1826 return 0;
1827 }
1828 return 1;
1829}
1830
1831static void unmark_and_free(struct commit_list *list, unsigned int mark)
1832{
1833 while (list) {
1834 struct commit_list *temp = list;
1835 temp->item->object.flags &= ~mark;
1836 list = temp->next;
1837 free(temp);
1838 }
1839}
1840
1841static int ref_newer(const unsigned char *new_sha1,
1842 const unsigned char *old_sha1)
1843{
1844 struct object *o;
1845 struct commit *old, *new;
1846 struct commit_list *list, *used;
1847 int found = 0;
1848
1849 /* Both new and old must be commit-ish and new is descendant of
1850 * old. Otherwise we require --force.
1851 */
1852 o = deref_tag(parse_object(old_sha1), NULL, 0);
1974632c 1853 if (!o || o->type != OBJ_COMMIT)
aa1dbc98
NH
1854 return 0;
1855 old = (struct commit *) o;
1856
1857 o = deref_tag(parse_object(new_sha1), NULL, 0);
1974632c 1858 if (!o || o->type != OBJ_COMMIT)
aa1dbc98
NH
1859 return 0;
1860 new = (struct commit *) o;
1861
1862 if (parse_commit(new) < 0)
1863 return 0;
1864
1865 used = list = NULL;
1866 commit_list_insert(new, &list);
1867 while (list) {
1868 new = pop_most_recent_commit(&list, TMP_MARK);
1869 commit_list_insert(new, &used);
1870 if (new == old) {
1871 found = 1;
1872 break;
1873 }
1874 }
1875 unmark_and_free(list, TMP_MARK);
1876 unmark_and_free(used, TMP_MARK);
1877 return found;
1878}
1879
197e8951
NH
1880static void add_remote_info_ref(struct remote_ls_ctx *ls)
1881{
028c2976 1882 struct strbuf *buf = (struct strbuf *)ls->userData;
197e8951
NH
1883 struct object *o;
1884 int len;
1885 char *ref_info;
c13b2633
DB
1886 struct ref *ref;
1887
59c69c0c 1888 ref = alloc_ref(ls->dentry_name);
197e8951 1889
c13b2633 1890 if (http_fetch_ref(remote->url, ref) != 0) {
197e8951
NH
1891 fprintf(stderr,
1892 "Unable to fetch ref %s from %s\n",
1893 ls->dentry_name, remote->url);
1894 aborted = 1;
c13b2633 1895 free(ref);
197e8951
NH
1896 return;
1897 }
1898
c13b2633 1899 o = parse_object(ref->old_sha1);
197e8951
NH
1900 if (!o) {
1901 fprintf(stderr,
1902 "Unable to parse object %s for remote ref %s\n",
c13b2633 1903 sha1_to_hex(ref->old_sha1), ls->dentry_name);
197e8951 1904 aborted = 1;
c13b2633 1905 free(ref);
197e8951
NH
1906 return;
1907 }
1908
1909 len = strlen(ls->dentry_name) + 42;
1910 ref_info = xcalloc(len + 1, 1);
1911 sprintf(ref_info, "%s %s\n",
c13b2633 1912 sha1_to_hex(ref->old_sha1), ls->dentry_name);
197e8951
NH
1913 fwrite_buffer(ref_info, 1, len, buf);
1914 free(ref_info);
1915
1974632c 1916 if (o->type == OBJ_TAG) {
197e8951
NH
1917 o = deref_tag(o, ls->dentry_name, 0);
1918 if (o) {
1919 len = strlen(ls->dentry_name) + 45;
1920 ref_info = xcalloc(len + 1, 1);
1921 sprintf(ref_info, "%s %s^{}\n",
1922 sha1_to_hex(o->sha1), ls->dentry_name);
1923 fwrite_buffer(ref_info, 1, len, buf);
1924 free(ref_info);
1925 }
1926 }
c13b2633 1927 free(ref);
197e8951
NH
1928}
1929
1930static void update_remote_info_refs(struct remote_lock *lock)
1931{
028c2976 1932 struct buffer buffer = { STRBUF_INIT, 0 };
197e8951
NH
1933 struct active_request_slot *slot;
1934 struct slot_results results;
1935 char *if_header;
1936 struct curl_slist *dav_headers = NULL;
1937
197e8951 1938 remote_ls("refs/", (PROCESS_FILES | RECURSIVE),
028c2976 1939 add_remote_info_ref, &buffer.buf);
197e8951
NH
1940 if (!aborted) {
1941 if_header = xmalloc(strlen(lock->token) + 25);
753bc911 1942 sprintf(if_header, "If: (<%s>)", lock->token);
197e8951
NH
1943 dav_headers = curl_slist_append(dav_headers, if_header);
1944
1945 slot = get_active_slot();
1946 slot->results = &results;
1947 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &buffer);
028c2976 1948 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, buffer.buf.len);
197e8951
NH
1949 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1950 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1951 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1952 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1953 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1954 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
1955 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
1956
197e8951
NH
1957 if (start_active_slot(slot)) {
1958 run_active_slot(slot);
1959 if (results.curl_result != CURLE_OK) {
1960 fprintf(stderr,
1961 "PUT error: curl result=%d, HTTP code=%ld\n",
1962 results.curl_result, results.http_code);
1963 }
1964 }
1965 free(if_header);
1966 }
028c2976 1967 strbuf_release(&buffer.buf);
197e8951
NH
1968}
1969
1970static int remote_exists(const char *path)
1971{
1972 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
1973 struct active_request_slot *slot;
1974 struct slot_results results;
3a462bc9 1975 int ret = -1;
197e8951
NH
1976
1977 sprintf(url, "%s%s", remote->url, path);
1978
028c2976 1979 slot = get_active_slot();
197e8951 1980 slot->results = &results;
028c2976
MH
1981 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1982 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
197e8951 1983
028c2976 1984 if (start_active_slot(slot)) {
197e8951
NH
1985 run_active_slot(slot);
1986 if (results.http_code == 404)
3a462bc9 1987 ret = 0;
197e8951 1988 else if (results.curl_result == CURLE_OK)
3a462bc9 1989 ret = 1;
197e8951
NH
1990 else
1991 fprintf(stderr, "HEAD HTTP error %ld\n", results.http_code);
1992 } else {
1993 fprintf(stderr, "Unable to start HEAD request\n");
1994 }
1995
3a462bc9
MH
1996 free(url);
1997 return ret;
197e8951
NH
1998}
1999
554fe20d 2000static void fetch_symref(const char *path, char **symref, unsigned char *sha1)
3dfaf7bc
NH
2001{
2002 char *url;
028c2976 2003 struct strbuf buffer = STRBUF_INIT;
3dfaf7bc
NH
2004 struct active_request_slot *slot;
2005 struct slot_results results;
2006
2007 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
2008 sprintf(url, "%s%s", remote->url, path);
2009
3dfaf7bc
NH
2010 slot = get_active_slot();
2011 slot->results = &results;
2012 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
2013 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
2014 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
2015 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2016 if (start_active_slot(slot)) {
2017 run_active_slot(slot);
2018 if (results.curl_result != CURLE_OK) {
2019 die("Couldn't get %s for remote symref\n%s",
2020 url, curl_errorstr);
2021 }
2022 } else {
2023 die("Unable to start remote symref request");
2024 }
2025 free(url);
2026
8e0f7003 2027 free(*symref);
3dfaf7bc 2028 *symref = NULL;
a8e0d16d 2029 hashclr(sha1);
3dfaf7bc 2030
028c2976 2031 if (buffer.len == 0)
3dfaf7bc
NH
2032 return;
2033
2034 /* If it's a symref, set the refname; otherwise try for a sha1 */
028c2976
MH
2035 if (!prefixcmp((char *)buffer.buf, "ref: ")) {
2036 *symref = xmemdupz((char *)buffer.buf + 5, buffer.len - 6);
3dfaf7bc 2037 } else {
028c2976 2038 get_sha1_hex(buffer.buf, sha1);
3dfaf7bc
NH
2039 }
2040
028c2976 2041 strbuf_release(&buffer);
3dfaf7bc
NH
2042}
2043
2044static int verify_merge_base(unsigned char *head_sha1, unsigned char *branch_sha1)
2045{
61ffbcb9
JS
2046 struct commit *head = lookup_commit(head_sha1);
2047 struct commit *branch = lookup_commit(branch_sha1);
2048 struct commit_list *merge_bases = get_merge_bases(head, branch, 1);
3dfaf7bc 2049
0bc87ffb 2050 return (merge_bases && !merge_bases->next && merge_bases->item == branch);
3dfaf7bc
NH
2051}
2052
2053static int delete_remote_branch(char *pattern, int force)
2054{
2055 struct ref *refs = remote_refs;
2056 struct ref *remote_ref = NULL;
2057 unsigned char head_sha1[20];
2058 char *symref = NULL;
2059 int match;
2060 int patlen = strlen(pattern);
2061 int i;
2062 struct active_request_slot *slot;
2063 struct slot_results results;
2064 char *url;
2065
2066 /* Find the remote branch(es) matching the specified branch name */
2067 for (match = 0; refs; refs = refs->next) {
2068 char *name = refs->name;
2069 int namelen = strlen(name);
2070 if (namelen < patlen ||
2071 memcmp(name + namelen - patlen, pattern, patlen))
2072 continue;
2073 if (namelen != patlen && name[namelen - patlen - 1] != '/')
2074 continue;
2075 match++;
2076 remote_ref = refs;
2077 }
2078 if (match == 0)
2079 return error("No remote branch matches %s", pattern);
2080 if (match != 1)
2081 return error("More than one remote branch matches %s",
2082 pattern);
2083
2084 /*
2085 * Remote HEAD must be a symref (not exactly foolproof; a remote
2086 * symlink to a symref will look like a symref)
2087 */
2088 fetch_symref("HEAD", &symref, head_sha1);
2089 if (!symref)
2090 return error("Remote HEAD is not a symref");
2091
2092 /* Remote branch must not be the remote HEAD */
2093 for (i=0; symref && i<MAXDEPTH; i++) {
2094 if (!strcmp(remote_ref->name, symref))
2095 return error("Remote branch %s is the current HEAD",
2096 remote_ref->name);
2097 fetch_symref(symref, &symref, head_sha1);
2098 }
2099
2100 /* Run extra sanity checks if delete is not forced */
2101 if (!force) {
2102 /* Remote HEAD must resolve to a known object */
2103 if (symref)
2104 return error("Remote HEAD symrefs too deep");
2105 if (is_zero_sha1(head_sha1))
2106 return error("Unable to resolve remote HEAD");
2107 if (!has_sha1_file(head_sha1))
2108 return error("Remote HEAD resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", sha1_to_hex(head_sha1));
2109
2110 /* Remote branch must resolve to a known object */
2111 if (is_zero_sha1(remote_ref->old_sha1))
2112 return error("Unable to resolve remote branch %s",
2113 remote_ref->name);
2114 if (!has_sha1_file(remote_ref->old_sha1))
2115 return error("Remote branch %s resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", remote_ref->name, sha1_to_hex(remote_ref->old_sha1));
2116
2117 /* Remote branch must be an ancestor of remote HEAD */
2118 if (!verify_merge_base(head_sha1, remote_ref->old_sha1)) {
00ae8289
BF
2119 return error("The branch '%s' is not an ancestor "
2120 "of your current HEAD.\n"
2121 "If you are sure you want to delete it,"
2122 " run:\n\t'git http-push -D %s %s'",
2123 remote_ref->name, remote->url, pattern);
3dfaf7bc
NH
2124 }
2125 }
2126
2127 /* Send delete request */
2128 fprintf(stderr, "Removing remote branch '%s'\n", remote_ref->name);
6eaf4060
CB
2129 if (dry_run)
2130 return 0;
3dfaf7bc
NH
2131 url = xmalloc(strlen(remote->url) + strlen(remote_ref->name) + 1);
2132 sprintf(url, "%s%s", remote->url, remote_ref->name);
2133 slot = get_active_slot();
2134 slot->results = &results;
2135 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
2136 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
2137 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2138 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_DELETE);
2139 if (start_active_slot(slot)) {
2140 run_active_slot(slot);
2141 free(url);
2142 if (results.curl_result != CURLE_OK)
2143 return error("DELETE request failed (%d/%ld)\n",
2144 results.curl_result, results.http_code);
2145 } else {
2146 free(url);
2147 return error("Unable to start DELETE request");
2148 }
2149
2150 return 0;
2151}
2152
58e60dd2
NH
2153int main(int argc, char **argv)
2154{
58e60dd2
NH
2155 struct transfer_request *request;
2156 struct transfer_request *next_request;
2157 int nr_refspec = 0;
2158 char **refspec = NULL;
512d632c 2159 struct remote_lock *ref_lock = NULL;
197e8951 2160 struct remote_lock *info_ref_lock = NULL;
aa1dbc98 2161 struct rev_info revs;
3dfaf7bc
NH
2162 int delete_branch = 0;
2163 int force_delete = 0;
1a703cba 2164 int objects_to_send;
58e60dd2
NH
2165 int rc = 0;
2166 int i;
8c9e7947
JH
2167 int new_refs;
2168 struct ref *ref;
3057ded0 2169 char *rewritten_url = NULL;
58e60dd2 2170
5a327713 2171 setup_git_directory();
58e60dd2 2172
512d632c 2173 remote = xcalloc(sizeof(*remote), 1);
58e60dd2
NH
2174
2175 argv++;
2176 for (i = 1; i < argc; i++, argv++) {
2177 char *arg = *argv;
2178
2179 if (*arg == '-') {
aa1dbc98 2180 if (!strcmp(arg, "--all")) {
28b9d6e5 2181 push_all = MATCH_REFS_ALL;
58e60dd2
NH
2182 continue;
2183 }
2184 if (!strcmp(arg, "--force")) {
2185 force_all = 1;
2186 continue;
2187 }
fe5d1d3e
SP
2188 if (!strcmp(arg, "--dry-run")) {
2189 dry_run = 1;
2190 continue;
2191 }
58e60dd2
NH
2192 if (!strcmp(arg, "--verbose")) {
2193 push_verbosely = 1;
2194 continue;
2195 }
3dfaf7bc
NH
2196 if (!strcmp(arg, "-d")) {
2197 delete_branch = 1;
2198 continue;
2199 }
2200 if (!strcmp(arg, "-D")) {
2201 delete_branch = 1;
2202 force_delete = 1;
2203 continue;
2204 }
58e60dd2
NH
2205 }
2206 if (!remote->url) {
aa1dbc98 2207 char *path = strstr(arg, "//");
8c9e7947 2208 remote->url = arg;
aa1dbc98 2209 if (path) {
ef9e58c8 2210 path = strchr(path+2, '/');
aa1dbc98
NH
2211 if (path)
2212 remote->path_len = strlen(path);
2213 }
58e60dd2
NH
2214 continue;
2215 }
2216 refspec = argv;
2217 nr_refspec = argc - i;
2218 break;
2219 }
2220
f854824b
GB
2221#ifndef USE_CURL_MULTI
2222 die("git-push is not available for http/https repository when not compiled with USE_CURL_MULTI");
2223#endif
2224
3e9fabc8
NH
2225 if (!remote->url)
2226 usage(http_push_usage);
2227
3dfaf7bc
NH
2228 if (delete_branch && nr_refspec != 1)
2229 die("You must specify only one branch name when deleting a remote branch");
2230
aa1dbc98 2231 memset(remote_dir_exists, -1, 256);
0dd276b8 2232
9fc6440d 2233 http_init(NULL);
58e60dd2
NH
2234
2235 no_pragma_header = curl_slist_append(no_pragma_header, "Pragma:");
58e60dd2 2236
3057ded0 2237 if (remote->url && remote->url[strlen(remote->url)-1] != '/') {
e8eec71d 2238 rewritten_url = xmalloc(strlen(remote->url)+2);
3057ded0
GB
2239 strcpy(rewritten_url, remote->url);
2240 strcat(rewritten_url, "/");
2241 remote->url = rewritten_url;
2242 ++remote->path_len;
2243 }
2244
58e60dd2 2245 /* Verify DAV compliance/lock support */
acf59575 2246 if (!locking_available()) {
58e60dd2
NH
2247 rc = 1;
2248 goto cleanup;
2249 }
2250
6a491a17
CB
2251 signal(SIGINT, remove_locks_on_signal);
2252 signal(SIGHUP, remove_locks_on_signal);
2253 signal(SIGQUIT, remove_locks_on_signal);
ad5fa3cc 2254 signal(SIGTERM, remove_locks_on_signal);
6a491a17 2255
197e8951
NH
2256 /* Check whether the remote has server info files */
2257 remote->can_update_info_refs = 0;
2258 remote->has_info_refs = remote_exists("info/refs");
2259 remote->has_info_packs = remote_exists("objects/info/packs");
2260 if (remote->has_info_refs) {
2261 info_ref_lock = lock_remote("info/refs", LOCK_TIME);
2262 if (info_ref_lock)
2263 remote->can_update_info_refs = 1;
9bdbabad
GB
2264 else {
2265 fprintf(stderr, "Error: cannot lock existing info/refs\n");
2266 rc = 1;
2267 goto cleanup;
2268 }
197e8951
NH
2269 }
2270 if (remote->has_info_packs)
2271 fetch_indices();
2272
aa1dbc98
NH
2273 /* Get a list of all local and remote heads to validate refspecs */
2274 get_local_heads();
2275 fprintf(stderr, "Fetching remote heads...\n");
2276 get_dav_remote_heads();
2277
3dfaf7bc
NH
2278 /* Remove a remote branch if -d or -D was specified */
2279 if (delete_branch) {
2280 if (delete_remote_branch(refspec[0], force_delete) == -1)
2281 fprintf(stderr, "Unable to delete remote branch %s\n",
2282 refspec[0]);
2283 goto cleanup;
2284 }
2285
aa1dbc98
NH
2286 /* match them up */
2287 if (!remote_tail)
2288 remote_tail = &remote_refs;
2289 if (match_refs(local_refs, remote_refs, &remote_tail,
9116de59
GB
2290 nr_refspec, (const char **) refspec, push_all)) {
2291 rc = -1;
2292 goto cleanup;
2293 }
aa1dbc98
NH
2294 if (!remote_refs) {
2295 fprintf(stderr, "No refs in common and none specified; doing nothing.\n");
9116de59
GB
2296 rc = 0;
2297 goto cleanup;
aa1dbc98
NH
2298 }
2299
8c9e7947 2300 new_refs = 0;
aa1dbc98
NH
2301 for (ref = remote_refs; ref; ref = ref->next) {
2302 char old_hex[60], *new_hex;
8c9e7947
JH
2303 const char *commit_argv[4];
2304 int commit_argc;
2305 char *new_sha1_hex, *old_sha1_hex;
2306
aa1dbc98
NH
2307 if (!ref->peer_ref)
2308 continue;
6eaf4060
CB
2309
2310 if (is_zero_sha1(ref->peer_ref->new_sha1)) {
2311 if (delete_remote_branch(ref->name, 1) == -1) {
2312 error("Could not remove %s", ref->name);
2313 rc = -4;
2314 }
2315 new_refs++;
2316 continue;
2317 }
2318
a89fccd2 2319 if (!hashcmp(ref->old_sha1, ref->peer_ref->new_sha1)) {
aa1dbc98
NH
2320 if (push_verbosely || 1)
2321 fprintf(stderr, "'%s': up-to-date\n", ref->name);
2322 continue;
2323 }
2324
2325 if (!force_all &&
2326 !is_zero_sha1(ref->old_sha1) &&
2327 !ref->force) {
2328 if (!has_sha1_file(ref->old_sha1) ||
2329 !ref_newer(ref->peer_ref->new_sha1,
2330 ref->old_sha1)) {
00ae8289
BF
2331 /*
2332 * We do not have the remote ref, or
aa1dbc98
NH
2333 * we know that the remote ref is not
2334 * an ancestor of what we are trying to
2335 * push. Either way this can be losing
2336 * commits at the remote end and likely
2337 * we were not up to date to begin with.
2338 */
00ae8289
BF
2339 error("remote '%s' is not an ancestor of\n"
2340 "local '%s'.\n"
2341 "Maybe you are not up-to-date and "
aa1dbc98
NH
2342 "need to pull first?",
2343 ref->name,
2344 ref->peer_ref->name);
1a703cba 2345 rc = -2;
aa1dbc98
NH
2346 continue;
2347 }
58e60dd2 2348 }
e702496e 2349 hashcpy(ref->new_sha1, ref->peer_ref->new_sha1);
aa1dbc98
NH
2350 new_refs++;
2351 strcpy(old_hex, sha1_to_hex(ref->old_sha1));
2352 new_hex = sha1_to_hex(ref->new_sha1);
2353
2354 fprintf(stderr, "updating '%s'", ref->name);
2355 if (strcmp(ref->name, ref->peer_ref->name))
2356 fprintf(stderr, " using '%s'", ref->peer_ref->name);
2357 fprintf(stderr, "\n from %s\n to %s\n", old_hex, new_hex);
fe5d1d3e
SP
2358 if (dry_run)
2359 continue;
58e60dd2
NH
2360
2361 /* Lock remote branch ref */
aa1dbc98
NH
2362 ref_lock = lock_remote(ref->name, LOCK_TIME);
2363 if (ref_lock == NULL) {
58e60dd2 2364 fprintf(stderr, "Unable to lock remote branch %s\n",
aa1dbc98 2365 ref->name);
58e60dd2
NH
2366 rc = 1;
2367 continue;
2368 }
2369
aa1dbc98 2370 /* Set up revision info for this refspec */
8c9e7947 2371 commit_argc = 3;
9befac47 2372 new_sha1_hex = xstrdup(sha1_to_hex(ref->new_sha1));
8c9e7947 2373 old_sha1_hex = NULL;
5241bfe6
NH
2374 commit_argv[1] = "--objects";
2375 commit_argv[2] = new_sha1_hex;
aa1dbc98
NH
2376 if (!push_all && !is_zero_sha1(ref->old_sha1)) {
2377 old_sha1_hex = xmalloc(42);
2378 sprintf(old_sha1_hex, "^%s",
2379 sha1_to_hex(ref->old_sha1));
5241bfe6 2380 commit_argv[3] = old_sha1_hex;
aa1dbc98 2381 commit_argc++;
58e60dd2 2382 }
db6296a5 2383 init_revisions(&revs, setup_git_directory());
aa1dbc98 2384 setup_revisions(commit_argc, commit_argv, &revs, NULL);
d633c882 2385 revs.edge_hint = 0; /* just in case */
aa1dbc98
NH
2386 free(new_sha1_hex);
2387 if (old_sha1_hex) {
2388 free(old_sha1_hex);
2389 commit_argv[1] = NULL;
58e60dd2
NH
2390 }
2391
aa1dbc98 2392 /* Generate a list of objects that need to be pushed */
58e60dd2 2393 pushing = 0;
3d51e1b5
MK
2394 if (prepare_revision_walk(&revs))
2395 die("revision walk setup failed");
d633c882 2396 mark_edges_uninteresting(revs.commits, &revs, NULL);
1a703cba 2397 objects_to_send = get_delta(&revs, ref_lock);
29508e1e 2398 finish_all_active_slots();
58e60dd2
NH
2399
2400 /* Push missing objects to remote, this would be a
2401 convenient time to pack them first if appropriate. */
2402 pushing = 1;
1a703cba
NH
2403 if (objects_to_send)
2404 fprintf(stderr, " sending %d objects\n",
2405 objects_to_send);
b3ca4e4e 2406#ifdef USE_CURL_MULTI
29508e1e 2407 fill_active_slots();
fc57b6aa 2408 add_fill_function(NULL, fill_active_slot);
b3ca4e4e 2409#endif
add8e8ce
JS
2410 do {
2411 finish_all_active_slots();
2412#ifdef USE_CURL_MULTI
2413 fill_active_slots();
2414#endif
2415 } while (request_queue_head && !aborted);
58e60dd2
NH
2416
2417 /* Update the remote branch if all went well */
7fea9c55 2418 if (aborted || !update_remote(ref->new_sha1, ref_lock))
aa1dbc98 2419 rc = 1;
58e60dd2 2420
aa1dbc98
NH
2421 if (!rc)
2422 fprintf(stderr, " done\n");
2423 unlock_remote(ref_lock);
512d632c 2424 check_locks();
58e60dd2
NH
2425 }
2426
197e8951
NH
2427 /* Update remote server info if appropriate */
2428 if (remote->has_info_refs && new_refs) {
2429 if (info_ref_lock && remote->can_update_info_refs) {
2430 fprintf(stderr, "Updating remote server info\n");
fe5d1d3e
SP
2431 if (!dry_run)
2432 update_remote_info_refs(info_ref_lock);
197e8951
NH
2433 } else {
2434 fprintf(stderr, "Unable to update server info\n");
2435 }
2436 }
197e8951 2437
58e60dd2 2438 cleanup:
8e0f7003 2439 free(rewritten_url);
9116de59
GB
2440 if (info_ref_lock)
2441 unlock_remote(info_ref_lock);
58e60dd2
NH
2442 free(remote);
2443
2444 curl_slist_free_all(no_pragma_header);
58e60dd2 2445
29508e1e 2446 http_cleanup();
58e60dd2
NH
2447
2448 request = request_queue_head;
2449 while (request != NULL) {
2450 next_request = request->next;
2451 release_request(request);
58e60dd2
NH
2452 request = next_request;
2453 }
2454
58e60dd2
NH
2455 return rc;
2456}