xdiff: minor changes to match libxdiff-0.21
[git/git.git] / http-push.c
CommitLineData
58e60dd2
NH
1#include "cache.h"
2#include "commit.h"
3#include "pack.h"
4#include "fetch.h"
5#include "tag.h"
6#include "blob.h"
29508e1e 7#include "http.h"
aa1dbc98 8#include "refs.h"
c4e05b1a 9#include "diff.h"
aa1dbc98 10#include "revision.h"
3dfaf7bc 11#include "exec_cmd.h"
29508e1e 12
bee8e79d 13#include <expat.h>
58e60dd2
NH
14
15static const char http_push_usage[] =
1a703cba 16"git-http-push [--all] [--force] [--verbose] <remote> [<head>...]\n";
58e60dd2 17
92e2eb9c
JS
18#ifndef XML_STATUS_OK
19enum XML_Status {
20 XML_STATUS_OK = 1,
21 XML_STATUS_ERROR = 0
22};
23#define XML_STATUS_OK 1
24#define XML_STATUS_ERROR 0
25#endif
26
197e8951 27#define PREV_BUF_SIZE 4096
58e60dd2
NH
28#define RANGE_HEADER_SIZE 30
29
acf59575 30/* DAV methods */
58e60dd2
NH
31#define DAV_LOCK "LOCK"
32#define DAV_MKCOL "MKCOL"
33#define DAV_MOVE "MOVE"
34#define DAV_PROPFIND "PROPFIND"
35#define DAV_PUT "PUT"
36#define DAV_UNLOCK "UNLOCK"
3dfaf7bc 37#define DAV_DELETE "DELETE"
acf59575
NH
38
39/* DAV lock flags */
40#define DAV_PROP_LOCKWR (1u << 0)
41#define DAV_PROP_LOCKEX (1u << 1)
42#define DAV_LOCK_OK (1u << 2)
43
44/* DAV XML properties */
45#define DAV_CTX_LOCKENTRY ".multistatus.response.propstat.prop.supportedlock.lockentry"
46#define DAV_CTX_LOCKTYPE_WRITE ".multistatus.response.propstat.prop.supportedlock.lockentry.locktype.write"
47#define DAV_CTX_LOCKTYPE_EXCLUSIVE ".multistatus.response.propstat.prop.supportedlock.lockentry.lockscope.exclusive"
48#define DAV_ACTIVELOCK_OWNER ".prop.lockdiscovery.activelock.owner.href"
49#define DAV_ACTIVELOCK_TIMEOUT ".prop.lockdiscovery.activelock.timeout"
50#define DAV_ACTIVELOCK_TOKEN ".prop.lockdiscovery.activelock.locktoken.href"
aa1dbc98
NH
51#define DAV_PROPFIND_RESP ".multistatus.response"
52#define DAV_PROPFIND_NAME ".multistatus.response.href"
53#define DAV_PROPFIND_COLLECTION ".multistatus.response.propstat.prop.resourcetype.collection"
acf59575
NH
54
55/* DAV request body templates */
aa1dbc98
NH
56#define PROPFIND_SUPPORTEDLOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:prop xmlns:R=\"%s\">\n<D:supportedlock/>\n</D:prop>\n</D:propfind>"
57#define PROPFIND_ALL_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:propfind xmlns:D=\"DAV:\">\n<D:allprop/>\n</D:propfind>"
58e60dd2
NH
58#define LOCK_REQUEST "<?xml version=\"1.0\" encoding=\"utf-8\" ?>\n<D:lockinfo xmlns:D=\"DAV:\">\n<D:lockscope><D:exclusive/></D:lockscope>\n<D:locktype><D:write/></D:locktype>\n<D:owner>\n<D:href>mailto:%s</D:href>\n</D:owner>\n</D:lockinfo>"
59
75187c9d
NH
60#define LOCK_TIME 600
61#define LOCK_REFRESH 30
62
1b65a5aa 63/* bits #0-15 in revision.h */
aa1dbc98 64
1b65a5aa
JH
65#define LOCAL (1u<<16)
66#define REMOTE (1u<<17)
67#define FETCHING (1u<<18)
68#define PUSHING (1u<<19)
aa1dbc98 69
3dfaf7bc
NH
70/* We allow "recursive" symbolic refs. Only within reason, though */
71#define MAXDEPTH 5
72
58e60dd2
NH
73static int pushing = 0;
74static int aborted = 0;
a3c57c9a 75static signed char remote_dir_exists[256];
58e60dd2 76
58e60dd2
NH
77static struct curl_slist *no_pragma_header;
78static struct curl_slist *default_headers;
58e60dd2
NH
79
80static int push_verbosely = 0;
81static int push_all = 0;
82static int force_all = 0;
83
aa1dbc98
NH
84static struct object_list *objects = NULL;
85
58e60dd2
NH
86struct repo
87{
88 char *url;
aa1dbc98 89 int path_len;
197e8951
NH
90 int has_info_refs;
91 int can_update_info_refs;
92 int has_info_packs;
58e60dd2 93 struct packed_git *packs;
512d632c 94 struct remote_lock *locks;
58e60dd2
NH
95};
96
97static struct repo *remote = NULL;
98
99enum transfer_state {
197e8951
NH
100 NEED_FETCH,
101 RUN_FETCH_LOOSE,
102 RUN_FETCH_PACKED,
58e60dd2
NH
103 NEED_PUSH,
104 RUN_MKCOL,
105 RUN_PUT,
106 RUN_MOVE,
107 ABORTED,
108 COMPLETE,
109};
110
111struct transfer_request
112{
aa1dbc98 113 struct object *obj;
58e60dd2
NH
114 char *url;
115 char *dest;
aa1dbc98 116 struct remote_lock *lock;
58e60dd2
NH
117 struct curl_slist *headers;
118 struct buffer buffer;
119 char filename[PATH_MAX];
120 char tmpfile[PATH_MAX];
197e8951
NH
121 int local_fileno;
122 FILE *local_stream;
58e60dd2
NH
123 enum transfer_state state;
124 CURLcode curl_result;
125 char errorstr[CURL_ERROR_SIZE];
126 long http_code;
127 unsigned char real_sha1[20];
128 SHA_CTX c;
129 z_stream stream;
130 int zret;
131 int rename;
197e8951 132 void *userData;
58e60dd2
NH
133 struct active_request_slot *slot;
134 struct transfer_request *next;
135};
136
58e60dd2 137static struct transfer_request *request_queue_head = NULL;
58e60dd2 138
acf59575
NH
139struct xml_ctx
140{
141 char *name;
142 int len;
143 char *cdata;
144 void (*userFunc)(struct xml_ctx *ctx, int tag_closed);
145 void *userData;
146};
147
aa1dbc98 148struct remote_lock
26349b2e 149{
75187c9d 150 char *url;
26349b2e 151 char *owner;
75187c9d 152 char *token;
26349b2e
NH
153 time_t start_time;
154 long timeout;
75187c9d 155 int refreshing;
aa1dbc98
NH
156 struct remote_lock *next;
157};
158
3030baa7
NH
159/* Flags that control remote_ls processing */
160#define PROCESS_FILES (1u << 0)
161#define PROCESS_DIRS (1u << 1)
162#define RECURSIVE (1u << 2)
163
164/* Flags that remote_ls passes to callback functions */
165#define IS_DIR (1u << 0)
166
167struct remote_ls_ctx
aa1dbc98 168{
3030baa7
NH
169 char *path;
170 void (*userFunc)(struct remote_ls_ctx *ls);
171 void *userData;
172 int flags;
173 char *dentry_name;
174 int dentry_flags;
175 struct remote_ls_ctx *parent;
26349b2e
NH
176};
177
29508e1e 178static void finish_request(struct transfer_request *request);
197e8951 179static void release_request(struct transfer_request *request);
58e60dd2 180
29508e1e 181static void process_response(void *callback_data)
58e60dd2 182{
29508e1e
NH
183 struct transfer_request *request =
184 (struct transfer_request *)callback_data;
58e60dd2 185
29508e1e 186 finish_request(request);
58e60dd2
NH
187}
188
dd8239f9 189#ifdef USE_CURL_MULTI
197e8951
NH
190static size_t fwrite_sha1_file(void *ptr, size_t eltsize, size_t nmemb,
191 void *data)
192{
193 unsigned char expn[4096];
194 size_t size = eltsize * nmemb;
195 int posn = 0;
196 struct transfer_request *request = (struct transfer_request *)data;
197 do {
198 ssize_t retval = write(request->local_fileno,
199 ptr + posn, size - posn);
200 if (retval < 0)
201 return posn;
202 posn += retval;
203 } while (posn < size);
204
205 request->stream.avail_in = size;
206 request->stream.next_in = ptr;
207 do {
208 request->stream.next_out = expn;
209 request->stream.avail_out = sizeof(expn);
210 request->zret = inflate(&request->stream, Z_SYNC_FLUSH);
211 SHA1_Update(&request->c, expn,
212 sizeof(expn) - request->stream.avail_out);
213 } while (request->stream.avail_in && request->zret == Z_OK);
214 data_received++;
215 return size;
216}
217
218static void start_fetch_loose(struct transfer_request *request)
219{
220 char *hex = sha1_to_hex(request->obj->sha1);
221 char *filename;
222 char prevfile[PATH_MAX];
223 char *url;
224 char *posn;
225 int prevlocal;
226 unsigned char prev_buf[PREV_BUF_SIZE];
227 ssize_t prev_read = 0;
228 long prev_posn = 0;
229 char range[RANGE_HEADER_SIZE];
230 struct curl_slist *range_header = NULL;
231 struct active_request_slot *slot;
232
233 filename = sha1_file_name(request->obj->sha1);
234 snprintf(request->filename, sizeof(request->filename), "%s", filename);
235 snprintf(request->tmpfile, sizeof(request->tmpfile),
236 "%s.temp", filename);
237
238 snprintf(prevfile, sizeof(prevfile), "%s.prev", request->filename);
239 unlink(prevfile);
240 rename(request->tmpfile, prevfile);
241 unlink(request->tmpfile);
242
243 if (request->local_fileno != -1)
244 error("fd leakage in start: %d", request->local_fileno);
245 request->local_fileno = open(request->tmpfile,
246 O_WRONLY | O_CREAT | O_EXCL, 0666);
247 /* This could have failed due to the "lazy directory creation";
248 * try to mkdir the last path component.
249 */
250 if (request->local_fileno < 0 && errno == ENOENT) {
251 char *dir = strrchr(request->tmpfile, '/');
252 if (dir) {
253 *dir = 0;
254 mkdir(request->tmpfile, 0777);
255 *dir = '/';
256 }
257 request->local_fileno = open(request->tmpfile,
258 O_WRONLY | O_CREAT | O_EXCL, 0666);
259 }
260
261 if (request->local_fileno < 0) {
262 request->state = ABORTED;
263 error("Couldn't create temporary file %s for %s: %s",
264 request->tmpfile, request->filename, strerror(errno));
265 return;
266 }
267
268 memset(&request->stream, 0, sizeof(request->stream));
269
270 inflateInit(&request->stream);
271
272 SHA1_Init(&request->c);
273
274 url = xmalloc(strlen(remote->url) + 50);
275 request->url = xmalloc(strlen(remote->url) + 50);
276 strcpy(url, remote->url);
277 posn = url + strlen(remote->url);
278 strcpy(posn, "objects/");
279 posn += 8;
280 memcpy(posn, hex, 2);
281 posn += 2;
282 *(posn++) = '/';
283 strcpy(posn, hex + 2);
284 strcpy(request->url, url);
285
286 /* If a previous temp file is present, process what was already
287 fetched. */
288 prevlocal = open(prevfile, O_RDONLY);
289 if (prevlocal != -1) {
290 do {
291 prev_read = read(prevlocal, prev_buf, PREV_BUF_SIZE);
292 if (prev_read>0) {
293 if (fwrite_sha1_file(prev_buf,
294 1,
295 prev_read,
296 request) == prev_read) {
297 prev_posn += prev_read;
298 } else {
299 prev_read = -1;
300 }
301 }
302 } while (prev_read > 0);
303 close(prevlocal);
304 }
305 unlink(prevfile);
306
307 /* Reset inflate/SHA1 if there was an error reading the previous temp
308 file; also rewind to the beginning of the local file. */
309 if (prev_read == -1) {
310 memset(&request->stream, 0, sizeof(request->stream));
311 inflateInit(&request->stream);
312 SHA1_Init(&request->c);
313 if (prev_posn>0) {
314 prev_posn = 0;
315 lseek(request->local_fileno, SEEK_SET, 0);
316 ftruncate(request->local_fileno, 0);
317 }
318 }
319
320 slot = get_active_slot();
321 slot->callback_func = process_response;
322 slot->callback_data = request;
323 request->slot = slot;
324
325 curl_easy_setopt(slot->curl, CURLOPT_FILE, request);
326 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_sha1_file);
327 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
328 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
329 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
330
331 /* If we have successfully processed data from a previous fetch
332 attempt, only fetch the data we don't already have. */
333 if (prev_posn>0) {
334 if (push_verbosely)
335 fprintf(stderr,
336 "Resuming fetch of object %s at byte %ld\n",
337 hex, prev_posn);
338 sprintf(range, "Range: bytes=%ld-", prev_posn);
339 range_header = curl_slist_append(range_header, range);
340 curl_easy_setopt(slot->curl,
341 CURLOPT_HTTPHEADER, range_header);
342 }
343
344 /* Try to get the request started, abort the request on error */
345 request->state = RUN_FETCH_LOOSE;
346 if (!start_active_slot(slot)) {
347 fprintf(stderr, "Unable to start GET request\n");
348 remote->can_update_info_refs = 0;
349 release_request(request);
350 }
351}
352
dd8239f9
JH
353static void start_mkcol(struct transfer_request *request)
354{
355 char *hex = sha1_to_hex(request->obj->sha1);
356 struct active_request_slot *slot;
357 char *posn;
358
359 request->url = xmalloc(strlen(remote->url) + 13);
360 strcpy(request->url, remote->url);
361 posn = request->url + strlen(remote->url);
362 strcpy(posn, "objects/");
363 posn += 8;
364 memcpy(posn, hex, 2);
365 posn += 2;
366 strcpy(posn, "/");
367
368 slot = get_active_slot();
369 slot->callback_func = process_response;
370 slot->callback_data = request;
371 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
372 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
373 curl_easy_setopt(slot->curl, CURLOPT_ERRORBUFFER, request->errorstr);
374 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
375 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
376
377 if (start_active_slot(slot)) {
378 request->slot = slot;
379 request->state = RUN_MKCOL;
380 } else {
381 request->state = ABORTED;
382 free(request->url);
383 request->url = NULL;
384 }
385}
386#endif
387
197e8951
NH
388static void start_fetch_packed(struct transfer_request *request)
389{
390 char *url;
391 struct packed_git *target;
392 FILE *packfile;
393 char *filename;
394 long prev_posn = 0;
395 char range[RANGE_HEADER_SIZE];
396 struct curl_slist *range_header = NULL;
397
398 struct transfer_request *check_request = request_queue_head;
399 struct active_request_slot *slot;
400
401 target = find_sha1_pack(request->obj->sha1, remote->packs);
402 if (!target) {
403 fprintf(stderr, "Unable to fetch %s, will not be able to update server info refs\n", sha1_to_hex(request->obj->sha1));
404 remote->can_update_info_refs = 0;
405 release_request(request);
406 return;
407 }
408
409 fprintf(stderr, "Fetching pack %s\n", sha1_to_hex(target->sha1));
410 fprintf(stderr, " which contains %s\n", sha1_to_hex(request->obj->sha1));
411
412 filename = sha1_pack_name(target->sha1);
413 snprintf(request->filename, sizeof(request->filename), "%s", filename);
414 snprintf(request->tmpfile, sizeof(request->tmpfile),
415 "%s.temp", filename);
416
417 url = xmalloc(strlen(remote->url) + 64);
418 sprintf(url, "%sobjects/pack/pack-%s.pack",
419 remote->url, sha1_to_hex(target->sha1));
420
421 /* Make sure there isn't another open request for this pack */
422 while (check_request) {
423 if (check_request->state == RUN_FETCH_PACKED &&
424 !strcmp(check_request->url, url)) {
425 free(url);
426 release_request(request);
427 return;
428 }
429 check_request = check_request->next;
430 }
431
432 packfile = fopen(request->tmpfile, "a");
433 if (!packfile) {
434 fprintf(stderr, "Unable to open local file %s for pack",
435 filename);
436 remote->can_update_info_refs = 0;
437 free(url);
438 return;
439 }
440
441 slot = get_active_slot();
442 slot->callback_func = process_response;
443 slot->callback_data = request;
444 request->slot = slot;
445 request->local_stream = packfile;
446 request->userData = target;
447
448 request->url = url;
449 curl_easy_setopt(slot->curl, CURLOPT_FILE, packfile);
450 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
451 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
452 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
453 slot->local = packfile;
454
455 /* If there is data present from a previous transfer attempt,
456 resume where it left off */
457 prev_posn = ftell(packfile);
458 if (prev_posn>0) {
459 if (push_verbosely)
460 fprintf(stderr,
461 "Resuming fetch of pack %s at byte %ld\n",
462 sha1_to_hex(target->sha1), prev_posn);
463 sprintf(range, "Range: bytes=%ld-", prev_posn);
464 range_header = curl_slist_append(range_header, range);
465 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
466 }
467
468 /* Try to get the request started, abort the request on error */
469 request->state = RUN_FETCH_PACKED;
470 if (!start_active_slot(slot)) {
471 fprintf(stderr, "Unable to start GET request\n");
472 remote->can_update_info_refs = 0;
473 release_request(request);
474 }
475}
476
58e60dd2
NH
477static void start_put(struct transfer_request *request)
478{
aa1dbc98 479 char *hex = sha1_to_hex(request->obj->sha1);
58e60dd2
NH
480 struct active_request_slot *slot;
481 char *posn;
482 char type[20];
483 char hdr[50];
484 void *unpacked;
485 unsigned long len;
486 int hdrlen;
487 ssize_t size;
488 z_stream stream;
489
aa1dbc98 490 unpacked = read_sha1_file(request->obj->sha1, type, &len);
58e60dd2
NH
491 hdrlen = sprintf(hdr, "%s %lu", type, len) + 1;
492
493 /* Set it up */
494 memset(&stream, 0, sizeof(stream));
495 deflateInit(&stream, Z_BEST_COMPRESSION);
496 size = deflateBound(&stream, len + hdrlen);
497 request->buffer.buffer = xmalloc(size);
498
499 /* Compress it */
500 stream.next_out = request->buffer.buffer;
501 stream.avail_out = size;
502
503 /* First header.. */
504 stream.next_in = (void *)hdr;
505 stream.avail_in = hdrlen;
506 while (deflate(&stream, 0) == Z_OK)
507 /* nothing */;
508
509 /* Then the data itself.. */
510 stream.next_in = unpacked;
511 stream.avail_in = len;
512 while (deflate(&stream, Z_FINISH) == Z_OK)
513 /* nothing */;
514 deflateEnd(&stream);
515 free(unpacked);
516
517 request->buffer.size = stream.total_out;
518 request->buffer.posn = 0;
519
58e60dd2 520 request->url = xmalloc(strlen(remote->url) +
26349b2e 521 strlen(request->lock->token) + 51);
58e60dd2
NH
522 strcpy(request->url, remote->url);
523 posn = request->url + strlen(remote->url);
524 strcpy(posn, "objects/");
525 posn += 8;
526 memcpy(posn, hex, 2);
527 posn += 2;
528 *(posn++) = '/';
529 strcpy(posn, hex + 2);
530 request->dest = xmalloc(strlen(request->url) + 14);
531 sprintf(request->dest, "Destination: %s", request->url);
532 posn += 38;
533 *(posn++) = '.';
26349b2e 534 strcpy(posn, request->lock->token);
58e60dd2
NH
535
536 slot = get_active_slot();
29508e1e
NH
537 slot->callback_func = process_response;
538 slot->callback_data = request;
58e60dd2
NH
539 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &request->buffer);
540 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, request->buffer.size);
541 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
542 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
543 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
544 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
545 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
546 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
547 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
548
549 if (start_active_slot(slot)) {
550 request->slot = slot;
551 request->state = RUN_PUT;
552 } else {
553 request->state = ABORTED;
554 free(request->url);
7b899967 555 request->url = NULL;
58e60dd2
NH
556 }
557}
558
559static void start_move(struct transfer_request *request)
560{
561 struct active_request_slot *slot;
562 struct curl_slist *dav_headers = NULL;
563
564 slot = get_active_slot();
29508e1e
NH
565 slot->callback_func = process_response;
566 slot->callback_data = request;
58e60dd2
NH
567 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1); /* undo PUT setup */
568 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MOVE);
569 dav_headers = curl_slist_append(dav_headers, request->dest);
570 dav_headers = curl_slist_append(dav_headers, "Overwrite: T");
571 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
572 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
573 curl_easy_setopt(slot->curl, CURLOPT_URL, request->url);
574
575 if (start_active_slot(slot)) {
576 request->slot = slot;
577 request->state = RUN_MOVE;
578 } else {
579 request->state = ABORTED;
580 free(request->url);
7b899967 581 request->url = NULL;
58e60dd2
NH
582 }
583}
584
512d632c 585static int refresh_lock(struct remote_lock *lock)
75187c9d
NH
586{
587 struct active_request_slot *slot;
baa7b67d 588 struct slot_results results;
75187c9d
NH
589 char *if_header;
590 char timeout_header[25];
591 struct curl_slist *dav_headers = NULL;
512d632c 592 int rc = 0;
75187c9d 593
512d632c 594 lock->refreshing = 1;
75187c9d 595
512d632c
NH
596 if_header = xmalloc(strlen(lock->token) + 25);
597 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
598 sprintf(timeout_header, "Timeout: Second-%ld", lock->timeout);
599 dav_headers = curl_slist_append(dav_headers, if_header);
600 dav_headers = curl_slist_append(dav_headers, timeout_header);
75187c9d 601
512d632c
NH
602 slot = get_active_slot();
603 slot->results = &results;
604 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
605 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
606 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
607 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
608 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
75187c9d 609
512d632c
NH
610 if (start_active_slot(slot)) {
611 run_active_slot(slot);
612 if (results.curl_result != CURLE_OK) {
613 fprintf(stderr, "LOCK HTTP error %ld\n",
614 results.http_code);
615 } else {
616 lock->start_time = time(NULL);
617 rc = 1;
618 }
619 }
aa1dbc98 620
512d632c
NH
621 lock->refreshing = 0;
622 curl_slist_free_all(dav_headers);
623 free(if_header);
aa1dbc98 624
512d632c
NH
625 return rc;
626}
627
ec26b4d6 628static void check_locks(void)
512d632c
NH
629{
630 struct remote_lock *lock = remote->locks;
631 time_t current_time = time(NULL);
632 int time_remaining;
633
634 while (lock) {
635 time_remaining = lock->start_time + lock->timeout -
636 current_time;
637 if (!lock->refreshing && time_remaining < LOCK_REFRESH) {
638 if (!refresh_lock(lock)) {
639 fprintf(stderr,
640 "Unable to refresh lock for %s\n",
641 lock->url);
642 aborted = 1;
643 return;
aa1dbc98 644 }
75187c9d 645 }
512d632c 646 lock = lock->next;
75187c9d 647 }
aa1dbc98 648}
75187c9d 649
aa1dbc98
NH
650static void release_request(struct transfer_request *request)
651{
652 struct transfer_request *entry = request_queue_head;
653
654 if (request == request_queue_head) {
655 request_queue_head = request->next;
656 } else {
657 while (entry->next != NULL && entry->next != request)
658 entry = entry->next;
659 if (entry->next == request)
660 entry->next = entry->next->next;
661 }
662
197e8951
NH
663 if (request->local_fileno != -1)
664 close(request->local_fileno);
665 if (request->local_stream)
666 fclose(request->local_stream);
aa1dbc98
NH
667 if (request->url != NULL)
668 free(request->url);
669 free(request);
75187c9d
NH
670}
671
58e60dd2
NH
672static void finish_request(struct transfer_request *request)
673{
197e8951
NH
674 struct stat st;
675 struct packed_git *target;
676 struct packed_git **lst;
677
678 request->curl_result = request->slot->curl_result;
58e60dd2
NH
679 request->http_code = request->slot->http_code;
680 request->slot = NULL;
75187c9d 681
aa1dbc98 682 /* Keep locks active */
512d632c 683 check_locks();
75187c9d 684
58e60dd2
NH
685 if (request->headers != NULL)
686 curl_slist_free_all(request->headers);
7b899967
NH
687
688 /* URL is reused for MOVE after PUT */
689 if (request->state != RUN_PUT) {
690 free(request->url);
691 request->url = NULL;
aa1dbc98 692 }
7b899967 693
aa1dbc98 694 if (request->state == RUN_MKCOL) {
58e60dd2
NH
695 if (request->curl_result == CURLE_OK ||
696 request->http_code == 405) {
aa1dbc98 697 remote_dir_exists[request->obj->sha1[0]] = 1;
58e60dd2
NH
698 start_put(request);
699 } else {
700 fprintf(stderr, "MKCOL %s failed, aborting (%d/%ld)\n",
aa1dbc98 701 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
702 request->curl_result, request->http_code);
703 request->state = ABORTED;
704 aborted = 1;
705 }
706 } else if (request->state == RUN_PUT) {
707 if (request->curl_result == CURLE_OK) {
708 start_move(request);
709 } else {
710 fprintf(stderr, "PUT %s failed, aborting (%d/%ld)\n",
aa1dbc98 711 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
712 request->curl_result, request->http_code);
713 request->state = ABORTED;
714 aborted = 1;
715 }
716 } else if (request->state == RUN_MOVE) {
717 if (request->curl_result == CURLE_OK) {
1a703cba
NH
718 if (push_verbosely)
719 fprintf(stderr, " sent %s\n",
720 sha1_to_hex(request->obj->sha1));
aa1dbc98
NH
721 request->obj->flags |= REMOTE;
722 release_request(request);
58e60dd2
NH
723 } else {
724 fprintf(stderr, "MOVE %s failed, aborting (%d/%ld)\n",
aa1dbc98 725 sha1_to_hex(request->obj->sha1),
58e60dd2
NH
726 request->curl_result, request->http_code);
727 request->state = ABORTED;
728 aborted = 1;
729 }
197e8951
NH
730 } else if (request->state == RUN_FETCH_LOOSE) {
731 fchmod(request->local_fileno, 0444);
732 close(request->local_fileno); request->local_fileno = -1;
733
734 if (request->curl_result != CURLE_OK &&
735 request->http_code != 416) {
736 if (stat(request->tmpfile, &st) == 0) {
737 if (st.st_size == 0)
738 unlink(request->tmpfile);
739 }
740 } else {
741 if (request->http_code == 416)
742 fprintf(stderr, "Warning: requested range invalid; we may already have all the data.\n");
743
744 inflateEnd(&request->stream);
745 SHA1_Final(request->real_sha1, &request->c);
746 if (request->zret != Z_STREAM_END) {
747 unlink(request->tmpfile);
748 } else if (memcmp(request->obj->sha1, request->real_sha1, 20)) {
749 unlink(request->tmpfile);
750 } else {
751 request->rename =
752 move_temp_to_file(
753 request->tmpfile,
754 request->filename);
755 if (request->rename == 0) {
756 request->obj->flags |= (LOCAL | REMOTE);
757 }
758 }
759 }
760
761 /* Try fetching packed if necessary */
762 if (request->obj->flags & LOCAL)
763 release_request(request);
764 else
765 start_fetch_packed(request);
766
767 } else if (request->state == RUN_FETCH_PACKED) {
768 if (request->curl_result != CURLE_OK) {
769 fprintf(stderr, "Unable to get pack file %s\n%s",
770 request->url, curl_errorstr);
771 remote->can_update_info_refs = 0;
772 } else {
773 fclose(request->local_stream);
774 request->local_stream = NULL;
775 if (!move_temp_to_file(request->tmpfile,
776 request->filename)) {
777 target = (struct packed_git *)request->userData;
778 lst = &remote->packs;
779 while (*lst != target)
780 lst = &((*lst)->next);
781 *lst = (*lst)->next;
782
783 if (!verify_pack(target, 0))
784 install_packed_git(target);
785 else
786 remote->can_update_info_refs = 0;
787 }
788 }
789 release_request(request);
58e60dd2
NH
790 }
791}
792
b3ca4e4e 793#ifdef USE_CURL_MULTI
29508e1e 794void fill_active_slots(void)
58e60dd2
NH
795{
796 struct transfer_request *request = request_queue_head;
197e8951 797 struct transfer_request *next;
58e60dd2
NH
798 struct active_request_slot *slot = active_queue_head;
799 int num_transfers;
800
801 if (aborted)
802 return;
803
804 while (active_requests < max_requests && request != NULL) {
197e8951
NH
805 next = request->next;
806 if (request->state == NEED_FETCH) {
807 start_fetch_loose(request);
808 } else if (pushing && request->state == NEED_PUSH) {
aa1dbc98 809 if (remote_dir_exists[request->obj->sha1[0]] == 1) {
0dd276b8 810 start_put(request);
aa1dbc98 811 } else {
0dd276b8 812 start_mkcol(request);
aa1dbc98 813 }
58e60dd2
NH
814 curl_multi_perform(curlm, &num_transfers);
815 }
197e8951 816 request = next;
58e60dd2
NH
817 }
818
819 while (slot != NULL) {
820 if (!slot->in_use && slot->curl != NULL) {
821 curl_easy_cleanup(slot->curl);
822 slot->curl = NULL;
823 }
824 slot = slot->next;
aa1dbc98 825 }
58e60dd2 826}
b3ca4e4e 827#endif
58e60dd2 828
aa1dbc98
NH
829static void get_remote_object_list(unsigned char parent);
830
197e8951
NH
831static void add_fetch_request(struct object *obj)
832{
833 struct transfer_request *request;
834
835 check_locks();
836
837 /*
838 * Don't fetch the object if it's known to exist locally
839 * or is already in the request queue
840 */
841 if (remote_dir_exists[obj->sha1[0]] == -1)
842 get_remote_object_list(obj->sha1[0]);
843 if (obj->flags & (LOCAL | FETCHING))
844 return;
845
846 obj->flags |= FETCHING;
847 request = xmalloc(sizeof(*request));
848 request->obj = obj;
849 request->url = NULL;
850 request->lock = NULL;
851 request->headers = NULL;
852 request->local_fileno = -1;
853 request->local_stream = NULL;
854 request->state = NEED_FETCH;
855 request->next = request_queue_head;
856 request_queue_head = request;
857
b3ca4e4e 858#ifdef USE_CURL_MULTI
197e8951
NH
859 fill_active_slots();
860 step_active_slots();
b3ca4e4e 861#endif
197e8951
NH
862}
863
1a703cba 864static int add_send_request(struct object *obj, struct remote_lock *lock)
58e60dd2
NH
865{
866 struct transfer_request *request = request_queue_head;
58e60dd2 867 struct packed_git *target;
58e60dd2 868
512d632c
NH
869 /* Keep locks active */
870 check_locks();
871
aa1dbc98
NH
872 /*
873 * Don't push the object if it's known to exist on the remote
874 * or is already in the request queue
875 */
876 if (remote_dir_exists[obj->sha1[0]] == -1)
877 get_remote_object_list(obj->sha1[0]);
878 if (obj->flags & (REMOTE | PUSHING))
1a703cba 879 return 0;
aa1dbc98
NH
880 target = find_sha1_pack(obj->sha1, remote->packs);
881 if (target) {
882 obj->flags |= REMOTE;
1a703cba 883 return 0;
aa1dbc98 884 }
58e60dd2 885
aa1dbc98 886 obj->flags |= PUSHING;
58e60dd2 887 request = xmalloc(sizeof(*request));
aa1dbc98 888 request->obj = obj;
58e60dd2 889 request->url = NULL;
26349b2e 890 request->lock = lock;
58e60dd2 891 request->headers = NULL;
197e8951
NH
892 request->local_fileno = -1;
893 request->local_stream = NULL;
aa1dbc98 894 request->state = NEED_PUSH;
c17fb6ee
NH
895 request->next = request_queue_head;
896 request_queue_head = request;
29508e1e 897
b3ca4e4e 898#ifdef USE_CURL_MULTI
29508e1e
NH
899 fill_active_slots();
900 step_active_slots();
b3ca4e4e 901#endif
1a703cba
NH
902
903 return 1;
58e60dd2
NH
904}
905
906static int fetch_index(unsigned char *sha1)
907{
908 char *hex = sha1_to_hex(sha1);
909 char *filename;
910 char *url;
911 char tmpfile[PATH_MAX];
912 long prev_posn = 0;
913 char range[RANGE_HEADER_SIZE];
914 struct curl_slist *range_header = NULL;
915
916 FILE *indexfile;
917 struct active_request_slot *slot;
baa7b67d 918 struct slot_results results;
58e60dd2 919
c17fb6ee 920 /* Don't use the index if the pack isn't there */
1a703cba
NH
921 url = xmalloc(strlen(remote->url) + 64);
922 sprintf(url, "%sobjects/pack/pack-%s.pack", remote->url, hex);
c17fb6ee 923 slot = get_active_slot();
baa7b67d 924 slot->results = &results;
c17fb6ee
NH
925 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
926 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
927 if (start_active_slot(slot)) {
928 run_active_slot(slot);
baa7b67d 929 if (results.curl_result != CURLE_OK) {
c17fb6ee
NH
930 free(url);
931 return error("Unable to verify pack %s is available",
932 hex);
933 }
934 } else {
935 return error("Unable to start request");
936 }
937
58e60dd2
NH
938 if (has_pack_index(sha1))
939 return 0;
940
941 if (push_verbosely)
942 fprintf(stderr, "Getting index for pack %s\n", hex);
1a703cba
NH
943
944 sprintf(url, "%sobjects/pack/pack-%s.idx", remote->url, hex);
945
58e60dd2
NH
946 filename = sha1_pack_index_name(sha1);
947 snprintf(tmpfile, sizeof(tmpfile), "%s.temp", filename);
948 indexfile = fopen(tmpfile, "a");
949 if (!indexfile)
950 return error("Unable to open local file %s for pack index",
951 filename);
952
953 slot = get_active_slot();
baa7b67d 954 slot->results = &results;
c17fb6ee
NH
955 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
956 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
58e60dd2
NH
957 curl_easy_setopt(slot->curl, CURLOPT_FILE, indexfile);
958 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite);
959 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
960 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, no_pragma_header);
961 slot->local = indexfile;
962
963 /* If there is data present from a previous transfer attempt,
964 resume where it left off */
965 prev_posn = ftell(indexfile);
966 if (prev_posn>0) {
967 if (push_verbosely)
968 fprintf(stderr,
969 "Resuming fetch of index for pack %s at byte %ld\n",
970 hex, prev_posn);
971 sprintf(range, "Range: bytes=%ld-", prev_posn);
972 range_header = curl_slist_append(range_header, range);
973 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, range_header);
974 }
975
976 if (start_active_slot(slot)) {
977 run_active_slot(slot);
baa7b67d 978 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
979 free(url);
980 fclose(indexfile);
981 return error("Unable to get pack index %s\n%s", url,
982 curl_errorstr);
983 }
984 } else {
985 free(url);
7b899967 986 fclose(indexfile);
58e60dd2
NH
987 return error("Unable to start request");
988 }
989
990 free(url);
991 fclose(indexfile);
992
993 return move_temp_to_file(tmpfile, filename);
994}
995
996static int setup_index(unsigned char *sha1)
997{
998 struct packed_git *new_pack;
58e60dd2
NH
999
1000 if (fetch_index(sha1))
1001 return -1;
1002
1003 new_pack = parse_pack_index(sha1);
1004 new_pack->next = remote->packs;
1005 remote->packs = new_pack;
1006 return 0;
1007}
1008
f4f440a0 1009static int fetch_indices(void)
58e60dd2
NH
1010{
1011 unsigned char sha1[20];
1012 char *url;
1013 struct buffer buffer;
1014 char *data;
1015 int i = 0;
1016
1017 struct active_request_slot *slot;
baa7b67d 1018 struct slot_results results;
58e60dd2 1019
90321c10 1020 data = xcalloc(1, 4096);
58e60dd2
NH
1021 buffer.size = 4096;
1022 buffer.posn = 0;
1023 buffer.buffer = data;
1024
1025 if (push_verbosely)
1026 fprintf(stderr, "Getting pack list\n");
1a703cba
NH
1027
1028 url = xmalloc(strlen(remote->url) + 20);
1029 sprintf(url, "%sobjects/info/packs", remote->url);
58e60dd2
NH
1030
1031 slot = get_active_slot();
baa7b67d 1032 slot->results = &results;
58e60dd2 1033 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
29508e1e 1034 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1035 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1036 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
1037 if (start_active_slot(slot)) {
1038 run_active_slot(slot);
baa7b67d 1039 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1040 free(buffer.buffer);
1041 free(url);
baa7b67d 1042 if (results.http_code == 404)
58e60dd2
NH
1043 return 0;
1044 else
1045 return error("%s", curl_errorstr);
1046 }
1047 } else {
1048 free(buffer.buffer);
1049 free(url);
1050 return error("Unable to start request");
1051 }
1052 free(url);
1053
1054 data = buffer.buffer;
1055 while (i < buffer.posn) {
1056 switch (data[i]) {
1057 case 'P':
1058 i++;
1059 if (i + 52 < buffer.posn &&
1060 !strncmp(data + i, " pack-", 6) &&
1061 !strncmp(data + i + 46, ".pack\n", 6)) {
1062 get_sha1_hex(data + i + 6, sha1);
1063 setup_index(sha1);
1064 i += 51;
1065 break;
1066 }
1067 default:
1068 while (data[i] != '\n')
1069 i++;
1070 }
1071 i++;
1072 }
1073
1074 free(buffer.buffer);
1075 return 0;
1076}
1077
1078static inline int needs_quote(int ch)
1079{
1080 switch (ch) {
1081 case '/': case '-': case '.':
1082 case 'A'...'Z': case 'a'...'z': case '0'...'9':
1083 return 0;
1084 default:
1085 return 1;
1086 }
1087}
1088
1089static inline int hex(int v)
1090{
1091 if (v < 10) return '0' + v;
1092 else return 'A' + v - 10;
1093}
1094
1095static char *quote_ref_url(const char *base, const char *ref)
1096{
1097 const char *cp;
1098 char *dp, *qref;
1099 int len, baselen, ch;
1100
1101 baselen = strlen(base);
aa1dbc98 1102 len = baselen + 1;
58e60dd2
NH
1103 for (cp = ref; (ch = *cp) != 0; cp++, len++)
1104 if (needs_quote(ch))
1105 len += 2; /* extra two hex plus replacement % */
1106 qref = xmalloc(len);
1107 memcpy(qref, base, baselen);
aa1dbc98 1108 for (cp = ref, dp = qref + baselen; (ch = *cp) != 0; cp++) {
58e60dd2
NH
1109 if (needs_quote(ch)) {
1110 *dp++ = '%';
1111 *dp++ = hex((ch >> 4) & 0xF);
1112 *dp++ = hex(ch & 0xF);
1113 }
1114 else
1115 *dp++ = ch;
1116 }
1117 *dp = 0;
1118
1119 return qref;
1120}
1121
1122int fetch_ref(char *ref, unsigned char *sha1)
1123{
1124 char *url;
1125 char hex[42];
1126 struct buffer buffer;
1127 char *base = remote->url;
1128 struct active_request_slot *slot;
baa7b67d 1129 struct slot_results results;
58e60dd2
NH
1130 buffer.size = 41;
1131 buffer.posn = 0;
1132 buffer.buffer = hex;
1133 hex[41] = '\0';
baa7b67d 1134
58e60dd2
NH
1135 url = quote_ref_url(base, ref);
1136 slot = get_active_slot();
baa7b67d 1137 slot->results = &results;
58e60dd2 1138 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
29508e1e 1139 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1140 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
1141 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1142 if (start_active_slot(slot)) {
1143 run_active_slot(slot);
baa7b67d 1144 if (results.curl_result != CURLE_OK)
58e60dd2
NH
1145 return error("Couldn't get %s for %s\n%s",
1146 url, ref, curl_errorstr);
1147 } else {
1148 return error("Unable to start request");
1149 }
1150
1151 hex[40] = '\0';
1152 get_sha1_hex(hex, sha1);
1153 return 0;
1154}
1155
aa1dbc98
NH
1156static void one_remote_object(const char *hex)
1157{
1158 unsigned char sha1[20];
1159 struct object *obj;
1160
1161 if (get_sha1_hex(hex, sha1) != 0)
1162 return;
1163
1164 obj = lookup_object(sha1);
1165 if (!obj)
1166 obj = parse_object(sha1);
1167
1168 /* Ignore remote objects that don't exist locally */
1169 if (!obj)
1170 return;
1171
1172 obj->flags |= REMOTE;
1173 if (!object_list_contains(objects, obj))
1174 add_object(obj, &objects, NULL, "");
1175}
1176
acf59575 1177static void handle_lockprop_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1178{
acf59575
NH
1179 int *lock_flags = (int *)ctx->userData;
1180
1181 if (tag_closed) {
1182 if (!strcmp(ctx->name, DAV_CTX_LOCKENTRY)) {
1183 if ((*lock_flags & DAV_PROP_LOCKEX) &&
1184 (*lock_flags & DAV_PROP_LOCKWR)) {
1185 *lock_flags |= DAV_LOCK_OK;
1186 }
1187 *lock_flags &= DAV_LOCK_OK;
1188 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_WRITE)) {
1189 *lock_flags |= DAV_PROP_LOCKWR;
1190 } else if (!strcmp(ctx->name, DAV_CTX_LOCKTYPE_EXCLUSIVE)) {
1191 *lock_flags |= DAV_PROP_LOCKEX;
1192 }
1193 }
26349b2e
NH
1194}
1195
acf59575 1196static void handle_new_lock_ctx(struct xml_ctx *ctx, int tag_closed)
26349b2e 1197{
aa1dbc98 1198 struct remote_lock *lock = (struct remote_lock *)ctx->userData;
acf59575
NH
1199
1200 if (tag_closed && ctx->cdata) {
1201 if (!strcmp(ctx->name, DAV_ACTIVELOCK_OWNER)) {
1202 lock->owner = xmalloc(strlen(ctx->cdata) + 1);
1203 strcpy(lock->owner, ctx->cdata);
1204 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TIMEOUT)) {
1205 if (!strncmp(ctx->cdata, "Second-", 7))
1206 lock->timeout =
1207 strtol(ctx->cdata + 7, NULL, 10);
1208 } else if (!strcmp(ctx->name, DAV_ACTIVELOCK_TOKEN)) {
1209 if (!strncmp(ctx->cdata, "opaquelocktoken:", 16)) {
3e2f62be 1210 lock->token = xmalloc(strlen(ctx->cdata) - 15);
acf59575
NH
1211 strcpy(lock->token, ctx->cdata + 16);
1212 }
1213 }
26349b2e
NH
1214 }
1215}
1216
aa1dbc98 1217static void one_remote_ref(char *refname);
aa1dbc98 1218
26349b2e 1219static void
acf59575 1220xml_start_tag(void *userData, const char *name, const char **atts)
26349b2e 1221{
acf59575 1222 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1223 const char *c = strchr(name, ':');
acf59575
NH
1224 int new_len;
1225
1226 if (c == NULL)
1227 c = name;
1228 else
1229 c++;
1230
1231 new_len = strlen(ctx->name) + strlen(c) + 2;
1232
1233 if (new_len > ctx->len) {
1234 ctx->name = xrealloc(ctx->name, new_len);
1235 ctx->len = new_len;
26349b2e 1236 }
acf59575
NH
1237 strcat(ctx->name, ".");
1238 strcat(ctx->name, c);
26349b2e 1239
acf59575
NH
1240 if (ctx->cdata) {
1241 free(ctx->cdata);
1242 ctx->cdata = NULL;
1243 }
1244
1245 ctx->userFunc(ctx, 0);
26349b2e
NH
1246}
1247
58e60dd2 1248static void
acf59575 1249xml_end_tag(void *userData, const char *name)
58e60dd2 1250{
acf59575 1251 struct xml_ctx *ctx = (struct xml_ctx *)userData;
ef9e58c8 1252 const char *c = strchr(name, ':');
acf59575 1253 char *ep;
58e60dd2 1254
acf59575
NH
1255 ctx->userFunc(ctx, 1);
1256
1257 if (c == NULL)
1258 c = name;
1259 else
1260 c++;
1261
1262 ep = ctx->name + strlen(ctx->name) - strlen(c) - 1;
1263 *ep = 0;
58e60dd2
NH
1264}
1265
1266static void
acf59575 1267xml_cdata(void *userData, const XML_Char *s, int len)
58e60dd2 1268{
acf59575
NH
1269 struct xml_ctx *ctx = (struct xml_ctx *)userData;
1270 if (ctx->cdata)
1271 free(ctx->cdata);
bfbd0bb6
PE
1272 ctx->cdata = xmalloc(len + 1);
1273 safe_strncpy(ctx->cdata, s, len + 1);
58e60dd2
NH
1274}
1275
aa1dbc98 1276static struct remote_lock *lock_remote(char *path, long timeout)
58e60dd2
NH
1277{
1278 struct active_request_slot *slot;
baa7b67d 1279 struct slot_results results;
58e60dd2 1280 struct buffer out_buffer;
26349b2e 1281 struct buffer in_buffer;
58e60dd2 1282 char *out_data;
26349b2e 1283 char *in_data;
58e60dd2 1284 char *url;
0772b9a6 1285 char *ep;
58e60dd2 1286 char timeout_header[25];
512d632c 1287 struct remote_lock *lock = NULL;
26349b2e
NH
1288 XML_Parser parser = XML_ParserCreate(NULL);
1289 enum XML_Status result;
58e60dd2 1290 struct curl_slist *dav_headers = NULL;
acf59575 1291 struct xml_ctx ctx;
58e60dd2 1292
aa1dbc98
NH
1293 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
1294 sprintf(url, "%s%s", remote->url, path);
1295
0772b9a6
NH
1296 /* Make sure leading directories exist for the remote ref */
1297 ep = strchr(url + strlen(remote->url) + 11, '/');
1298 while (ep) {
1299 *ep = 0;
1300 slot = get_active_slot();
baa7b67d 1301 slot->results = &results;
0772b9a6
NH
1302 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
1303 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1304 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_MKCOL);
1305 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1306 if (start_active_slot(slot)) {
1307 run_active_slot(slot);
baa7b67d
NH
1308 if (results.curl_result != CURLE_OK &&
1309 results.http_code != 405) {
0772b9a6
NH
1310 fprintf(stderr,
1311 "Unable to create branch path %s\n",
1312 url);
1313 free(url);
1314 return NULL;
1315 }
1316 } else {
1a703cba 1317 fprintf(stderr, "Unable to start MKCOL request\n");
0772b9a6
NH
1318 free(url);
1319 return NULL;
1320 }
1321 *ep = '/';
1322 ep = strchr(ep + 1, '/');
1323 }
1324
58e60dd2
NH
1325 out_buffer.size = strlen(LOCK_REQUEST) + strlen(git_default_email) - 2;
1326 out_data = xmalloc(out_buffer.size + 1);
1327 snprintf(out_data, out_buffer.size + 1, LOCK_REQUEST, git_default_email);
1328 out_buffer.posn = 0;
1329 out_buffer.buffer = out_data;
1330
26349b2e
NH
1331 in_buffer.size = 4096;
1332 in_data = xmalloc(in_buffer.size);
1333 in_buffer.posn = 0;
1334 in_buffer.buffer = in_data;
1335
75187c9d 1336 sprintf(timeout_header, "Timeout: Second-%ld", timeout);
58e60dd2
NH
1337 dav_headers = curl_slist_append(dav_headers, timeout_header);
1338 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1339
1340 slot = get_active_slot();
baa7b67d 1341 slot->results = &results;
58e60dd2
NH
1342 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1343 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1344 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
26349b2e 1345 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1346 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1347 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1348 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1349 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_LOCK);
1350 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1351
aa1dbc98 1352 lock = xcalloc(1, sizeof(*lock));
aa1dbc98 1353 lock->timeout = -1;
acf59575 1354
58e60dd2
NH
1355 if (start_active_slot(slot)) {
1356 run_active_slot(slot);
baa7b67d 1357 if (results.curl_result == CURLE_OK) {
acf59575
NH
1358 ctx.name = xcalloc(10, 1);
1359 ctx.len = 0;
1360 ctx.cdata = NULL;
1361 ctx.userFunc = handle_new_lock_ctx;
aa1dbc98 1362 ctx.userData = lock;
acf59575
NH
1363 XML_SetUserData(parser, &ctx);
1364 XML_SetElementHandler(parser, xml_start_tag,
1365 xml_end_tag);
1366 XML_SetCharacterDataHandler(parser, xml_cdata);
1367 result = XML_Parse(parser, in_buffer.buffer,
1368 in_buffer.posn, 1);
1369 free(ctx.name);
1370 if (result != XML_STATUS_OK) {
1371 fprintf(stderr, "XML error: %s\n",
1372 XML_ErrorString(
1373 XML_GetErrorCode(parser)));
aa1dbc98 1374 lock->timeout = -1;
acf59575 1375 }
58e60dd2
NH
1376 }
1377 } else {
1a703cba 1378 fprintf(stderr, "Unable to start LOCK request\n");
58e60dd2
NH
1379 }
1380
acf59575 1381 curl_slist_free_all(dav_headers);
0772b9a6 1382 free(out_data);
26349b2e 1383 free(in_data);
26349b2e 1384
aa1dbc98
NH
1385 if (lock->token == NULL || lock->timeout <= 0) {
1386 if (lock->token != NULL)
1387 free(lock->token);
1388 if (lock->owner != NULL)
1389 free(lock->owner);
75187c9d 1390 free(url);
aa1dbc98
NH
1391 free(lock);
1392 lock = NULL;
acf59575 1393 } else {
aa1dbc98 1394 lock->url = url;
aa1dbc98 1395 lock->start_time = time(NULL);
512d632c
NH
1396 lock->next = remote->locks;
1397 remote->locks = lock;
26349b2e
NH
1398 }
1399
aa1dbc98 1400 return lock;
58e60dd2
NH
1401}
1402
aa1dbc98 1403static int unlock_remote(struct remote_lock *lock)
58e60dd2
NH
1404{
1405 struct active_request_slot *slot;
baa7b67d 1406 struct slot_results results;
512d632c 1407 struct remote_lock *prev = remote->locks;
58e60dd2
NH
1408 char *lock_token_header;
1409 struct curl_slist *dav_headers = NULL;
1410 int rc = 0;
1411
26349b2e 1412 lock_token_header = xmalloc(strlen(lock->token) + 31);
58e60dd2 1413 sprintf(lock_token_header, "Lock-Token: <opaquelocktoken:%s>",
26349b2e 1414 lock->token);
58e60dd2
NH
1415 dav_headers = curl_slist_append(dav_headers, lock_token_header);
1416
1417 slot = get_active_slot();
baa7b67d 1418 slot->results = &results;
58e60dd2 1419 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
75187c9d 1420 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1421 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_UNLOCK);
1422 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1423
1424 if (start_active_slot(slot)) {
1425 run_active_slot(slot);
baa7b67d 1426 if (results.curl_result == CURLE_OK)
58e60dd2
NH
1427 rc = 1;
1428 else
512d632c 1429 fprintf(stderr, "UNLOCK HTTP error %ld\n",
baa7b67d 1430 results.http_code);
58e60dd2 1431 } else {
512d632c 1432 fprintf(stderr, "Unable to start UNLOCK request\n");
58e60dd2
NH
1433 }
1434
1435 curl_slist_free_all(dav_headers);
1436 free(lock_token_header);
75187c9d 1437
512d632c
NH
1438 if (remote->locks == lock) {
1439 remote->locks = lock->next;
1440 } else {
1441 while (prev && prev->next != lock)
1442 prev = prev->next;
1443 if (prev)
1444 prev->next = prev->next->next;
1445 }
1446
1447 if (lock->owner != NULL)
1448 free(lock->owner);
1449 free(lock->url);
1450 free(lock->token);
1451 free(lock);
58e60dd2
NH
1452
1453 return rc;
1454}
1455
3030baa7
NH
1456static void remote_ls(const char *path, int flags,
1457 void (*userFunc)(struct remote_ls_ctx *ls),
1458 void *userData);
aa1dbc98 1459
3030baa7
NH
1460static void process_ls_object(struct remote_ls_ctx *ls)
1461{
1462 unsigned int *parent = (unsigned int *)ls->userData;
1463 char *path = ls->dentry_name;
1464 char *obj_hex;
aa1dbc98 1465
3030baa7
NH
1466 if (!strcmp(ls->path, ls->dentry_name) && (ls->flags & IS_DIR)) {
1467 remote_dir_exists[*parent] = 1;
1468 return;
1469 }
aa1dbc98 1470
3030baa7
NH
1471 if (strlen(path) != 49)
1472 return;
1473 path += 8;
1474 obj_hex = xmalloc(strlen(path));
bfbd0bb6 1475 safe_strncpy(obj_hex, path, 3);
3030baa7
NH
1476 strcpy(obj_hex + 2, path + 3);
1477 one_remote_object(obj_hex);
1478 free(obj_hex);
1479}
aa1dbc98 1480
3030baa7
NH
1481static void process_ls_ref(struct remote_ls_ctx *ls)
1482{
1483 if (!strcmp(ls->path, ls->dentry_name) && (ls->dentry_flags & IS_DIR)) {
1484 fprintf(stderr, " %s\n", ls->dentry_name);
1485 return;
1486 }
aa1dbc98 1487
3030baa7
NH
1488 if (!(ls->dentry_flags & IS_DIR))
1489 one_remote_ref(ls->dentry_name);
1490}
aa1dbc98 1491
3030baa7
NH
1492static void handle_remote_ls_ctx(struct xml_ctx *ctx, int tag_closed)
1493{
1494 struct remote_ls_ctx *ls = (struct remote_ls_ctx *)ctx->userData;
aa1dbc98 1495
3030baa7
NH
1496 if (tag_closed) {
1497 if (!strcmp(ctx->name, DAV_PROPFIND_RESP) && ls->dentry_name) {
1498 if (ls->dentry_flags & IS_DIR) {
1499 if (ls->flags & PROCESS_DIRS) {
1500 ls->userFunc(ls);
1501 }
1502 if (strcmp(ls->dentry_name, ls->path) &&
1503 ls->flags & RECURSIVE) {
1504 remote_ls(ls->dentry_name,
1505 ls->flags,
1506 ls->userFunc,
1507 ls->userData);
1508 }
1509 } else if (ls->flags & PROCESS_FILES) {
1510 ls->userFunc(ls);
aa1dbc98 1511 }
3030baa7
NH
1512 } else if (!strcmp(ctx->name, DAV_PROPFIND_NAME) && ctx->cdata) {
1513 ls->dentry_name = xmalloc(strlen(ctx->cdata) -
1514 remote->path_len + 1);
1515 strcpy(ls->dentry_name, ctx->cdata + remote->path_len);
1516 } else if (!strcmp(ctx->name, DAV_PROPFIND_COLLECTION)) {
1517 ls->dentry_flags |= IS_DIR;
aa1dbc98 1518 }
3030baa7
NH
1519 } else if (!strcmp(ctx->name, DAV_PROPFIND_RESP)) {
1520 if (ls->dentry_name) {
1521 free(ls->dentry_name);
1522 }
1523 ls->dentry_name = NULL;
1524 ls->dentry_flags = 0;
aa1dbc98 1525 }
aa1dbc98
NH
1526}
1527
3030baa7
NH
1528static void remote_ls(const char *path, int flags,
1529 void (*userFunc)(struct remote_ls_ctx *ls),
1530 void *userData)
aa1dbc98 1531{
3030baa7 1532 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
aa1dbc98 1533 struct active_request_slot *slot;
baa7b67d 1534 struct slot_results results;
aa1dbc98
NH
1535 struct buffer in_buffer;
1536 struct buffer out_buffer;
1537 char *in_data;
1538 char *out_data;
1539 XML_Parser parser = XML_ParserCreate(NULL);
1540 enum XML_Status result;
1541 struct curl_slist *dav_headers = NULL;
1542 struct xml_ctx ctx;
3030baa7
NH
1543 struct remote_ls_ctx ls;
1544
1545 ls.flags = flags;
1546 ls.path = strdup(path);
1547 ls.dentry_name = NULL;
1548 ls.dentry_flags = 0;
1549 ls.userData = userData;
1550 ls.userFunc = userFunc;
aa1dbc98 1551
aa1dbc98
NH
1552 sprintf(url, "%s%s", remote->url, path);
1553
1554 out_buffer.size = strlen(PROPFIND_ALL_REQUEST);
1555 out_data = xmalloc(out_buffer.size + 1);
1556 snprintf(out_data, out_buffer.size + 1, PROPFIND_ALL_REQUEST);
1557 out_buffer.posn = 0;
1558 out_buffer.buffer = out_data;
1559
1560 in_buffer.size = 4096;
1561 in_data = xmalloc(in_buffer.size);
1562 in_buffer.posn = 0;
1563 in_buffer.buffer = in_data;
1564
1565 dav_headers = curl_slist_append(dav_headers, "Depth: 1");
1566 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
1567
1568 slot = get_active_slot();
baa7b67d 1569 slot->results = &results;
aa1dbc98
NH
1570 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1571 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1572 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1573 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
1574 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
1575 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
1576 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1577 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1578 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1579
1580 if (start_active_slot(slot)) {
1581 run_active_slot(slot);
baa7b67d 1582 if (results.curl_result == CURLE_OK) {
aa1dbc98
NH
1583 ctx.name = xcalloc(10, 1);
1584 ctx.len = 0;
1585 ctx.cdata = NULL;
3030baa7
NH
1586 ctx.userFunc = handle_remote_ls_ctx;
1587 ctx.userData = &ls;
aa1dbc98
NH
1588 XML_SetUserData(parser, &ctx);
1589 XML_SetElementHandler(parser, xml_start_tag,
1590 xml_end_tag);
1591 XML_SetCharacterDataHandler(parser, xml_cdata);
1592 result = XML_Parse(parser, in_buffer.buffer,
1593 in_buffer.posn, 1);
1594 free(ctx.name);
1595
1596 if (result != XML_STATUS_OK) {
1597 fprintf(stderr, "XML error: %s\n",
1598 XML_ErrorString(
1599 XML_GetErrorCode(parser)));
1600 }
aa1dbc98
NH
1601 }
1602 } else {
3030baa7 1603 fprintf(stderr, "Unable to start PROPFIND request\n");
aa1dbc98
NH
1604 }
1605
3030baa7 1606 free(ls.path);
aa1dbc98
NH
1607 free(url);
1608 free(out_data);
1609 free(in_buffer.buffer);
1610 curl_slist_free_all(dav_headers);
1611}
1612
3030baa7
NH
1613static void get_remote_object_list(unsigned char parent)
1614{
1615 char path[] = "objects/XX/";
1616 static const char hex[] = "0123456789abcdef";
1617 unsigned int val = parent;
1618
1619 path[8] = hex[val >> 4];
1620 path[9] = hex[val & 0xf];
1621 remote_dir_exists[val] = 0;
1622 remote_ls(path, (PROCESS_FILES | PROCESS_DIRS),
1623 process_ls_object, &val);
1624}
1625
acf59575 1626static int locking_available(void)
58e60dd2
NH
1627{
1628 struct active_request_slot *slot;
baa7b67d 1629 struct slot_results results;
58e60dd2
NH
1630 struct buffer in_buffer;
1631 struct buffer out_buffer;
1632 char *in_data;
1633 char *out_data;
1634 XML_Parser parser = XML_ParserCreate(NULL);
1635 enum XML_Status result;
58e60dd2 1636 struct curl_slist *dav_headers = NULL;
acf59575
NH
1637 struct xml_ctx ctx;
1638 int lock_flags = 0;
58e60dd2 1639
aa1dbc98
NH
1640 out_buffer.size =
1641 strlen(PROPFIND_SUPPORTEDLOCK_REQUEST) +
1642 strlen(remote->url) - 2;
58e60dd2 1643 out_data = xmalloc(out_buffer.size + 1);
aa1dbc98
NH
1644 snprintf(out_data, out_buffer.size + 1,
1645 PROPFIND_SUPPORTEDLOCK_REQUEST, remote->url);
58e60dd2
NH
1646 out_buffer.posn = 0;
1647 out_buffer.buffer = out_data;
1648
1649 in_buffer.size = 4096;
1650 in_data = xmalloc(in_buffer.size);
1651 in_buffer.posn = 0;
1652 in_buffer.buffer = in_data;
1653
1654 dav_headers = curl_slist_append(dav_headers, "Depth: 0");
1655 dav_headers = curl_slist_append(dav_headers, "Content-Type: text/xml");
baa7b67d 1656
58e60dd2 1657 slot = get_active_slot();
baa7b67d 1658 slot->results = &results;
58e60dd2
NH
1659 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1660 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1661 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1662 curl_easy_setopt(slot->curl, CURLOPT_FILE, &in_buffer);
29508e1e 1663 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
58e60dd2
NH
1664 curl_easy_setopt(slot->curl, CURLOPT_URL, remote->url);
1665 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1666 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PROPFIND);
1667 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1668
1669 if (start_active_slot(slot)) {
1670 run_active_slot(slot);
baa7b67d 1671 if (results.curl_result == CURLE_OK) {
acf59575
NH
1672 ctx.name = xcalloc(10, 1);
1673 ctx.len = 0;
1674 ctx.cdata = NULL;
1675 ctx.userFunc = handle_lockprop_ctx;
1676 ctx.userData = &lock_flags;
1677 XML_SetUserData(parser, &ctx);
1678 XML_SetElementHandler(parser, xml_start_tag,
1679 xml_end_tag);
1680 result = XML_Parse(parser, in_buffer.buffer,
1681 in_buffer.posn, 1);
1682 free(ctx.name);
1683
1684 if (result != XML_STATUS_OK) {
1685 fprintf(stderr, "XML error: %s\n",
1686 XML_ErrorString(
1687 XML_GetErrorCode(parser)));
1688 lock_flags = 0;
1689 }
58e60dd2 1690 }
58e60dd2 1691 } else {
1a703cba 1692 fprintf(stderr, "Unable to start PROPFIND request\n");
58e60dd2
NH
1693 }
1694
acf59575
NH
1695 free(out_data);
1696 free(in_buffer.buffer);
1697 curl_slist_free_all(dav_headers);
1698
1699 return lock_flags;
58e60dd2
NH
1700}
1701
aa1dbc98
NH
1702static struct object_list **process_blob(struct blob *blob,
1703 struct object_list **p,
1704 struct name_path *path,
1705 const char *name)
58e60dd2 1706{
aa1dbc98 1707 struct object *obj = &blob->object;
58e60dd2 1708
aa1dbc98
NH
1709 obj->flags |= LOCAL;
1710
1711 if (obj->flags & (UNINTERESTING | SEEN))
1712 return p;
1713
1714 obj->flags |= SEEN;
2d9c58c6 1715 name = strdup(name);
aa1dbc98
NH
1716 return add_object(obj, p, path, name);
1717}
1718
1719static struct object_list **process_tree(struct tree *tree,
1720 struct object_list **p,
1721 struct name_path *path,
1722 const char *name)
1723{
1724 struct object *obj = &tree->object;
2d9c58c6 1725 struct tree_desc desc;
4c068a98 1726 struct name_entry entry;
aa1dbc98
NH
1727 struct name_path me;
1728
1729 obj->flags |= LOCAL;
1730
1731 if (obj->flags & (UNINTERESTING | SEEN))
1732 return p;
1733 if (parse_tree(tree) < 0)
1734 die("bad tree object %s", sha1_to_hex(obj->sha1));
1735
1736 obj->flags |= SEEN;
2d9c58c6 1737 name = strdup(name);
aa1dbc98
NH
1738 p = add_object(obj, p, NULL, name);
1739 me.up = path;
1740 me.elem = name;
1741 me.elem_len = strlen(name);
2d9c58c6
LT
1742
1743 desc.buf = tree->buffer;
1744 desc.size = tree->size;
1745
4c068a98
LT
1746 while (tree_entry(&desc, &entry)) {
1747 if (S_ISDIR(entry.mode))
1748 p = process_tree(lookup_tree(entry.sha1), p, &me, name);
aa1dbc98 1749 else
4c068a98 1750 p = process_blob(lookup_blob(entry.sha1), p, &me, name);
58e60dd2 1751 }
2d9c58c6
LT
1752 free(tree->buffer);
1753 tree->buffer = NULL;
aa1dbc98 1754 return p;
58e60dd2
NH
1755}
1756
1a703cba 1757static int get_delta(struct rev_info *revs, struct remote_lock *lock)
58e60dd2
NH
1758{
1759 struct commit *commit;
aa1dbc98 1760 struct object_list **p = &objects, *pending;
1a703cba 1761 int count = 0;
58e60dd2 1762
aa1dbc98
NH
1763 while ((commit = get_revision(revs)) != NULL) {
1764 p = process_tree(commit->tree, p, NULL, "");
1765 commit->object.flags |= LOCAL;
1766 if (!(commit->object.flags & UNINTERESTING))
1a703cba 1767 count += add_send_request(&commit->object, lock);
aa1dbc98 1768 }
58e60dd2 1769
aa1dbc98
NH
1770 for (pending = revs->pending_objects; pending; pending = pending->next) {
1771 struct object *obj = pending->item;
1772 const char *name = pending->name;
58e60dd2 1773
aa1dbc98
NH
1774 if (obj->flags & (UNINTERESTING | SEEN))
1775 continue;
885a86ab 1776 if (obj->type == TYPE_TAG) {
aa1dbc98
NH
1777 obj->flags |= SEEN;
1778 p = add_object(obj, p, NULL, name);
1779 continue;
58e60dd2 1780 }
885a86ab 1781 if (obj->type == TYPE_TREE) {
aa1dbc98
NH
1782 p = process_tree((struct tree *)obj, p, NULL, name);
1783 continue;
58e60dd2 1784 }
885a86ab 1785 if (obj->type == TYPE_BLOB) {
aa1dbc98
NH
1786 p = process_blob((struct blob *)obj, p, NULL, name);
1787 continue;
58e60dd2 1788 }
aa1dbc98
NH
1789 die("unknown pending object %s (%s)", sha1_to_hex(obj->sha1), name);
1790 }
1791
1792 while (objects) {
1793 if (!(objects->item->flags & UNINTERESTING))
1a703cba 1794 count += add_send_request(objects->item, lock);
aa1dbc98 1795 objects = objects->next;
58e60dd2 1796 }
1a703cba
NH
1797
1798 return count;
58e60dd2
NH
1799}
1800
aa1dbc98 1801static int update_remote(unsigned char *sha1, struct remote_lock *lock)
58e60dd2
NH
1802{
1803 struct active_request_slot *slot;
baa7b67d 1804 struct slot_results results;
58e60dd2
NH
1805 char *out_data;
1806 char *if_header;
1807 struct buffer out_buffer;
1808 struct curl_slist *dav_headers = NULL;
1809 int i;
1810
26349b2e
NH
1811 if_header = xmalloc(strlen(lock->token) + 25);
1812 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
58e60dd2
NH
1813 dav_headers = curl_slist_append(dav_headers, if_header);
1814
1815 out_buffer.size = 41;
1816 out_data = xmalloc(out_buffer.size + 1);
1817 i = snprintf(out_data, out_buffer.size + 1, "%s\n", sha1_to_hex(sha1));
1818 if (i != out_buffer.size) {
1819 fprintf(stderr, "Unable to initialize PUT request body\n");
1820 return 0;
1821 }
1822 out_buffer.posn = 0;
1823 out_buffer.buffer = out_data;
1824
1825 slot = get_active_slot();
baa7b67d 1826 slot->results = &results;
58e60dd2
NH
1827 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &out_buffer);
1828 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, out_buffer.size);
1829 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
1830 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
1831 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
1832 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
1833 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
1834 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
75187c9d 1835 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
58e60dd2
NH
1836
1837 if (start_active_slot(slot)) {
1838 run_active_slot(slot);
1839 free(out_data);
1840 free(if_header);
baa7b67d 1841 if (results.curl_result != CURLE_OK) {
58e60dd2
NH
1842 fprintf(stderr,
1843 "PUT error: curl result=%d, HTTP code=%ld\n",
baa7b67d 1844 results.curl_result, results.http_code);
58e60dd2
NH
1845 /* We should attempt recovery? */
1846 return 0;
1847 }
1848 } else {
1849 free(out_data);
1850 free(if_header);
58e60dd2
NH
1851 fprintf(stderr, "Unable to start PUT request\n");
1852 return 0;
1853 }
1854
1855 return 1;
1856}
1857
aa1dbc98
NH
1858static struct ref *local_refs, **local_tail;
1859static struct ref *remote_refs, **remote_tail;
1860
1861static int one_local_ref(const char *refname, const unsigned char *sha1)
1862{
1863 struct ref *ref;
1864 int len = strlen(refname) + 1;
1865 ref = xcalloc(1, sizeof(*ref) + len);
1866 memcpy(ref->new_sha1, sha1, 20);
1867 memcpy(ref->name, refname, len);
1868 *local_tail = ref;
1869 local_tail = &ref->next;
1870 return 0;
1871}
1872
1873static void one_remote_ref(char *refname)
1874{
1875 struct ref *ref;
1876 unsigned char remote_sha1[20];
197e8951 1877 struct object *obj;
8c9e7947 1878 int len = strlen(refname) + 1;
aa1dbc98
NH
1879
1880 if (fetch_ref(refname, remote_sha1) != 0) {
1881 fprintf(stderr,
1882 "Unable to fetch ref %s from %s\n",
1883 refname, remote->url);
1884 return;
1885 }
1886
197e8951
NH
1887 /*
1888 * Fetch a copy of the object if it doesn't exist locally - it
1889 * may be required for updating server info later.
1890 */
1891 if (remote->can_update_info_refs && !has_sha1_file(remote_sha1)) {
1892 obj = lookup_unknown_object(remote_sha1);
1893 if (obj) {
1894 fprintf(stderr, " fetch %s for %s\n",
1895 sha1_to_hex(remote_sha1), refname);
1896 add_fetch_request(obj);
1897 }
1898 }
1899
aa1dbc98
NH
1900 ref = xcalloc(1, sizeof(*ref) + len);
1901 memcpy(ref->old_sha1, remote_sha1, 20);
1902 memcpy(ref->name, refname, len);
1903 *remote_tail = ref;
1904 remote_tail = &ref->next;
1905}
1906
1907static void get_local_heads(void)
1908{
1909 local_tail = &local_refs;
1910 for_each_ref(one_local_ref);
1911}
1912
1913static void get_dav_remote_heads(void)
1914{
1915 remote_tail = &remote_refs;
3030baa7 1916 remote_ls("refs/", (PROCESS_FILES | PROCESS_DIRS | RECURSIVE), process_ls_ref, NULL);
aa1dbc98
NH
1917}
1918
1919static int is_zero_sha1(const unsigned char *sha1)
1920{
1921 int i;
1922
1923 for (i = 0; i < 20; i++) {
1924 if (*sha1++)
1925 return 0;
1926 }
1927 return 1;
1928}
1929
1930static void unmark_and_free(struct commit_list *list, unsigned int mark)
1931{
1932 while (list) {
1933 struct commit_list *temp = list;
1934 temp->item->object.flags &= ~mark;
1935 list = temp->next;
1936 free(temp);
1937 }
1938}
1939
1940static int ref_newer(const unsigned char *new_sha1,
1941 const unsigned char *old_sha1)
1942{
1943 struct object *o;
1944 struct commit *old, *new;
1945 struct commit_list *list, *used;
1946 int found = 0;
1947
1948 /* Both new and old must be commit-ish and new is descendant of
1949 * old. Otherwise we require --force.
1950 */
1951 o = deref_tag(parse_object(old_sha1), NULL, 0);
885a86ab 1952 if (!o || o->type != TYPE_COMMIT)
aa1dbc98
NH
1953 return 0;
1954 old = (struct commit *) o;
1955
1956 o = deref_tag(parse_object(new_sha1), NULL, 0);
885a86ab 1957 if (!o || o->type != TYPE_COMMIT)
aa1dbc98
NH
1958 return 0;
1959 new = (struct commit *) o;
1960
1961 if (parse_commit(new) < 0)
1962 return 0;
1963
1964 used = list = NULL;
1965 commit_list_insert(new, &list);
1966 while (list) {
1967 new = pop_most_recent_commit(&list, TMP_MARK);
1968 commit_list_insert(new, &used);
1969 if (new == old) {
1970 found = 1;
1971 break;
1972 }
1973 }
1974 unmark_and_free(list, TMP_MARK);
1975 unmark_and_free(used, TMP_MARK);
1976 return found;
1977}
1978
1979static void mark_edge_parents_uninteresting(struct commit *commit)
1980{
1981 struct commit_list *parents;
1982
1983 for (parents = commit->parents; parents; parents = parents->next) {
1984 struct commit *parent = parents->item;
1985 if (!(parent->object.flags & UNINTERESTING))
1986 continue;
1987 mark_tree_uninteresting(parent->tree);
1988 }
1989}
1990
1991static void mark_edges_uninteresting(struct commit_list *list)
1992{
1993 for ( ; list; list = list->next) {
1994 struct commit *commit = list->item;
1995
1996 if (commit->object.flags & UNINTERESTING) {
1997 mark_tree_uninteresting(commit->tree);
1998 continue;
1999 }
2000 mark_edge_parents_uninteresting(commit);
2001 }
2002}
2003
197e8951
NH
2004static void add_remote_info_ref(struct remote_ls_ctx *ls)
2005{
2006 struct buffer *buf = (struct buffer *)ls->userData;
2007 unsigned char remote_sha1[20];
2008 struct object *o;
2009 int len;
2010 char *ref_info;
2011
2012 if (fetch_ref(ls->dentry_name, remote_sha1) != 0) {
2013 fprintf(stderr,
2014 "Unable to fetch ref %s from %s\n",
2015 ls->dentry_name, remote->url);
2016 aborted = 1;
2017 return;
2018 }
2019
2020 o = parse_object(remote_sha1);
2021 if (!o) {
2022 fprintf(stderr,
2023 "Unable to parse object %s for remote ref %s\n",
2024 sha1_to_hex(remote_sha1), ls->dentry_name);
2025 aborted = 1;
2026 return;
2027 }
2028
2029 len = strlen(ls->dentry_name) + 42;
2030 ref_info = xcalloc(len + 1, 1);
2031 sprintf(ref_info, "%s %s\n",
2032 sha1_to_hex(remote_sha1), ls->dentry_name);
2033 fwrite_buffer(ref_info, 1, len, buf);
2034 free(ref_info);
2035
885a86ab 2036 if (o->type == TYPE_TAG) {
197e8951
NH
2037 o = deref_tag(o, ls->dentry_name, 0);
2038 if (o) {
2039 len = strlen(ls->dentry_name) + 45;
2040 ref_info = xcalloc(len + 1, 1);
2041 sprintf(ref_info, "%s %s^{}\n",
2042 sha1_to_hex(o->sha1), ls->dentry_name);
2043 fwrite_buffer(ref_info, 1, len, buf);
2044 free(ref_info);
2045 }
2046 }
2047}
2048
2049static void update_remote_info_refs(struct remote_lock *lock)
2050{
2051 struct buffer buffer;
2052 struct active_request_slot *slot;
2053 struct slot_results results;
2054 char *if_header;
2055 struct curl_slist *dav_headers = NULL;
2056
90321c10 2057 buffer.buffer = xcalloc(1, 4096);
197e8951
NH
2058 buffer.size = 4096;
2059 buffer.posn = 0;
2060 remote_ls("refs/", (PROCESS_FILES | RECURSIVE),
2061 add_remote_info_ref, &buffer);
2062 if (!aborted) {
2063 if_header = xmalloc(strlen(lock->token) + 25);
2064 sprintf(if_header, "If: (<opaquelocktoken:%s>)", lock->token);
2065 dav_headers = curl_slist_append(dav_headers, if_header);
2066
2067 slot = get_active_slot();
2068 slot->results = &results;
2069 curl_easy_setopt(slot->curl, CURLOPT_INFILE, &buffer);
2070 curl_easy_setopt(slot->curl, CURLOPT_INFILESIZE, buffer.posn);
2071 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, fread_buffer);
2072 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
2073 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_PUT);
2074 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, dav_headers);
2075 curl_easy_setopt(slot->curl, CURLOPT_UPLOAD, 1);
2076 curl_easy_setopt(slot->curl, CURLOPT_PUT, 1);
2077 curl_easy_setopt(slot->curl, CURLOPT_URL, lock->url);
2078
2079 buffer.posn = 0;
2080
2081 if (start_active_slot(slot)) {
2082 run_active_slot(slot);
2083 if (results.curl_result != CURLE_OK) {
2084 fprintf(stderr,
2085 "PUT error: curl result=%d, HTTP code=%ld\n",
2086 results.curl_result, results.http_code);
2087 }
2088 }
2089 free(if_header);
2090 }
2091 free(buffer.buffer);
2092}
2093
2094static int remote_exists(const char *path)
2095{
2096 char *url = xmalloc(strlen(remote->url) + strlen(path) + 1);
2097 struct active_request_slot *slot;
2098 struct slot_results results;
2099
2100 sprintf(url, "%s%s", remote->url, path);
2101
2102 slot = get_active_slot();
2103 slot->results = &results;
2104 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2105 curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 1);
2106
2107 if (start_active_slot(slot)) {
2108 run_active_slot(slot);
2109 if (results.http_code == 404)
2110 return 0;
2111 else if (results.curl_result == CURLE_OK)
2112 return 1;
2113 else
2114 fprintf(stderr, "HEAD HTTP error %ld\n", results.http_code);
2115 } else {
2116 fprintf(stderr, "Unable to start HEAD request\n");
2117 }
2118
2119 return -1;
2120}
2121
3dfaf7bc
NH
2122static void fetch_symref(char *path, char **symref, unsigned char *sha1)
2123{
2124 char *url;
2125 struct buffer buffer;
2126 struct active_request_slot *slot;
2127 struct slot_results results;
2128
2129 url = xmalloc(strlen(remote->url) + strlen(path) + 1);
2130 sprintf(url, "%s%s", remote->url, path);
2131
2132 buffer.size = 4096;
2133 buffer.posn = 0;
2134 buffer.buffer = xmalloc(buffer.size);
2135
2136 slot = get_active_slot();
2137 slot->results = &results;
2138 curl_easy_setopt(slot->curl, CURLOPT_FILE, &buffer);
2139 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
2140 curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, NULL);
2141 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2142 if (start_active_slot(slot)) {
2143 run_active_slot(slot);
2144 if (results.curl_result != CURLE_OK) {
2145 die("Couldn't get %s for remote symref\n%s",
2146 url, curl_errorstr);
2147 }
2148 } else {
2149 die("Unable to start remote symref request");
2150 }
2151 free(url);
2152
2153 if (*symref != NULL)
2154 free(*symref);
2155 *symref = NULL;
2156 memset(sha1, 0, 20);
2157
2158 if (buffer.posn == 0)
2159 return;
2160
2161 /* If it's a symref, set the refname; otherwise try for a sha1 */
2162 if (!strncmp((char *)buffer.buffer, "ref: ", 5)) {
bfbd0bb6
PE
2163 *symref = xmalloc(buffer.posn - 5);
2164 safe_strncpy(*symref, (char *)buffer.buffer + 5, buffer.posn - 5);
3dfaf7bc
NH
2165 } else {
2166 get_sha1_hex(buffer.buffer, sha1);
2167 }
2168
2169 free(buffer.buffer);
2170}
2171
2172static int verify_merge_base(unsigned char *head_sha1, unsigned char *branch_sha1)
2173{
2174 int pipe_fd[2];
2175 pid_t merge_base_pid;
2176 char line[PATH_MAX + 20];
2177 unsigned char merge_sha1[20];
2178 int verified = 0;
2179
2180 if (pipe(pipe_fd) < 0)
2181 die("Verify merge base: pipe failed");
2182
2183 merge_base_pid = fork();
2184 if (!merge_base_pid) {
2185 static const char *args[] = {
2186 "merge-base",
2187 "-a",
2188 NULL,
2189 NULL,
2190 NULL
2191 };
2192 args[2] = strdup(sha1_to_hex(head_sha1));
2193 args[3] = sha1_to_hex(branch_sha1);
2194
2195 dup2(pipe_fd[1], 1);
2196 close(pipe_fd[0]);
2197 close(pipe_fd[1]);
2198 execv_git_cmd(args);
2199 die("merge-base setup failed");
2200 }
2201 if (merge_base_pid < 0)
2202 die("merge-base fork failed");
2203
2204 dup2(pipe_fd[0], 0);
2205 close(pipe_fd[0]);
2206 close(pipe_fd[1]);
2207 while (fgets(line, sizeof(line), stdin) != NULL) {
2208 if (get_sha1_hex(line, merge_sha1))
2209 die("expected sha1, got garbage:\n %s", line);
2210 if (!memcmp(branch_sha1, merge_sha1, 20)) {
2211 verified = 1;
2212 break;
2213 }
2214 }
2215
2216 return verified;
2217}
2218
2219static int delete_remote_branch(char *pattern, int force)
2220{
2221 struct ref *refs = remote_refs;
2222 struct ref *remote_ref = NULL;
2223 unsigned char head_sha1[20];
2224 char *symref = NULL;
2225 int match;
2226 int patlen = strlen(pattern);
2227 int i;
2228 struct active_request_slot *slot;
2229 struct slot_results results;
2230 char *url;
2231
2232 /* Find the remote branch(es) matching the specified branch name */
2233 for (match = 0; refs; refs = refs->next) {
2234 char *name = refs->name;
2235 int namelen = strlen(name);
2236 if (namelen < patlen ||
2237 memcmp(name + namelen - patlen, pattern, patlen))
2238 continue;
2239 if (namelen != patlen && name[namelen - patlen - 1] != '/')
2240 continue;
2241 match++;
2242 remote_ref = refs;
2243 }
2244 if (match == 0)
2245 return error("No remote branch matches %s", pattern);
2246 if (match != 1)
2247 return error("More than one remote branch matches %s",
2248 pattern);
2249
2250 /*
2251 * Remote HEAD must be a symref (not exactly foolproof; a remote
2252 * symlink to a symref will look like a symref)
2253 */
2254 fetch_symref("HEAD", &symref, head_sha1);
2255 if (!symref)
2256 return error("Remote HEAD is not a symref");
2257
2258 /* Remote branch must not be the remote HEAD */
2259 for (i=0; symref && i<MAXDEPTH; i++) {
2260 if (!strcmp(remote_ref->name, symref))
2261 return error("Remote branch %s is the current HEAD",
2262 remote_ref->name);
2263 fetch_symref(symref, &symref, head_sha1);
2264 }
2265
2266 /* Run extra sanity checks if delete is not forced */
2267 if (!force) {
2268 /* Remote HEAD must resolve to a known object */
2269 if (symref)
2270 return error("Remote HEAD symrefs too deep");
2271 if (is_zero_sha1(head_sha1))
2272 return error("Unable to resolve remote HEAD");
2273 if (!has_sha1_file(head_sha1))
2274 return error("Remote HEAD resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", sha1_to_hex(head_sha1));
2275
2276 /* Remote branch must resolve to a known object */
2277 if (is_zero_sha1(remote_ref->old_sha1))
2278 return error("Unable to resolve remote branch %s",
2279 remote_ref->name);
2280 if (!has_sha1_file(remote_ref->old_sha1))
2281 return error("Remote branch %s resolves to object %s\nwhich does not exist locally, perhaps you need to fetch?", remote_ref->name, sha1_to_hex(remote_ref->old_sha1));
2282
2283 /* Remote branch must be an ancestor of remote HEAD */
2284 if (!verify_merge_base(head_sha1, remote_ref->old_sha1)) {
2285 return error("The branch '%s' is not a strict subset of your current HEAD.\nIf you are sure you want to delete it, run:\n\t'git http-push -D %s %s'", remote_ref->name, remote->url, pattern);
2286 }
2287 }
2288
2289 /* Send delete request */
2290 fprintf(stderr, "Removing remote branch '%s'\n", remote_ref->name);
2291 url = xmalloc(strlen(remote->url) + strlen(remote_ref->name) + 1);
2292 sprintf(url, "%s%s", remote->url, remote_ref->name);
2293 slot = get_active_slot();
2294 slot->results = &results;
2295 curl_easy_setopt(slot->curl, CURLOPT_HTTPGET, 1);
2296 curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_null);
2297 curl_easy_setopt(slot->curl, CURLOPT_URL, url);
2298 curl_easy_setopt(slot->curl, CURLOPT_CUSTOMREQUEST, DAV_DELETE);
2299 if (start_active_slot(slot)) {
2300 run_active_slot(slot);
2301 free(url);
2302 if (results.curl_result != CURLE_OK)
2303 return error("DELETE request failed (%d/%ld)\n",
2304 results.curl_result, results.http_code);
2305 } else {
2306 free(url);
2307 return error("Unable to start DELETE request");
2308 }
2309
2310 return 0;
2311}
2312
58e60dd2
NH
2313int main(int argc, char **argv)
2314{
58e60dd2
NH
2315 struct transfer_request *request;
2316 struct transfer_request *next_request;
2317 int nr_refspec = 0;
2318 char **refspec = NULL;
512d632c 2319 struct remote_lock *ref_lock = NULL;
197e8951 2320 struct remote_lock *info_ref_lock = NULL;
aa1dbc98 2321 struct rev_info revs;
3dfaf7bc
NH
2322 int delete_branch = 0;
2323 int force_delete = 0;
1a703cba 2324 int objects_to_send;
58e60dd2
NH
2325 int rc = 0;
2326 int i;
8c9e7947
JH
2327 int new_refs;
2328 struct ref *ref;
58e60dd2 2329
5a327713 2330 setup_git_directory();
58e60dd2
NH
2331 setup_ident();
2332
512d632c 2333 remote = xcalloc(sizeof(*remote), 1);
58e60dd2
NH
2334
2335 argv++;
2336 for (i = 1; i < argc; i++, argv++) {
2337 char *arg = *argv;
2338
2339 if (*arg == '-') {
aa1dbc98 2340 if (!strcmp(arg, "--all")) {
58e60dd2
NH
2341 push_all = 1;
2342 continue;
2343 }
2344 if (!strcmp(arg, "--force")) {
2345 force_all = 1;
2346 continue;
2347 }
2348 if (!strcmp(arg, "--verbose")) {
2349 push_verbosely = 1;
2350 continue;
2351 }
3dfaf7bc
NH
2352 if (!strcmp(arg, "-d")) {
2353 delete_branch = 1;
2354 continue;
2355 }
2356 if (!strcmp(arg, "-D")) {
2357 delete_branch = 1;
2358 force_delete = 1;
2359 continue;
2360 }
58e60dd2
NH
2361 }
2362 if (!remote->url) {
aa1dbc98 2363 char *path = strstr(arg, "//");
8c9e7947 2364 remote->url = arg;
aa1dbc98 2365 if (path) {
ef9e58c8 2366 path = strchr(path+2, '/');
aa1dbc98
NH
2367 if (path)
2368 remote->path_len = strlen(path);
2369 }
58e60dd2
NH
2370 continue;
2371 }
2372 refspec = argv;
2373 nr_refspec = argc - i;
2374 break;
2375 }
2376
3e9fabc8
NH
2377 if (!remote->url)
2378 usage(http_push_usage);
2379
3dfaf7bc
NH
2380 if (delete_branch && nr_refspec != 1)
2381 die("You must specify only one branch name when deleting a remote branch");
2382
aa1dbc98 2383 memset(remote_dir_exists, -1, 256);
0dd276b8 2384
29508e1e 2385 http_init();
58e60dd2
NH
2386
2387 no_pragma_header = curl_slist_append(no_pragma_header, "Pragma:");
2388 default_headers = curl_slist_append(default_headers, "Range:");
2389 default_headers = curl_slist_append(default_headers, "Destination:");
2390 default_headers = curl_slist_append(default_headers, "If:");
2391 default_headers = curl_slist_append(default_headers,
2392 "Pragma: no-cache");
2393
58e60dd2 2394 /* Verify DAV compliance/lock support */
acf59575 2395 if (!locking_available()) {
58e60dd2
NH
2396 fprintf(stderr, "Error: no DAV locking support on remote repo %s\n", remote->url);
2397 rc = 1;
2398 goto cleanup;
2399 }
2400
197e8951
NH
2401 /* Check whether the remote has server info files */
2402 remote->can_update_info_refs = 0;
2403 remote->has_info_refs = remote_exists("info/refs");
2404 remote->has_info_packs = remote_exists("objects/info/packs");
2405 if (remote->has_info_refs) {
2406 info_ref_lock = lock_remote("info/refs", LOCK_TIME);
2407 if (info_ref_lock)
2408 remote->can_update_info_refs = 1;
2409 }
2410 if (remote->has_info_packs)
2411 fetch_indices();
2412
aa1dbc98
NH
2413 /* Get a list of all local and remote heads to validate refspecs */
2414 get_local_heads();
2415 fprintf(stderr, "Fetching remote heads...\n");
2416 get_dav_remote_heads();
2417
3dfaf7bc
NH
2418 /* Remove a remote branch if -d or -D was specified */
2419 if (delete_branch) {
2420 if (delete_remote_branch(refspec[0], force_delete) == -1)
2421 fprintf(stderr, "Unable to delete remote branch %s\n",
2422 refspec[0]);
2423 goto cleanup;
2424 }
2425
aa1dbc98
NH
2426 /* match them up */
2427 if (!remote_tail)
2428 remote_tail = &remote_refs;
2429 if (match_refs(local_refs, remote_refs, &remote_tail,
2430 nr_refspec, refspec, push_all))
2431 return -1;
2432 if (!remote_refs) {
2433 fprintf(stderr, "No refs in common and none specified; doing nothing.\n");
2434 return 0;
2435 }
2436
8c9e7947 2437 new_refs = 0;
aa1dbc98
NH
2438 for (ref = remote_refs; ref; ref = ref->next) {
2439 char old_hex[60], *new_hex;
8c9e7947
JH
2440 const char *commit_argv[4];
2441 int commit_argc;
2442 char *new_sha1_hex, *old_sha1_hex;
2443
aa1dbc98
NH
2444 if (!ref->peer_ref)
2445 continue;
2446 if (!memcmp(ref->old_sha1, ref->peer_ref->new_sha1, 20)) {
2447 if (push_verbosely || 1)
2448 fprintf(stderr, "'%s': up-to-date\n", ref->name);
2449 continue;
2450 }
2451
2452 if (!force_all &&
2453 !is_zero_sha1(ref->old_sha1) &&
2454 !ref->force) {
2455 if (!has_sha1_file(ref->old_sha1) ||
2456 !ref_newer(ref->peer_ref->new_sha1,
2457 ref->old_sha1)) {
2458 /* We do not have the remote ref, or
2459 * we know that the remote ref is not
2460 * an ancestor of what we are trying to
2461 * push. Either way this can be losing
2462 * commits at the remote end and likely
2463 * we were not up to date to begin with.
2464 */
2465 error("remote '%s' is not a strict "
2466 "subset of local ref '%s'. "
2467 "maybe you are not up-to-date and "
2468 "need to pull first?",
2469 ref->name,
2470 ref->peer_ref->name);
1a703cba 2471 rc = -2;
aa1dbc98
NH
2472 continue;
2473 }
58e60dd2 2474 }
aa1dbc98
NH
2475 memcpy(ref->new_sha1, ref->peer_ref->new_sha1, 20);
2476 if (is_zero_sha1(ref->new_sha1)) {
2477 error("cannot happen anymore");
1a703cba 2478 rc = -3;
aa1dbc98 2479 continue;
58e60dd2 2480 }
aa1dbc98
NH
2481 new_refs++;
2482 strcpy(old_hex, sha1_to_hex(ref->old_sha1));
2483 new_hex = sha1_to_hex(ref->new_sha1);
2484
2485 fprintf(stderr, "updating '%s'", ref->name);
2486 if (strcmp(ref->name, ref->peer_ref->name))
2487 fprintf(stderr, " using '%s'", ref->peer_ref->name);
2488 fprintf(stderr, "\n from %s\n to %s\n", old_hex, new_hex);
2489
58e60dd2
NH
2490
2491 /* Lock remote branch ref */
aa1dbc98
NH
2492 ref_lock = lock_remote(ref->name, LOCK_TIME);
2493 if (ref_lock == NULL) {
58e60dd2 2494 fprintf(stderr, "Unable to lock remote branch %s\n",
aa1dbc98 2495 ref->name);
58e60dd2
NH
2496 rc = 1;
2497 continue;
2498 }
2499
aa1dbc98 2500 /* Set up revision info for this refspec */
8c9e7947
JH
2501 commit_argc = 3;
2502 new_sha1_hex = strdup(sha1_to_hex(ref->new_sha1));
2503 old_sha1_hex = NULL;
5241bfe6
NH
2504 commit_argv[1] = "--objects";
2505 commit_argv[2] = new_sha1_hex;
aa1dbc98
NH
2506 if (!push_all && !is_zero_sha1(ref->old_sha1)) {
2507 old_sha1_hex = xmalloc(42);
2508 sprintf(old_sha1_hex, "^%s",
2509 sha1_to_hex(ref->old_sha1));
5241bfe6 2510 commit_argv[3] = old_sha1_hex;
aa1dbc98 2511 commit_argc++;
58e60dd2 2512 }
6b9c58f4 2513 init_revisions(&revs);
aa1dbc98 2514 setup_revisions(commit_argc, commit_argv, &revs, NULL);
aa1dbc98
NH
2515 free(new_sha1_hex);
2516 if (old_sha1_hex) {
2517 free(old_sha1_hex);
2518 commit_argv[1] = NULL;
58e60dd2
NH
2519 }
2520
aa1dbc98 2521 /* Generate a list of objects that need to be pushed */
58e60dd2 2522 pushing = 0;
aa1dbc98
NH
2523 prepare_revision_walk(&revs);
2524 mark_edges_uninteresting(revs.commits);
1a703cba 2525 objects_to_send = get_delta(&revs, ref_lock);
29508e1e 2526 finish_all_active_slots();
58e60dd2
NH
2527
2528 /* Push missing objects to remote, this would be a
2529 convenient time to pack them first if appropriate. */
2530 pushing = 1;
1a703cba
NH
2531 if (objects_to_send)
2532 fprintf(stderr, " sending %d objects\n",
2533 objects_to_send);
b3ca4e4e 2534#ifdef USE_CURL_MULTI
29508e1e 2535 fill_active_slots();
b3ca4e4e 2536#endif
29508e1e 2537 finish_all_active_slots();
58e60dd2
NH
2538
2539 /* Update the remote branch if all went well */
aa1dbc98
NH
2540 if (aborted || !update_remote(ref->new_sha1, ref_lock)) {
2541 rc = 1;
2542 goto unlock;
58e60dd2
NH
2543 }
2544
2545 unlock:
aa1dbc98
NH
2546 if (!rc)
2547 fprintf(stderr, " done\n");
2548 unlock_remote(ref_lock);
512d632c 2549 check_locks();
58e60dd2
NH
2550 }
2551
197e8951
NH
2552 /* Update remote server info if appropriate */
2553 if (remote->has_info_refs && new_refs) {
2554 if (info_ref_lock && remote->can_update_info_refs) {
2555 fprintf(stderr, "Updating remote server info\n");
2556 update_remote_info_refs(info_ref_lock);
2557 } else {
2558 fprintf(stderr, "Unable to update server info\n");
2559 }
2560 }
2561 if (info_ref_lock)
2562 unlock_remote(info_ref_lock);
2563
58e60dd2
NH
2564 cleanup:
2565 free(remote);
2566
2567 curl_slist_free_all(no_pragma_header);
2568 curl_slist_free_all(default_headers);
2569
29508e1e 2570 http_cleanup();
58e60dd2
NH
2571
2572 request = request_queue_head;
2573 while (request != NULL) {
2574 next_request = request->next;
2575 release_request(request);
58e60dd2
NH
2576 request = next_request;
2577 }
2578
58e60dd2
NH
2579 return rc;
2580}