blob: ed486116ee1e5f36c5fa42031e5b656d67ed5d5a [file] [log] [blame]
Jason Riedy731043f2006-01-25 12:38:36 -08001#include "git-compat-util.h"
Linus Torvaldsf7192592005-07-04 11:57:58 -07002#include "cache.h"
Brandon Williamsb2141fc2017-06-14 11:07:36 -07003#include "config.h"
Elijah Newren41771fa2023-02-24 00:09:27 +00004#include "hex.h"
Linus Torvalds41cb7482005-07-05 15:44:09 -07005#include "pkt-line.h"
Junio C Hamanob10d0ec2005-07-08 00:02:52 -07006#include "quote.h"
Junio C Hamano6abf5c02005-10-16 00:25:26 -07007#include "refs.h"
Shawn O. Pearce15a1c0122007-03-12 19:00:19 -04008#include "run-command.h"
Daniel Barkalow6b628162007-05-12 11:45:59 -04009#include "remote.h"
Junio C Hamano47a59182013-07-08 13:56:53 -070010#include "connect.h"
Jeff King9d2e9422010-05-23 05:19:44 -040011#include "url.h"
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070012#include "string-list.h"
Jeff Kingfe299ec2020-03-30 10:03:46 -040013#include "oid-array.h"
Jeff Kinga5adace2015-09-16 13:12:52 -040014#include "transport.h"
Jonathan Tan0cd83282017-09-26 16:56:19 -070015#include "strbuf.h"
Brandon Williamse52449b2018-03-15 10:31:21 -070016#include "version.h"
Brandon Williams26090432017-10-16 10:55:27 -070017#include "protocol.h"
Nguyễn Thái Ngọc Duy65b5f942018-05-20 20:40:06 +020018#include "alias.h"
Ævar Arnfjörð Bjarmason0cfde742022-12-22 15:14:09 +000019#include "bundle-uri.h"
Linus Torvaldsf7192592005-07-04 11:57:58 -070020
Brandon Williamse52449b2018-03-15 10:31:21 -070021static char *server_capabilities_v1;
Jeff Kingef8d7ac2020-07-28 16:24:53 -040022static struct strvec server_capabilities_v2 = STRVEC_INIT;
brian m. carlson2c6a4032020-05-25 19:58:52 +000023static const char *next_server_feature_value(const char *feature, int *len, int *offset);
Johannes Schindelin211b5f92005-10-28 04:48:54 +020024
René Scharfebe0b3f82014-08-30 11:46:54 +020025static int check_ref(const char *name, unsigned int flags)
Linus Torvalds2718ff02006-07-04 12:29:10 -070026{
27 if (!flags)
28 return 1;
29
René Scharfebe0b3f82014-08-30 11:46:54 +020030 if (!skip_prefix(name, "refs/", &name))
Linus Torvalds2718ff02006-07-04 12:29:10 -070031 return 0;
32
Linus Torvalds2718ff02006-07-04 12:29:10 -070033 /* REF_NORMAL means that we don't want the magic fake tag refs */
ZheNing Hu7c3c5502023-03-01 10:20:29 +000034 if ((flags & REF_NORMAL) && check_refname_format(name,
35 REFNAME_ALLOW_ONELEVEL))
Linus Torvalds2718ff02006-07-04 12:29:10 -070036 return 0;
37
38 /* REF_HEADS means that we want regular branch heads */
René Scharfebe0b3f82014-08-30 11:46:54 +020039 if ((flags & REF_HEADS) && starts_with(name, "heads/"))
Linus Torvalds2718ff02006-07-04 12:29:10 -070040 return 1;
41
42 /* REF_TAGS means that we want tags */
René Scharfebe0b3f82014-08-30 11:46:54 +020043 if ((flags & REF_TAGS) && starts_with(name, "tags/"))
Linus Torvalds2718ff02006-07-04 12:29:10 -070044 return 1;
45
46 /* All type bits clear means that we are ok with anything */
47 return !(flags & ~REF_NORMAL);
48}
49
Daniel Barkalow45773702007-10-29 21:05:40 -040050int check_ref_type(const struct ref *ref, int flags)
51{
René Scharfebe0b3f82014-08-30 11:46:54 +020052 return check_ref(ref->name, flags);
Daniel Barkalow45773702007-10-29 21:05:40 -040053}
54
Nguyễn Thái Ngọc Duyd2bff222018-04-14 19:19:43 +000055static NORETURN void die_initial_contact(int unexpected)
Heiko Voigt46284dd2012-06-19 20:24:50 +020056{
Brandon Williams7e3e4792018-03-14 11:31:44 -070057 /*
58 * A hang-up after seeing some response from the other end
59 * means that it is unexpected, as we know the other end is
60 * willing to talk to us. A hang-up before seeing any
61 * response does not necessarily mean an ACL problem, though.
62 */
Jonathan Nieder55e4f932016-09-09 10:36:29 -070063 if (unexpected)
Nguyễn Thái Ngọc Duy1a07e592018-07-21 09:49:19 +020064 die(_("the remote end hung up upon initial contact"));
Heiko Voigt46284dd2012-06-19 20:24:50 +020065 else
Vasco Almeidaf2b93b32016-09-19 13:08:17 +000066 die(_("Could not read from remote repository.\n\n"
67 "Please make sure you have the correct access rights\n"
68 "and the repository exists."));
Heiko Voigt46284dd2012-06-19 20:24:50 +020069}
70
Brandon Williamse52449b2018-03-15 10:31:21 -070071/* Checks if the server supports the capability 'c' */
Jeff Kinga31cfe32022-12-13 05:52:58 -050072int server_supports_v2(const char *c)
Brandon Williamse52449b2018-03-15 10:31:21 -070073{
74 int i;
75
Jeff Kingd70a9eb2020-07-28 20:37:20 -040076 for (i = 0; i < server_capabilities_v2.nr; i++) {
Brandon Williamse52449b2018-03-15 10:31:21 -070077 const char *out;
Jeff Kingd70a9eb2020-07-28 20:37:20 -040078 if (skip_prefix(server_capabilities_v2.v[i], c, &out) &&
Brandon Williamse52449b2018-03-15 10:31:21 -070079 (!*out || *out == '='))
80 return 1;
81 }
Brandon Williamse52449b2018-03-15 10:31:21 -070082 return 0;
83}
84
Jeff Kinga31cfe32022-12-13 05:52:58 -050085void ensure_server_supports_v2(const char *c)
86{
87 if (!server_supports_v2(c))
88 die(_("server doesn't support '%s'"), c);
89}
90
brian m. carlson1349ffe2020-05-25 19:58:53 +000091int server_feature_v2(const char *c, const char **v)
92{
93 int i;
94
Jeff Kingd70a9eb2020-07-28 20:37:20 -040095 for (i = 0; i < server_capabilities_v2.nr; i++) {
brian m. carlson1349ffe2020-05-25 19:58:53 +000096 const char *out;
Jeff Kingd70a9eb2020-07-28 20:37:20 -040097 if (skip_prefix(server_capabilities_v2.v[i], c, &out) &&
brian m. carlson1349ffe2020-05-25 19:58:53 +000098 (*out == '=')) {
99 *v = out + 1;
100 return 1;
101 }
102 }
103 return 0;
104}
105
Brandon Williamsf7e20502018-03-15 10:31:29 -0700106int server_supports_feature(const char *c, const char *feature,
107 int die_on_error)
108{
109 int i;
110
Jeff Kingd70a9eb2020-07-28 20:37:20 -0400111 for (i = 0; i < server_capabilities_v2.nr; i++) {
Brandon Williamsf7e20502018-03-15 10:31:29 -0700112 const char *out;
Jeff Kingd70a9eb2020-07-28 20:37:20 -0400113 if (skip_prefix(server_capabilities_v2.v[i], c, &out) &&
Brandon Williamsf7e20502018-03-15 10:31:29 -0700114 (!*out || *(out++) == '=')) {
115 if (parse_feature_request(out, feature))
116 return 1;
117 else
118 break;
119 }
120 }
121
122 if (die_on_error)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200123 die(_("server doesn't support feature '%s'"), feature);
Brandon Williamsf7e20502018-03-15 10:31:29 -0700124
125 return 0;
126}
127
Brandon Williamse52449b2018-03-15 10:31:21 -0700128static void process_capabilities_v2(struct packet_reader *reader)
129{
130 while (packet_reader_read(reader) == PACKET_READ_NORMAL)
Jeff Kingef8d7ac2020-07-28 16:24:53 -0400131 strvec_push(&server_capabilities_v2, reader->line);
Brandon Williamse52449b2018-03-15 10:31:21 -0700132
133 if (reader->status != PACKET_READ_FLUSH)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200134 die(_("expected flush after capabilities"));
Brandon Williamse52449b2018-03-15 10:31:21 -0700135}
136
Brandon Williamsad6ac122018-03-14 11:31:45 -0700137enum protocol_version discover_version(struct packet_reader *reader)
Brandon Williams7e3e4792018-03-14 11:31:44 -0700138{
139 enum protocol_version version = protocol_unknown_version;
140
141 /*
142 * Peek the first line of the server's response to
143 * determine the protocol version the server is speaking.
144 */
145 switch (packet_reader_peek(reader)) {
146 case PACKET_READ_EOF:
147 die_initial_contact(0);
148 case PACKET_READ_FLUSH:
149 case PACKET_READ_DELIM:
Denton Liu0181b602020-05-19 06:53:59 -0400150 case PACKET_READ_RESPONSE_END:
Brandon Williams7e3e4792018-03-14 11:31:44 -0700151 version = protocol_v0;
152 break;
153 case PACKET_READ_NORMAL:
154 version = determine_protocol_version_client(reader->line);
155 break;
156 }
157
158 switch (version) {
Brandon Williams8f6982b2018-03-14 11:31:47 -0700159 case protocol_v2:
Brandon Williamse52449b2018-03-15 10:31:21 -0700160 process_capabilities_v2(reader);
Brandon Williams8f6982b2018-03-14 11:31:47 -0700161 break;
Brandon Williams7e3e4792018-03-14 11:31:44 -0700162 case protocol_v1:
163 /* Read the peeked version line */
164 packet_reader_read(reader);
165 break;
166 case protocol_v0:
167 break;
168 case protocol_unknown_version:
169 BUG("unknown protocol version");
170 }
171
Josh Steadmon626beeb2021-08-10 10:20:39 -0700172 trace2_data_intmax("transfer", NULL, "negotiated-version", version);
173
Brandon Williams7e3e4792018-03-14 11:31:44 -0700174 return version;
175}
176
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700177static void parse_one_symref_info(struct string_list *symref, const char *val, int len)
178{
179 char *sym, *target;
180 struct string_list_item *item;
181
182 if (!len)
183 return; /* just "symref" */
184 /* e.g. "symref=HEAD:refs/heads/master" */
René Scharfe5c0b13f2014-07-19 17:35:34 +0200185 sym = xmemdupz(val, len);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700186 target = strchr(sym, ':');
187 if (!target)
188 /* just "symref=something" */
189 goto reject;
190 *(target++) = '\0';
191 if (check_refname_format(sym, REFNAME_ALLOW_ONELEVEL) ||
192 check_refname_format(target, REFNAME_ALLOW_ONELEVEL))
193 /* "symref=bogus:pair */
194 goto reject;
Jeff Kingef4fe562017-05-25 15:33:05 -0400195 item = string_list_append_nodup(symref, sym);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700196 item->util = target;
197 return;
198reject:
199 free(sym);
200 return;
201}
202
203static void annotate_refs_with_symref_info(struct ref *ref)
204{
205 struct string_list symref = STRING_LIST_INIT_DUP;
brian m. carlson2c6a4032020-05-25 19:58:52 +0000206 int offset = 0;
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700207
brian m. carlson2c6a4032020-05-25 19:58:52 +0000208 while (1) {
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700209 int len;
210 const char *val;
211
brian m. carlson2c6a4032020-05-25 19:58:52 +0000212 val = next_server_feature_value("symref", &len, &offset);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700213 if (!val)
214 break;
215 parse_one_symref_info(&symref, val, len);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700216 }
Michael Haggerty3383e192014-11-25 09:02:35 +0100217 string_list_sort(&symref);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700218
219 for (; ref; ref = ref->next) {
220 struct string_list_item *item;
221 item = string_list_lookup(&symref, ref->name);
222 if (!item)
223 continue;
224 ref->symref = xstrdup((char *)item->util);
225 }
226 string_list_clear(&symref, 0);
227}
228
brian m. carlson92315e52020-05-25 19:58:49 +0000229static void process_capabilities(struct packet_reader *reader, int *linelen)
Jonathan Tan0cd83282017-09-26 16:56:19 -0700230{
brian m. carlson7c601dc2020-05-25 19:59:00 +0000231 const char *feat_val;
232 int feat_len;
brian m. carlson92315e52020-05-25 19:58:49 +0000233 const char *line = reader->line;
Brandon Williams7e3e4792018-03-14 11:31:44 -0700234 int nul_location = strlen(line);
brian m. carlson92315e52020-05-25 19:58:49 +0000235 if (nul_location == *linelen)
Jonathan Tan0cd83282017-09-26 16:56:19 -0700236 return;
Brandon Williamse52449b2018-03-15 10:31:21 -0700237 server_capabilities_v1 = xstrdup(line + nul_location + 1);
brian m. carlson92315e52020-05-25 19:58:49 +0000238 *linelen = nul_location;
brian m. carlson7c601dc2020-05-25 19:59:00 +0000239
240 feat_val = server_feature_value("object-format", &feat_len);
241 if (feat_val) {
242 char *hash_name = xstrndup(feat_val, feat_len);
243 int hash_algo = hash_algo_by_name(hash_name);
244 if (hash_algo != GIT_HASH_UNKNOWN)
245 reader->hash_algo = &hash_algos[hash_algo];
246 free(hash_name);
247 } else {
248 reader->hash_algo = &hash_algos[GIT_HASH_SHA1];
249 }
Jonathan Tan0cd83282017-09-26 16:56:19 -0700250}
251
brian m. carlson92315e52020-05-25 19:58:49 +0000252static int process_dummy_ref(const struct packet_reader *reader)
Jonathan Tan0cd83282017-09-26 16:56:19 -0700253{
brian m. carlson92315e52020-05-25 19:58:49 +0000254 const char *line = reader->line;
Jonathan Tan0cd83282017-09-26 16:56:19 -0700255 struct object_id oid;
256 const char *name;
257
brian m. carlson7c601dc2020-05-25 19:59:00 +0000258 if (parse_oid_hex_algop(line, &oid, &name, reader->hash_algo))
Jonathan Tan0cd83282017-09-26 16:56:19 -0700259 return 0;
260 if (*name != ' ')
261 return 0;
262 name++;
263
brian m. carlson14228442021-04-26 01:02:56 +0000264 return oideq(null_oid(), &oid) && !strcmp(name, "capabilities^{}");
Jonathan Tan0cd83282017-09-26 16:56:19 -0700265}
266
Brandon Williams7e3e4792018-03-14 11:31:44 -0700267static void check_no_capabilities(const char *line, int len)
Jonathan Tan0cd83282017-09-26 16:56:19 -0700268{
Brandon Williams7e3e4792018-03-14 11:31:44 -0700269 if (strlen(line) != len)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200270 warning(_("ignoring capabilities after first line '%s'"),
Brandon Williams7e3e4792018-03-14 11:31:44 -0700271 line + strlen(line));
Jonathan Tan0cd83282017-09-26 16:56:19 -0700272}
273
brian m. carlson92315e52020-05-25 19:58:49 +0000274static int process_ref(const struct packet_reader *reader, int len,
275 struct ref ***list, unsigned int flags,
276 struct oid_array *extra_have)
Jonathan Tan0cd83282017-09-26 16:56:19 -0700277{
brian m. carlson92315e52020-05-25 19:58:49 +0000278 const char *line = reader->line;
Jonathan Tan0cd83282017-09-26 16:56:19 -0700279 struct object_id old_oid;
280 const char *name;
281
brian m. carlson7c601dc2020-05-25 19:59:00 +0000282 if (parse_oid_hex_algop(line, &old_oid, &name, reader->hash_algo))
Jonathan Tan0cd83282017-09-26 16:56:19 -0700283 return 0;
284 if (*name != ' ')
285 return 0;
286 name++;
287
288 if (extra_have && !strcmp(name, ".have")) {
289 oid_array_append(extra_have, &old_oid);
290 } else if (!strcmp(name, "capabilities^{}")) {
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200291 die(_("protocol error: unexpected capabilities^{}"));
Jonathan Tan0cd83282017-09-26 16:56:19 -0700292 } else if (check_ref(name, flags)) {
293 struct ref *ref = alloc_ref(name);
294 oidcpy(&ref->old_oid, &old_oid);
295 **list = ref;
296 *list = &ref->next;
297 }
Brandon Williams7e3e4792018-03-14 11:31:44 -0700298 check_no_capabilities(line, len);
Jonathan Tan0cd83282017-09-26 16:56:19 -0700299 return 1;
300}
301
brian m. carlson92315e52020-05-25 19:58:49 +0000302static int process_shallow(const struct packet_reader *reader, int len,
Brandon Williams7e3e4792018-03-14 11:31:44 -0700303 struct oid_array *shallow_points)
Jonathan Tan0cd83282017-09-26 16:56:19 -0700304{
brian m. carlson92315e52020-05-25 19:58:49 +0000305 const char *line = reader->line;
Jonathan Tan0cd83282017-09-26 16:56:19 -0700306 const char *arg;
307 struct object_id old_oid;
308
Brandon Williams7e3e4792018-03-14 11:31:44 -0700309 if (!skip_prefix(line, "shallow ", &arg))
Jonathan Tan0cd83282017-09-26 16:56:19 -0700310 return 0;
311
brian m. carlson7c601dc2020-05-25 19:59:00 +0000312 if (get_oid_hex_algop(arg, &old_oid, reader->hash_algo))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200313 die(_("protocol error: expected shallow sha-1, got '%s'"), arg);
Jonathan Tan0cd83282017-09-26 16:56:19 -0700314 if (!shallow_points)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200315 die(_("repository on the other end cannot be shallow"));
Jonathan Tan0cd83282017-09-26 16:56:19 -0700316 oid_array_append(shallow_points, &old_oid);
Brandon Williams7e3e4792018-03-14 11:31:44 -0700317 check_no_capabilities(line, len);
Jonathan Tan0cd83282017-09-26 16:56:19 -0700318 return 1;
319}
320
Brandon Williams7e3e4792018-03-14 11:31:44 -0700321enum get_remote_heads_state {
322 EXPECTING_FIRST_REF = 0,
323 EXPECTING_REF,
324 EXPECTING_SHALLOW,
325 EXPECTING_DONE,
326};
327
Jonathan Tan0cd83282017-09-26 16:56:19 -0700328/*
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700329 * Read all the refs from the other end
330 */
Brandon Williamsad6ac122018-03-14 11:31:45 -0700331struct ref **get_remote_heads(struct packet_reader *reader,
Jeff King85edf4f2013-02-20 15:06:45 -0500332 struct ref **list, unsigned int flags,
brian m. carlson910650d2017-03-31 01:40:00 +0000333 struct oid_array *extra_have,
334 struct oid_array *shallow_points)
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700335{
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700336 struct ref **orig_list = list;
Brandon Williams7e3e4792018-03-14 11:31:44 -0700337 int len = 0;
338 enum get_remote_heads_state state = EXPECTING_FIRST_REF;
Jonathan Nieder55e4f932016-09-09 10:36:29 -0700339
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700340 *list = NULL;
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700341
Brandon Williams7e3e4792018-03-14 11:31:44 -0700342 while (state != EXPECTING_DONE) {
Brandon Williamsad6ac122018-03-14 11:31:45 -0700343 switch (packet_reader_read(reader)) {
Brandon Williams7e3e4792018-03-14 11:31:44 -0700344 case PACKET_READ_EOF:
345 die_initial_contact(1);
346 case PACKET_READ_NORMAL:
Brandon Williamsad6ac122018-03-14 11:31:45 -0700347 len = reader->pktlen;
Brandon Williams7e3e4792018-03-14 11:31:44 -0700348 break;
349 case PACKET_READ_FLUSH:
350 state = EXPECTING_DONE;
351 break;
352 case PACKET_READ_DELIM:
Denton Liu0181b602020-05-19 06:53:59 -0400353 case PACKET_READ_RESPONSE_END:
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200354 die(_("invalid packet"));
Brandon Williams7e3e4792018-03-14 11:31:44 -0700355 }
356
Jonathan Tan0cd83282017-09-26 16:56:19 -0700357 switch (state) {
358 case EXPECTING_FIRST_REF:
brian m. carlson92315e52020-05-25 19:58:49 +0000359 process_capabilities(reader, &len);
360 if (process_dummy_ref(reader)) {
Jonathan Tan0cd83282017-09-26 16:56:19 -0700361 state = EXPECTING_SHALLOW;
362 break;
363 }
364 state = EXPECTING_REF;
365 /* fallthrough */
366 case EXPECTING_REF:
brian m. carlson92315e52020-05-25 19:58:49 +0000367 if (process_ref(reader, len, &list, flags, extra_have))
Jonathan Tan0cd83282017-09-26 16:56:19 -0700368 break;
369 state = EXPECTING_SHALLOW;
370 /* fallthrough */
371 case EXPECTING_SHALLOW:
brian m. carlson92315e52020-05-25 19:58:49 +0000372 if (process_shallow(reader, len, shallow_points))
Jonathan Tan0cd83282017-09-26 16:56:19 -0700373 break;
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200374 die(_("protocol error: unexpected '%s'"), reader->line);
Brandon Williams7e3e4792018-03-14 11:31:44 -0700375 case EXPECTING_DONE:
376 break;
Nguyễn Thái Ngọc Duyb06dcd72013-12-05 20:02:33 +0700377 }
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700378 }
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700379
380 annotate_refs_with_symref_info(*orig_list);
381
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700382 return list;
383}
384
Brandon Williamse52449b2018-03-15 10:31:21 -0700385/* Returns 1 when a valid ref has been added to `list`, 0 otherwise */
Jonathan Tan4f37d452021-02-05 12:48:49 -0800386static int process_ref_v2(struct packet_reader *reader, struct ref ***list,
Ævar Arnfjörð Bjarmasonf36d4f82022-02-05 01:08:14 +0100387 const char **unborn_head_target)
Brandon Williamse52449b2018-03-15 10:31:21 -0700388{
389 int ret = 1;
390 int i = 0;
391 struct object_id old_oid;
392 struct ref *ref;
393 struct string_list line_sections = STRING_LIST_INIT_DUP;
394 const char *end;
brian m. carlson67e9a702020-05-25 19:59:15 +0000395 const char *line = reader->line;
Brandon Williamse52449b2018-03-15 10:31:21 -0700396
397 /*
398 * Ref lines have a number of fields which are space deliminated. The
399 * first field is the OID of the ref. The second field is the ref
400 * name. Subsequent fields (symref-target and peeled) are optional and
401 * don't have a particular order.
402 */
403 if (string_list_split(&line_sections, line, ' ', -1) < 2) {
404 ret = 0;
405 goto out;
406 }
407
Jonathan Tan4f37d452021-02-05 12:48:49 -0800408 if (!strcmp("unborn", line_sections.items[i].string)) {
409 i++;
410 if (unborn_head_target &&
411 !strcmp("HEAD", line_sections.items[i++].string)) {
412 /*
413 * Look for the symref target (if any). If found,
414 * return it to the caller.
415 */
416 for (; i < line_sections.nr; i++) {
417 const char *arg = line_sections.items[i].string;
418
419 if (skip_prefix(arg, "symref-target:", &arg)) {
420 *unborn_head_target = xstrdup(arg);
421 break;
422 }
423 }
424 }
425 goto out;
426 }
brian m. carlsonab672352020-05-25 19:59:16 +0000427 if (parse_oid_hex_algop(line_sections.items[i++].string, &old_oid, &end, reader->hash_algo) ||
Brandon Williamse52449b2018-03-15 10:31:21 -0700428 *end) {
429 ret = 0;
430 goto out;
431 }
432
433 ref = alloc_ref(line_sections.items[i++].string);
434
brian m. carlsonab672352020-05-25 19:59:16 +0000435 memcpy(ref->old_oid.hash, old_oid.hash, reader->hash_algo->rawsz);
Brandon Williamse52449b2018-03-15 10:31:21 -0700436 **list = ref;
437 *list = &ref->next;
438
439 for (; i < line_sections.nr; i++) {
440 const char *arg = line_sections.items[i].string;
441 if (skip_prefix(arg, "symref-target:", &arg))
442 ref->symref = xstrdup(arg);
443
444 if (skip_prefix(arg, "peeled:", &arg)) {
445 struct object_id peeled_oid;
446 char *peeled_name;
447 struct ref *peeled;
brian m. carlsonab672352020-05-25 19:59:16 +0000448 if (parse_oid_hex_algop(arg, &peeled_oid, &end,
449 reader->hash_algo) || *end) {
Brandon Williamse52449b2018-03-15 10:31:21 -0700450 ret = 0;
451 goto out;
452 }
453
454 peeled_name = xstrfmt("%s^{}", ref->name);
455 peeled = alloc_ref(peeled_name);
456
brian m. carlsonab672352020-05-25 19:59:16 +0000457 memcpy(peeled->old_oid.hash, peeled_oid.hash,
458 reader->hash_algo->rawsz);
Brandon Williamse52449b2018-03-15 10:31:21 -0700459 **list = peeled;
460 *list = &peeled->next;
461
462 free(peeled_name);
463 }
464 }
465
466out:
467 string_list_clear(&line_sections, 0);
468 return ret;
469}
470
Denton Liub0df0c12020-05-19 06:54:00 -0400471void check_stateless_delimiter(int stateless_rpc,
472 struct packet_reader *reader,
473 const char *error)
474{
475 if (!stateless_rpc)
476 return; /* not in stateless mode, no delimiter expected */
477 if (packet_reader_read(reader) != PACKET_READ_RESPONSE_END)
478 die("%s", error);
479}
480
Ævar Arnfjörð Bjarmason86f4e312022-05-16 20:10:58 +0000481static void send_capabilities(int fd_out, struct packet_reader *reader)
Brandon Williamse52449b2018-03-15 10:31:21 -0700482{
brian m. carlsonab672352020-05-25 19:59:16 +0000483 const char *hash_name;
Brandon Williamse52449b2018-03-15 10:31:21 -0700484
Jeff Kinga31cfe32022-12-13 05:52:58 -0500485 if (server_supports_v2("agent"))
Brandon Williamse52449b2018-03-15 10:31:21 -0700486 packet_write_fmt(fd_out, "agent=%s", git_user_agent_sanitized());
487
brian m. carlsonab672352020-05-25 19:59:16 +0000488 if (server_feature_v2("object-format", &hash_name)) {
489 int hash_algo = hash_algo_by_name(hash_name);
490 if (hash_algo == GIT_HASH_UNKNOWN)
491 die(_("unknown object format '%s' specified by server"), hash_name);
492 reader->hash_algo = &hash_algos[hash_algo];
493 packet_write_fmt(fd_out, "object-format=%s", reader->hash_algo->name);
brian m. carlson9de0dd32020-05-25 19:59:17 +0000494 } else {
495 reader->hash_algo = &hash_algos[GIT_HASH_SHA1];
brian m. carlsonab672352020-05-25 19:59:16 +0000496 }
Ævar Arnfjörð Bjarmason86f4e312022-05-16 20:10:58 +0000497}
498
Ævar Arnfjörð Bjarmason0cfde742022-12-22 15:14:09 +0000499int get_remote_bundle_uri(int fd_out, struct packet_reader *reader,
500 struct bundle_list *bundles, int stateless_rpc)
501{
502 int line_nr = 1;
503
504 /* Assert bundle-uri support */
Junio C Hamano0903d8b2023-01-02 21:37:18 +0900505 ensure_server_supports_v2("bundle-uri");
Ævar Arnfjörð Bjarmason0cfde742022-12-22 15:14:09 +0000506
507 /* (Re-)send capabilities */
508 send_capabilities(fd_out, reader);
509
510 /* Send command */
511 packet_write_fmt(fd_out, "command=bundle-uri\n");
512 packet_delim(fd_out);
513
514 packet_flush(fd_out);
515
516 /* Process response from server */
517 while (packet_reader_read(reader) == PACKET_READ_NORMAL) {
518 const char *line = reader->line;
519 line_nr++;
520
521 if (!bundle_uri_parse_line(bundles, line))
522 continue;
523
524 return error(_("error on bundle-uri response line %d: %s"),
525 line_nr, line);
526 }
527
528 if (reader->status != PACKET_READ_FLUSH)
529 return error(_("expected flush after bundle-uri listing"));
530
531 /*
532 * Might die(), but obscure enough that that's OK, e.g. in
533 * serve.c we'll call BUG() on its equivalent (the
534 * PACKET_READ_RESPONSE_END check).
535 */
536 check_stateless_delimiter(stateless_rpc, reader,
537 _("expected response end packet after ref listing"));
538
539 return 0;
540}
541
Ævar Arnfjörð Bjarmason86f4e312022-05-16 20:10:58 +0000542struct ref **get_remote_refs(int fd_out, struct packet_reader *reader,
543 struct ref **list, int for_push,
544 struct transport_ls_refs_options *transport_options,
545 const struct string_list *server_options,
546 int stateless_rpc)
547{
548 int i;
549 struct strvec *ref_prefixes = transport_options ?
550 &transport_options->ref_prefixes : NULL;
551 const char **unborn_head_target = transport_options ?
552 &transport_options->unborn_head_target : NULL;
553 *list = NULL;
554
Jeff Kinga31cfe32022-12-13 05:52:58 -0500555 ensure_server_supports_v2("ls-refs");
556 packet_write_fmt(fd_out, "command=ls-refs\n");
Ævar Arnfjörð Bjarmason86f4e312022-05-16 20:10:58 +0000557
558 /* Send capabilities */
559 send_capabilities(fd_out, reader);
brian m. carlsonab672352020-05-25 19:59:16 +0000560
Jeff Kinga31cfe32022-12-13 05:52:58 -0500561 if (server_options && server_options->nr) {
562 ensure_server_supports_v2("server-option");
Brandon Williamsff473222018-04-23 15:46:23 -0700563 for (i = 0; i < server_options->nr; i++)
564 packet_write_fmt(fd_out, "server-option=%s",
565 server_options->items[i].string);
Jeff Kinga31cfe32022-12-13 05:52:58 -0500566 }
Brandon Williamsff473222018-04-23 15:46:23 -0700567
Brandon Williamse52449b2018-03-15 10:31:21 -0700568 packet_delim(fd_out);
569 /* When pushing we don't want to request the peeled tags */
570 if (!for_push)
571 packet_write_fmt(fd_out, "peel\n");
572 packet_write_fmt(fd_out, "symrefs\n");
Jonathan Tan4f37d452021-02-05 12:48:49 -0800573 if (server_supports_feature("ls-refs", "unborn", 0))
574 packet_write_fmt(fd_out, "unborn\n");
Jeff Kingd70a9eb2020-07-28 20:37:20 -0400575 for (i = 0; ref_prefixes && i < ref_prefixes->nr; i++) {
Brandon Williamse52449b2018-03-15 10:31:21 -0700576 packet_write_fmt(fd_out, "ref-prefix %s\n",
Jeff Kingd70a9eb2020-07-28 20:37:20 -0400577 ref_prefixes->v[i]);
Brandon Williamse52449b2018-03-15 10:31:21 -0700578 }
579 packet_flush(fd_out);
580
581 /* Process response from server */
582 while (packet_reader_read(reader) == PACKET_READ_NORMAL) {
Jonathan Tan4f37d452021-02-05 12:48:49 -0800583 if (!process_ref_v2(reader, &list, unborn_head_target))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200584 die(_("invalid ls-refs response: %s"), reader->line);
Brandon Williamse52449b2018-03-15 10:31:21 -0700585 }
586
587 if (reader->status != PACKET_READ_FLUSH)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200588 die(_("expected flush after ref listing"));
Brandon Williamse52449b2018-03-15 10:31:21 -0700589
Denton Liub0df0c12020-05-19 06:54:00 -0400590 check_stateless_delimiter(stateless_rpc, reader,
591 _("expected response end packet after ref listing"));
592
Brandon Williamse52449b2018-03-15 10:31:21 -0700593 return list;
594}
595
brian m. carlson84eca272020-05-25 19:58:58 +0000596const char *parse_feature_value(const char *feature_list, const char *feature, int *lenp, int *offset)
Junio C Hamanof47182c2012-01-08 22:06:19 +0100597{
598 int len;
599
600 if (!feature_list)
601 return NULL;
602
603 len = strlen(feature);
brian m. carlson2c6a4032020-05-25 19:58:52 +0000604 if (offset)
605 feature_list += *offset;
Junio C Hamanof47182c2012-01-08 22:06:19 +0100606 while (*feature_list) {
607 const char *found = strstr(feature_list, feature);
608 if (!found)
609 return NULL;
Jeff King94427102012-08-13 21:59:27 -0400610 if (feature_list == found || isspace(found[-1])) {
611 const char *value = found + len;
612 /* feature with no value (e.g., "thin-pack") */
613 if (!*value || isspace(*value)) {
614 if (lenp)
615 *lenp = 0;
Andrzej Hunt44d2aec2021-09-26 15:58:33 +0000616 if (offset)
617 *offset = found + len - feature_list;
Jeff King94427102012-08-13 21:59:27 -0400618 return value;
619 }
620 /* feature with a value (e.g., "agent=git/1.2.3") */
621 else if (*value == '=') {
brian m. carlson2c6a4032020-05-25 19:58:52 +0000622 int end;
623
Jeff King94427102012-08-13 21:59:27 -0400624 value++;
brian m. carlson2c6a4032020-05-25 19:58:52 +0000625 end = strcspn(value, " \t\n");
Jeff King94427102012-08-13 21:59:27 -0400626 if (lenp)
brian m. carlson2c6a4032020-05-25 19:58:52 +0000627 *lenp = end;
628 if (offset)
629 *offset = value + end - feature_list;
Jeff King94427102012-08-13 21:59:27 -0400630 return value;
631 }
632 /*
633 * otherwise we matched a substring of another feature;
634 * keep looking
635 */
636 }
Junio C Hamanof47182c2012-01-08 22:06:19 +0100637 feature_list = found + 1;
638 }
639 return NULL;
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200640}
641
brian m. carlson122037c2020-05-25 19:58:56 +0000642int server_supports_hash(const char *desired, int *feature_supported)
643{
644 int offset = 0;
645 int len;
646 const char *hash;
647
648 hash = next_server_feature_value("object-format", &len, &offset);
649 if (feature_supported)
650 *feature_supported = !!hash;
651 if (!hash) {
652 hash = hash_algos[GIT_HASH_SHA1].name;
653 len = strlen(hash);
654 }
655 while (hash) {
656 if (!xstrncmpz(desired, hash, len))
657 return 1;
658
659 hash = next_server_feature_value("object-format", &len, &offset);
660 }
661 return 0;
662}
663
Jeff King94427102012-08-13 21:59:27 -0400664int parse_feature_request(const char *feature_list, const char *feature)
665{
brian m. carlson2c6a4032020-05-25 19:58:52 +0000666 return !!parse_feature_value(feature_list, feature, NULL, NULL);
667}
668
669static const char *next_server_feature_value(const char *feature, int *len, int *offset)
670{
671 return parse_feature_value(server_capabilities_v1, feature, len, offset);
Jeff King94427102012-08-13 21:59:27 -0400672}
673
674const char *server_feature_value(const char *feature, int *len)
675{
brian m. carlson2c6a4032020-05-25 19:58:52 +0000676 return parse_feature_value(server_capabilities_v1, feature, len, NULL);
Jeff King94427102012-08-13 21:59:27 -0400677}
678
679int server_supports(const char *feature)
680{
681 return !!server_feature_value(feature, NULL);
682}
683
Linus Torvalds2386d652005-07-13 18:46:20 -0700684enum protocol {
685 PROTO_LOCAL = 1,
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100686 PROTO_FILE,
Linus Torvalds2386d652005-07-13 18:46:20 -0700687 PROTO_SSH,
Gary V. Vaughan4b055482010-05-14 09:31:35 +0000688 PROTO_GIT
Linus Torvalds2386d652005-07-13 18:46:20 -0700689};
690
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100691int url_is_local_not_ssh(const char *url)
692{
693 const char *colon = strchr(url, ':');
694 const char *slash = strchr(url, '/');
695 return !colon || (slash && slash < colon) ||
Johannes Schindelinf82a97e2019-09-06 00:09:10 +0200696 (has_dos_drive_prefix(url) && is_valid_path(url));
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100697}
698
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100699static const char *prot_name(enum protocol protocol)
700{
701 switch (protocol) {
702 case PROTO_LOCAL:
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100703 case PROTO_FILE:
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100704 return "file";
705 case PROTO_SSH:
706 return "ssh";
707 case PROTO_GIT:
708 return "git";
709 default:
Tobias Klauser83e6bda2015-09-24 14:44:49 +0200710 return "unknown protocol";
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100711 }
712}
713
Linus Torvalds2386d652005-07-13 18:46:20 -0700714static enum protocol get_protocol(const char *name)
715{
716 if (!strcmp(name, "ssh"))
717 return PROTO_SSH;
718 if (!strcmp(name, "git"))
719 return PROTO_GIT;
Carlos Martín Nieto07c77822016-02-15 15:29:06 +0100720 if (!strcmp(name, "git+ssh")) /* deprecated - do not use */
Linus Torvaldsc05186c2005-10-14 17:14:56 -0700721 return PROTO_SSH;
Carlos Martín Nieto07c77822016-02-15 15:29:06 +0100722 if (!strcmp(name, "ssh+git")) /* deprecated - do not use */
Linus Torvaldsc05186c2005-10-14 17:14:56 -0700723 return PROTO_SSH;
Linus Torvalds72a4f4b2007-08-01 10:03:37 -0700724 if (!strcmp(name, "file"))
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100725 return PROTO_FILE;
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200726 die(_("protocol '%s' is not supported"), name);
Linus Torvalds2386d652005-07-13 18:46:20 -0700727}
728
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100729static char *host_end(char **hoststart, int removebrackets)
730{
731 char *host = *hoststart;
732 char *end;
733 char *start = strstr(host, "@[");
734 if (start)
735 start++; /* Jump over '@' */
736 else
737 start = host;
738 if (start[0] == '[') {
739 end = strchr(start + 1, ']');
740 if (end) {
741 if (removebrackets) {
742 *end = 0;
743 memmove(start, start + 1, end - start);
744 end++;
745 }
746 } else
747 end = host;
748 } else
749 end = host;
750 return end;
751}
752
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400753#define STR_(s) # s
754#define STR(s) STR_(s)
Linus Torvalds2386d652005-07-13 18:46:20 -0700755
Michael Lukashov72a534d2010-02-17 20:56:02 +0000756static void get_host_and_port(char **host, const char **port)
757{
758 char *colon, *end;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100759 end = host_end(host, 1);
Michael Lukashov72a534d2010-02-17 20:56:02 +0000760 colon = strchr(end, ':');
Michael Lukashov72a534d2010-02-17 20:56:02 +0000761 if (colon) {
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100762 long portnr = strtol(colon + 1, &end, 10);
763 if (end != colon + 1 && *end == '\0' && 0 <= portnr && portnr < 65536) {
764 *colon = 0;
765 *port = colon + 1;
Torsten Bögershausen6b6c5f72015-04-07 22:03:25 +0200766 } else if (!colon[1]) {
767 *colon = 0;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100768 }
Michael Lukashov72a534d2010-02-17 20:56:02 +0000769 }
770}
771
Eric Wonge47a8582011-12-06 04:39:36 +0000772static void enable_keepalive(int sockfd)
773{
774 int ka = 1;
775
776 if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, &ka, sizeof(ka)) < 0)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200777 error_errno(_("unable to set SO_KEEPALIVE on socket"));
Eric Wonge47a8582011-12-06 04:39:36 +0000778}
779
hpa49744d62005-09-28 16:52:21 -0700780#ifndef NO_IPV6
hpa4c505f72005-09-28 16:37:58 -0700781
Alex Riesenba505322007-05-23 23:34:27 +0200782static const char *ai_name(const struct addrinfo *ai)
783{
Benjamin Kramer785a9852009-04-24 14:16:41 +0200784 static char addr[NI_MAXHOST];
785 if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0,
786 NI_NUMERICHOST) != 0)
Jeff King5096d492015-09-24 17:06:08 -0400787 xsnprintf(addr, sizeof(addr), "(unknown)");
Benjamin Kramer785a9852009-04-24 14:16:41 +0200788
Alex Riesenba505322007-05-23 23:34:27 +0200789 return addr;
790}
791
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500792/*
793 * Returns a connected socket() fd, or else die()s.
794 */
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300795static int git_tcp_connect_sock(char *host, int flags)
Linus Torvalds2386d652005-07-13 18:46:20 -0700796{
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700797 struct strbuf error_message = STRBUF_INIT;
798 int sockfd = -1;
Timo Hirvonen554fe202006-06-28 12:04:39 +0300799 const char *port = STR(DEFAULT_GIT_PORT);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400800 struct addrinfo hints, *ai0, *ai;
801 int gai;
Alex Riesenba505322007-05-23 23:34:27 +0200802 int cnt = 0;
Linus Torvalds2386d652005-07-13 18:46:20 -0700803
Michael Lukashov72a534d2010-02-17 20:56:02 +0000804 get_host_and_port(&host, &port);
805 if (!*port)
806 port = "<none>";
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400807
808 memset(&hints, 0, sizeof(hints));
Eric Wongc915f112016-02-03 04:09:14 +0000809 if (flags & CONNECT_IPV4)
810 hints.ai_family = AF_INET;
811 else if (flags & CONNECT_IPV6)
812 hints.ai_family = AF_INET6;
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400813 hints.ai_socktype = SOCK_STREAM;
814 hints.ai_protocol = IPPROTO_TCP;
815
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300816 if (flags & CONNECT_VERBOSE)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200817 fprintf(stderr, _("Looking up %s ... "), host);
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300818
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400819 gai = getaddrinfo(host, port, &hints, &ai);
820 if (gai)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200821 die(_("unable to look up %s (port %s) (%s)"), host, port, gai_strerror(gai));
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400822
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300823 if (flags & CONNECT_VERBOSE)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200824 /* TRANSLATORS: this is the end of "Looking up %s ... " */
825 fprintf(stderr, _("done.\nConnecting to %s (port %s) ... "), host, port);
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300826
Erik Faye-Lunde08afec2011-08-01 13:16:09 +0200827 for (ai0 = ai; ai; ai = ai->ai_next, cnt++) {
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500828 sockfd = socket(ai->ai_family,
829 ai->ai_socktype, ai->ai_protocol);
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700830 if ((sockfd < 0) ||
831 (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0)) {
832 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
833 host, cnt, ai_name(ai), strerror(errno));
834 if (0 <= sockfd)
835 close(sockfd);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400836 sockfd = -1;
837 continue;
Linus Torvalds2386d652005-07-13 18:46:20 -0700838 }
Alex Riesenba505322007-05-23 23:34:27 +0200839 if (flags & CONNECT_VERBOSE)
840 fprintf(stderr, "%s ", ai_name(ai));
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400841 break;
Linus Torvalds2386d652005-07-13 18:46:20 -0700842 }
843
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400844 freeaddrinfo(ai0);
Linus Torvalds2386d652005-07-13 18:46:20 -0700845
Linus Torvalds2386d652005-07-13 18:46:20 -0700846 if (sockfd < 0)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200847 die(_("unable to connect to %s:\n%s"), host, error_message.buf);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400848
Eric Wonge47a8582011-12-06 04:39:36 +0000849 enable_keepalive(sockfd);
850
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300851 if (flags & CONNECT_VERBOSE)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200852 /* TRANSLATORS: this is the end of "Connecting to %s (port %s) ... " */
853 fprintf_ln(stderr, _("done."));
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300854
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700855 strbuf_release(&error_message);
856
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500857 return sockfd;
Linus Torvalds2386d652005-07-13 18:46:20 -0700858}
859
hpa49744d62005-09-28 16:52:21 -0700860#else /* NO_IPV6 */
hpa4c505f72005-09-28 16:37:58 -0700861
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500862/*
863 * Returns a connected socket() fd, or else die()s.
864 */
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300865static int git_tcp_connect_sock(char *host, int flags)
hpa4c505f72005-09-28 16:37:58 -0700866{
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200867 struct strbuf error_message = STRBUF_INIT;
868 int sockfd = -1;
Michael Lukashov72a534d2010-02-17 20:56:02 +0000869 const char *port = STR(DEFAULT_GIT_PORT);
870 char *ep;
hpa4c505f72005-09-28 16:37:58 -0700871 struct hostent *he;
872 struct sockaddr_in sa;
873 char **ap;
874 unsigned int nport;
Alex Riesenba505322007-05-23 23:34:27 +0200875 int cnt;
hpa4c505f72005-09-28 16:37:58 -0700876
Michael Lukashov72a534d2010-02-17 20:56:02 +0000877 get_host_and_port(&host, &port);
hpa4c505f72005-09-28 16:37:58 -0700878
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300879 if (flags & CONNECT_VERBOSE)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200880 fprintf(stderr, _("Looking up %s ... "), host);
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300881
hpa4c505f72005-09-28 16:37:58 -0700882 he = gethostbyname(host);
883 if (!he)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200884 die(_("unable to look up %s (%s)"), host, hstrerror(h_errno));
hpa4c505f72005-09-28 16:37:58 -0700885 nport = strtoul(port, &ep, 10);
886 if ( ep == port || *ep ) {
887 /* Not numeric */
888 struct servent *se = getservbyname(port,"tcp");
889 if ( !se )
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200890 die(_("unknown port %s"), port);
hpa4c505f72005-09-28 16:37:58 -0700891 nport = se->s_port;
892 }
893
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300894 if (flags & CONNECT_VERBOSE)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200895 /* TRANSLATORS: this is the end of "Looking up %s ... " */
896 fprintf(stderr, _("done.\nConnecting to %s (port %s) ... "), host, port);
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300897
Alex Riesenba505322007-05-23 23:34:27 +0200898 for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) {
hpa4c505f72005-09-28 16:37:58 -0700899 memset(&sa, 0, sizeof sa);
900 sa.sin_family = he->h_addrtype;
Peter Anvin6573faf2005-09-28 17:26:44 -0700901 sa.sin_port = htons(nport);
Paul Sericec6164212005-11-22 07:54:23 -0600902 memcpy(&sa.sin_addr, *ap, he->h_length);
hpa4c505f72005-09-28 16:37:58 -0700903
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200904 sockfd = socket(he->h_addrtype, SOCK_STREAM, 0);
905 if ((sockfd < 0) ||
906 connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) {
907 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
Alex Riesenba505322007-05-23 23:34:27 +0200908 host,
909 cnt,
910 inet_ntoa(*(struct in_addr *)&sa.sin_addr),
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200911 strerror(errno));
912 if (0 <= sockfd)
913 close(sockfd);
hpa4c505f72005-09-28 16:37:58 -0700914 sockfd = -1;
915 continue;
916 }
Alex Riesenba505322007-05-23 23:34:27 +0200917 if (flags & CONNECT_VERBOSE)
918 fprintf(stderr, "%s ",
919 inet_ntoa(*(struct in_addr *)&sa.sin_addr));
hpa4c505f72005-09-28 16:37:58 -0700920 break;
921 }
922
923 if (sockfd < 0)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200924 die(_("unable to connect to %s:\n%s"), host, error_message.buf);
hpa4c505f72005-09-28 16:37:58 -0700925
Eric Wonge47a8582011-12-06 04:39:36 +0000926 enable_keepalive(sockfd);
927
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300928 if (flags & CONNECT_VERBOSE)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +0200929 /* TRANSLATORS: this is the end of "Connecting to %s (port %s) ... " */
930 fprintf_ln(stderr, _("done."));
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300931
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500932 return sockfd;
hpa4c505f72005-09-28 16:37:58 -0700933}
934
hpa49744d62005-09-28 16:52:21 -0700935#endif /* NO_IPV6 */
hpa4c505f72005-09-28 16:37:58 -0700936
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500937
Jonathan Nieder8e349782017-11-20 13:22:54 -0800938/*
939 * Dummy child_process returned by git_connect() if the transport protocol
940 * does not need fork(2).
941 */
942static struct child_process no_fork = CHILD_PROCESS_INIT;
943
944int git_connection_is_socket(struct child_process *conn)
945{
946 return conn == &no_fork;
947}
948
949static struct child_process *git_tcp_connect(int fd[2], char *host, int flags)
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500950{
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300951 int sockfd = git_tcp_connect_sock(host, flags);
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500952
953 fd[0] = sockfd;
Junio C Hamanoec587fd2007-01-21 17:10:51 -0800954 fd[1] = dup(sockfd);
Jonathan Nieder8e349782017-11-20 13:22:54 -0800955
956 return &no_fork;
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500957}
958
959
David Rientjes96f1e582006-08-15 10:23:48 -0700960static char *git_proxy_command;
Paul Collinsf8014772005-11-04 14:57:16 +0000961
Johannes Schindelinef90d6d2008-05-14 18:46:53 +0100962static int git_proxy_command_options(const char *var, const char *value,
963 void *cb)
Paul Collinsf8014772005-11-04 14:57:16 +0000964{
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800965 if (!strcmp(var, "core.gitproxy")) {
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900966 const char *for_pos;
967 int matchlen = -1;
968 int hostlen;
Erik Faye-Lund15112c92009-03-11 02:38:12 +0000969 const char *rhost_name = cb;
970 int rhost_len = strlen(rhost_name);
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900971
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800972 if (git_proxy_command)
Paul Collinsf8014772005-11-04 14:57:16 +0000973 return 0;
Junio C Hamanoc64b9ad2008-02-11 10:52:15 -0800974 if (!value)
975 return config_error_nonbool(var);
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800976 /* [core]
977 * ;# matches www.kernel.org as well
978 * gitproxy = netcatter-1 for kernel.org
979 * gitproxy = netcatter-2 for sample.xz
980 * gitproxy = netcatter-default
981 */
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900982 for_pos = strstr(value, " for ");
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800983 if (!for_pos)
984 /* matches everybody */
985 matchlen = strlen(value);
986 else {
987 hostlen = strlen(for_pos + 5);
988 if (rhost_len < hostlen)
989 matchlen = -1;
990 else if (!strncmp(for_pos + 5,
991 rhost_name + rhost_len - hostlen,
992 hostlen) &&
993 ((rhost_len == hostlen) ||
994 rhost_name[rhost_len - hostlen -1] == '.'))
995 matchlen = for_pos - value;
996 else
997 matchlen = -1;
Paul Collinsf8014772005-11-04 14:57:16 +0000998 }
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800999 if (0 <= matchlen) {
1000 /* core.gitproxy = none for kernel.org */
Junio C Hamanoa6080a02007-06-07 00:04:01 -07001001 if (matchlen == 4 &&
Junio C Hamanoe814bc42005-11-19 03:48:56 -08001002 !memcmp(value, "none", 4))
1003 matchlen = 0;
Pierre Habouzit182af832007-09-16 00:32:36 +02001004 git_proxy_command = xmemdupz(value, matchlen);
Junio C Hamanoe814bc42005-11-19 03:48:56 -08001005 }
1006 return 0;
Paul Collinsf8014772005-11-04 14:57:16 +00001007 }
1008
Johannes Schindelinef90d6d2008-05-14 18:46:53 +01001009 return git_default_config(var, value, cb);
Paul Collinsf8014772005-11-04 14:57:16 +00001010}
1011
Junio C Hamanoe814bc42005-11-19 03:48:56 -08001012static int git_use_proxy(const char *host)
Paul Collinsf8014772005-11-04 14:57:16 +00001013{
1014 git_proxy_command = getenv("GIT_PROXY_COMMAND");
Erik Faye-Lund15112c92009-03-11 02:38:12 +00001015 git_config(git_proxy_command_options, (void*)host);
Junio C Hamanoe814bc42005-11-19 03:48:56 -08001016 return (git_proxy_command && *git_proxy_command);
Paul Collinsf8014772005-11-04 14:57:16 +00001017}
1018
Jeff King5cbf8242011-05-16 02:46:07 -04001019static struct child_process *git_proxy_connect(int fd[2], char *host)
Paul Collinsf8014772005-11-04 14:57:16 +00001020{
Timo Hirvonen554fe202006-06-28 12:04:39 +03001021 const char *port = STR(DEFAULT_GIT_PORT);
Jeff King5cbf8242011-05-16 02:46:07 -04001022 struct child_process *proxy;
Paul Collinsf8014772005-11-04 14:57:16 +00001023
Michael Lukashov72a534d2010-02-17 20:56:02 +00001024 get_host_and_port(&host, &port);
Paul Collinsf8014772005-11-04 14:57:16 +00001025
Jeff King3be4cf02017-07-28 15:26:50 -04001026 if (looks_like_command_line_option(host))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001027 die(_("strange hostname '%s' blocked"), host);
Jeff King3be4cf02017-07-28 15:26:50 -04001028 if (looks_like_command_line_option(port))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001029 die(_("strange port '%s' blocked"), port);
Jeff King3be4cf02017-07-28 15:26:50 -04001030
René Scharfe483bbd42014-08-19 21:10:48 +02001031 proxy = xmalloc(sizeof(*proxy));
1032 child_process_init(proxy);
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001033 strvec_push(&proxy->args, git_proxy_command);
1034 strvec_push(&proxy->args, host);
1035 strvec_push(&proxy->args, port);
Jeff King5cbf8242011-05-16 02:46:07 -04001036 proxy->in = -1;
1037 proxy->out = -1;
1038 if (start_command(proxy))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001039 die(_("cannot start proxy %s"), git_proxy_command);
Jeff King5cbf8242011-05-16 02:46:07 -04001040 fd[0] = proxy->out; /* read from proxy stdout */
1041 fd[1] = proxy->in; /* write to proxy stdin */
1042 return proxy;
Paul Collinsf8014772005-11-04 14:57:16 +00001043}
1044
Torsten Bögershausen86ceb332015-02-21 16:52:48 +01001045static char *get_port(char *host)
Luben Tuikov2e776662007-09-01 02:36:31 -07001046{
1047 char *end;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +01001048 char *p = strchr(host, ':');
1049
Luben Tuikov2e776662007-09-01 02:36:31 -07001050 if (p) {
René Scharfe8f148252008-12-21 02:12:11 +01001051 long port = strtol(p + 1, &end, 10);
1052 if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) {
Torsten Bögershausen86ceb332015-02-21 16:52:48 +01001053 *p = '\0';
1054 return p+1;
Luben Tuikov2e776662007-09-01 02:36:31 -07001055 }
1056 }
1057
1058 return NULL;
1059}
1060
Linus Torvaldsf7192592005-07-04 11:57:58 -07001061/*
Johannes Sixtcabc3c12013-11-28 20:49:01 +01001062 * Extract protocol and relevant parts from the specified connection URL.
1063 * The caller must free() the returned strings.
Linus Torvaldsf7192592005-07-04 11:57:58 -07001064 */
Johannes Sixtcabc3c12013-11-28 20:49:01 +01001065static enum protocol parse_connect_url(const char *url_orig, char **ret_host,
Torsten Bögershausen83b05872013-11-28 20:49:54 +01001066 char **ret_path)
Linus Torvaldsf7192592005-07-04 11:57:58 -07001067{
Jeff King9d2e9422010-05-23 05:19:44 -04001068 char *url;
Benjamin Kramer8e76bf32009-03-13 13:51:33 +01001069 char *host, *path;
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +09001070 char *end;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +01001071 int separator = '/';
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +01001072 enum protocol protocol = PROTO_LOCAL;
Junio C Hamanof0b73672006-06-19 18:25:21 -07001073
Jeff King9d2e9422010-05-23 05:19:44 -04001074 if (is_url(url_orig))
1075 url = url_decode(url_orig);
1076 else
1077 url = xstrdup(url_orig);
1078
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +01001079 host = strstr(url, "://");
Brian Gianforcaroeeefa7c2009-09-01 01:35:10 -04001080 if (host) {
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +01001081 *host = '\0';
1082 protocol = get_protocol(url);
1083 host += 3;
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +09001084 } else {
Linus Torvaldsf7192592005-07-04 11:57:58 -07001085 host = url;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +01001086 if (!url_is_local_not_ssh(url)) {
1087 protocol = PROTO_SSH;
1088 separator = ':';
1089 }
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +09001090 }
1091
Ilari Liusvaara9aa50532010-01-26 20:24:42 +02001092 /*
Torsten Bögershausen83b05872013-11-28 20:49:54 +01001093 * Don't do destructive transforms as protocol code does
1094 * '[]' unwrapping in get_host_and_port()
Ilari Liusvaara9aa50532010-01-26 20:24:42 +02001095 */
Torsten Bögershausen86ceb332015-02-21 16:52:48 +01001096 end = host_end(&host, 0);
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +09001097
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +01001098 if (protocol == PROTO_LOCAL)
Linus Torvalds72a4f4b2007-08-01 10:03:37 -07001099 path = end;
Torsten Bögershausenebb8d2c2019-08-24 15:07:59 -07001100 else if (protocol == PROTO_FILE && *host != '/' &&
1101 !has_dos_drive_prefix(host) &&
1102 offset_1st_component(host - 2) > 1)
1103 path = host - 2; /* include the leading "//" */
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +01001104 else if (protocol == PROTO_FILE && has_dos_drive_prefix(end))
1105 path = end; /* "file://$(pwd)" may be "file://C:/projects/repo" */
1106 else
1107 path = strchr(end, separator);
Linus Torvalds2386d652005-07-13 18:46:20 -07001108
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +01001109 if (!path || !*path)
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001110 die(_("no path specified; see 'git help pull' for valid url syntax"));
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +01001111
1112 /*
1113 * null-terminate hostname and point path to ~ for URL's like this:
1114 * ssh://host.xz/~user/repo
1115 */
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +01001116
1117 end = path; /* Need to \0 terminate host here */
1118 if (separator == ':')
1119 path++; /* path starts after ':' */
1120 if (protocol == PROTO_GIT || protocol == PROTO_SSH) {
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +01001121 if (path[1] == '~')
1122 path++;
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +01001123 }
1124
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +01001125 path = xstrdup(path);
1126 *end = '\0';
1127
Johannes Sixtcabc3c12013-11-28 20:49:01 +01001128 *ret_host = xstrdup(host);
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +01001129 *ret_path = path;
Johannes Sixtcabc3c12013-11-28 20:49:01 +01001130 free(url);
1131 return protocol;
1132}
1133
Nguyễn Thái Ngọc Duy3c8ede32016-06-26 13:16:35 +02001134static const char *get_ssh_command(void)
1135{
1136 const char *ssh;
1137
1138 if ((ssh = getenv("GIT_SSH_COMMAND")))
1139 return ssh;
1140
Jeff Kingf1de9812020-08-14 12:17:36 -04001141 if (!git_config_get_string_tmp("core.sshcommand", &ssh))
Nguyễn Thái Ngọc Duy3c8ede32016-06-26 13:16:35 +02001142 return ssh;
1143
1144 return NULL;
1145}
1146
Brandon Williams94b8ae52017-10-16 10:55:31 -07001147enum ssh_variant {
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001148 VARIANT_AUTO,
Brandon Williams94b8ae52017-10-16 10:55:31 -07001149 VARIANT_SIMPLE,
1150 VARIANT_SSH,
1151 VARIANT_PLINK,
1152 VARIANT_PUTTY,
1153 VARIANT_TORTOISEPLINK,
1154};
Junio C Hamano486c8e82017-02-09 09:20:25 -08001155
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001156static void override_ssh_variant(enum ssh_variant *ssh_variant)
Brandon Williams94b8ae52017-10-16 10:55:31 -07001157{
1158 const char *variant = getenv("GIT_SSH_VARIANT");
1159
Jeff Kingf1de9812020-08-14 12:17:36 -04001160 if (!variant && git_config_get_string_tmp("ssh.variant", &variant))
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001161 return;
Junio C Hamano486c8e82017-02-09 09:20:25 -08001162
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001163 if (!strcmp(variant, "auto"))
1164 *ssh_variant = VARIANT_AUTO;
1165 else if (!strcmp(variant, "plink"))
Brandon Williams94b8ae52017-10-16 10:55:31 -07001166 *ssh_variant = VARIANT_PLINK;
1167 else if (!strcmp(variant, "putty"))
1168 *ssh_variant = VARIANT_PUTTY;
1169 else if (!strcmp(variant, "tortoiseplink"))
1170 *ssh_variant = VARIANT_TORTOISEPLINK;
1171 else if (!strcmp(variant, "simple"))
1172 *ssh_variant = VARIANT_SIMPLE;
1173 else
1174 *ssh_variant = VARIANT_SSH;
Junio C Hamano486c8e82017-02-09 09:20:25 -08001175}
1176
Brandon Williams94b8ae52017-10-16 10:55:31 -07001177static enum ssh_variant determine_ssh_variant(const char *ssh_command,
1178 int is_cmdline)
Junio C Hamano486c8e82017-02-09 09:20:25 -08001179{
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001180 enum ssh_variant ssh_variant = VARIANT_AUTO;
Junio C Hamano486c8e82017-02-09 09:20:25 -08001181 const char *variant;
Johannes Schindeline2824e42017-02-01 13:01:10 +01001182 char *p = NULL;
1183
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001184 override_ssh_variant(&ssh_variant);
1185
1186 if (ssh_variant != VARIANT_AUTO)
Brandon Williams94b8ae52017-10-16 10:55:31 -07001187 return ssh_variant;
Junio C Hamano486c8e82017-02-09 09:20:25 -08001188
1189 if (!is_cmdline) {
Johannes Schindeline2824e42017-02-01 13:01:10 +01001190 p = xstrdup(ssh_command);
1191 variant = basename(p);
1192 } else {
1193 const char **ssh_argv;
1194
1195 p = xstrdup(ssh_command);
Jeff King22e5ae52017-04-10 20:30:23 -04001196 if (split_cmdline(p, &ssh_argv) > 0) {
Johannes Schindeline2824e42017-02-01 13:01:10 +01001197 variant = basename((char *)ssh_argv[0]);
1198 /*
1199 * At this point, variant points into the buffer
1200 * referenced by p, hence we do not need ssh_argv
1201 * any longer.
1202 */
1203 free(ssh_argv);
Jeff King5d2993b2017-04-20 16:21:58 -04001204 } else {
1205 free(p);
Brandon Williams94b8ae52017-10-16 10:55:31 -07001206 return ssh_variant;
Jeff King5d2993b2017-04-20 16:21:58 -04001207 }
Johannes Schindeline2824e42017-02-01 13:01:10 +01001208 }
1209
Brandon Williams94b8ae52017-10-16 10:55:31 -07001210 if (!strcasecmp(variant, "ssh") ||
1211 !strcasecmp(variant, "ssh.exe"))
1212 ssh_variant = VARIANT_SSH;
1213 else if (!strcasecmp(variant, "plink") ||
1214 !strcasecmp(variant, "plink.exe"))
1215 ssh_variant = VARIANT_PLINK;
Johannes Schindeline2824e42017-02-01 13:01:10 +01001216 else if (!strcasecmp(variant, "tortoiseplink") ||
Brandon Williams94b8ae52017-10-16 10:55:31 -07001217 !strcasecmp(variant, "tortoiseplink.exe"))
1218 ssh_variant = VARIANT_TORTOISEPLINK;
1219
Johannes Schindeline2824e42017-02-01 13:01:10 +01001220 free(p);
Brandon Williams94b8ae52017-10-16 10:55:31 -07001221 return ssh_variant;
Johannes Schindeline2824e42017-02-01 13:01:10 +01001222}
1223
Linus Torvaldsf7192592005-07-04 11:57:58 -07001224/*
Jonathan Nieder2ac67cb2017-11-20 13:23:27 -08001225 * Open a connection using Git's native protocol.
1226 *
1227 * The caller is responsible for freeing hostandport, but this function may
1228 * modify it (for example, to truncate it to remove the port part).
1229 */
1230static struct child_process *git_connect_git(int fd[2], char *hostandport,
1231 const char *path, const char *prog,
Brandon Williams40fc51e2018-03-15 10:31:30 -07001232 enum protocol_version version,
Jonathan Nieder2ac67cb2017-11-20 13:23:27 -08001233 int flags)
1234{
1235 struct child_process *conn;
1236 struct strbuf request = STRBUF_INIT;
1237 /*
1238 * Set up virtual host information based on where we will
1239 * connect, unless the user has overridden us in
1240 * the environment.
1241 */
1242 char *target_host = getenv("GIT_OVERRIDE_VIRTUAL_HOST");
1243 if (target_host)
1244 target_host = xstrdup(target_host);
1245 else
1246 target_host = xstrdup(hostandport);
1247
1248 transport_check_allowed("git");
Jeff Kinga02ea572021-01-07 04:43:58 -05001249 if (strchr(target_host, '\n') || strchr(path, '\n'))
1250 die(_("newline is forbidden in git:// hosts and repo paths"));
Jonathan Nieder2ac67cb2017-11-20 13:23:27 -08001251
Jonathan Nieder233cd282017-11-20 14:04:58 -08001252 /*
1253 * These underlying connection commands die() if they
Jonathan Nieder2ac67cb2017-11-20 13:23:27 -08001254 * cannot connect.
1255 */
1256 if (git_use_proxy(hostandport))
1257 conn = git_proxy_connect(fd, hostandport);
1258 else
1259 conn = git_tcp_connect(fd, hostandport, flags);
1260 /*
1261 * Separate original protocol components prog and path
1262 * from extended host header with a NUL byte.
1263 *
1264 * Note: Do not add any other headers here! Doing so
1265 * will cause older git-daemon servers to crash.
1266 */
1267 strbuf_addf(&request,
1268 "%s %s%chost=%s%c",
1269 prog, path, 0,
1270 target_host, 0);
1271
1272 /* If using a new version put that stuff here after a second null byte */
Brandon Williams40fc51e2018-03-15 10:31:30 -07001273 if (version > 0) {
Jonathan Nieder2ac67cb2017-11-20 13:23:27 -08001274 strbuf_addch(&request, '\0');
1275 strbuf_addf(&request, "version=%d%c",
Brandon Williams40fc51e2018-03-15 10:31:30 -07001276 version, '\0');
Jonathan Nieder2ac67cb2017-11-20 13:23:27 -08001277 }
1278
1279 packet_write(fd[1], request.buf, request.len);
1280
1281 free(target_host);
1282 strbuf_release(&request);
1283 return conn;
1284}
1285
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001286/*
1287 * Append the appropriate environment variables to `env` and options to
1288 * `args` for running ssh in Git's SSH-tunneled transport.
1289 */
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001290static void push_ssh_options(struct strvec *args, struct strvec *env,
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001291 enum ssh_variant variant, const char *port,
Brandon Williams40fc51e2018-03-15 10:31:30 -07001292 enum protocol_version version, int flags)
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001293{
1294 if (variant == VARIANT_SSH &&
Brandon Williams40fc51e2018-03-15 10:31:30 -07001295 version > 0) {
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001296 strvec_push(args, "-o");
1297 strvec_push(args, "SendEnv=" GIT_PROTOCOL_ENVIRONMENT);
1298 strvec_pushf(env, GIT_PROTOCOL_ENVIRONMENT "=version=%d",
Jeff Kingf6d89422020-07-28 16:26:31 -04001299 version);
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001300 }
1301
Jonathan Niedera3f5b662017-11-20 13:30:30 -08001302 if (flags & CONNECT_IPV4) {
1303 switch (variant) {
1304 case VARIANT_AUTO:
1305 BUG("VARIANT_AUTO passed to push_ssh_options");
1306 case VARIANT_SIMPLE:
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001307 die(_("ssh variant 'simple' does not support -4"));
Jonathan Niedera3f5b662017-11-20 13:30:30 -08001308 case VARIANT_SSH:
1309 case VARIANT_PLINK:
1310 case VARIANT_PUTTY:
1311 case VARIANT_TORTOISEPLINK:
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001312 strvec_push(args, "-4");
Jonathan Niedera3f5b662017-11-20 13:30:30 -08001313 }
1314 } else if (flags & CONNECT_IPV6) {
1315 switch (variant) {
1316 case VARIANT_AUTO:
1317 BUG("VARIANT_AUTO passed to push_ssh_options");
1318 case VARIANT_SIMPLE:
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001319 die(_("ssh variant 'simple' does not support -6"));
Jonathan Niedera3f5b662017-11-20 13:30:30 -08001320 case VARIANT_SSH:
1321 case VARIANT_PLINK:
1322 case VARIANT_PUTTY:
1323 case VARIANT_TORTOISEPLINK:
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001324 strvec_push(args, "-6");
Jonathan Niedera3f5b662017-11-20 13:30:30 -08001325 }
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001326 }
1327
1328 if (variant == VARIANT_TORTOISEPLINK)
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001329 strvec_push(args, "-batch");
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001330
Jonathan Nieder3fa5e0d2017-11-20 13:31:01 -08001331 if (port) {
1332 switch (variant) {
1333 case VARIANT_AUTO:
1334 BUG("VARIANT_AUTO passed to push_ssh_options");
1335 case VARIANT_SIMPLE:
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001336 die(_("ssh variant 'simple' does not support setting port"));
Jonathan Nieder3fa5e0d2017-11-20 13:31:01 -08001337 case VARIANT_SSH:
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001338 strvec_push(args, "-p");
Jonathan Nieder3fa5e0d2017-11-20 13:31:01 -08001339 break;
1340 case VARIANT_PLINK:
1341 case VARIANT_PUTTY:
1342 case VARIANT_TORTOISEPLINK:
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001343 strvec_push(args, "-P");
Jonathan Nieder3fa5e0d2017-11-20 13:31:01 -08001344 }
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001345
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001346 strvec_push(args, port);
Jonathan Nieder957e2ad2017-11-20 13:26:19 -08001347 }
1348}
1349
Jonathan Niederfce54ce2017-11-20 14:19:43 -08001350/* Prepare a child_process for use by Git's SSH-tunneled transport. */
1351static void fill_ssh_args(struct child_process *conn, const char *ssh_host,
Brandon Williams40fc51e2018-03-15 10:31:30 -07001352 const char *port, enum protocol_version version,
1353 int flags)
Jonathan Niederfce54ce2017-11-20 14:19:43 -08001354{
1355 const char *ssh;
1356 enum ssh_variant variant;
1357
1358 if (looks_like_command_line_option(ssh_host))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001359 die(_("strange hostname '%s' blocked"), ssh_host);
Jonathan Niederfce54ce2017-11-20 14:19:43 -08001360
1361 ssh = get_ssh_command();
1362 if (ssh) {
1363 variant = determine_ssh_variant(ssh, 1);
1364 } else {
1365 /*
1366 * GIT_SSH is the no-shell version of
1367 * GIT_SSH_COMMAND (and must remain so for
1368 * historical compatibility).
1369 */
1370 conn->use_shell = 0;
1371
1372 ssh = getenv("GIT_SSH");
1373 if (!ssh)
1374 ssh = "ssh";
1375 variant = determine_ssh_variant(ssh, 0);
1376 }
1377
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001378 if (variant == VARIANT_AUTO) {
1379 struct child_process detect = CHILD_PROCESS_INIT;
1380
1381 detect.use_shell = conn->use_shell;
1382 detect.no_stdin = detect.no_stdout = detect.no_stderr = 1;
1383
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001384 strvec_push(&detect.args, ssh);
1385 strvec_push(&detect.args, "-G");
Ævar Arnfjörð Bjarmason29fda242022-06-02 11:09:50 +02001386 push_ssh_options(&detect.args, &detect.env,
Brandon Williams40fc51e2018-03-15 10:31:30 -07001387 VARIANT_SSH, port, version, flags);
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001388 strvec_push(&detect.args, ssh_host);
Jonathan Nieder0da0e492017-11-20 13:30:04 -08001389
1390 variant = run_command(&detect) ? VARIANT_SIMPLE : VARIANT_SSH;
1391 }
1392
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001393 strvec_push(&conn->args, ssh);
Ævar Arnfjörð Bjarmason29fda242022-06-02 11:09:50 +02001394 push_ssh_options(&conn->args, &conn->env, variant, port, version,
1395 flags);
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001396 strvec_push(&conn->args, ssh_host);
Jonathan Niederfce54ce2017-11-20 14:19:43 -08001397}
1398
Jonathan Nieder2ac67cb2017-11-20 13:23:27 -08001399/*
Jonathan Nieder8e349782017-11-20 13:22:54 -08001400 * This returns the dummy child_process `no_fork` if the transport protocol
1401 * does not need fork(2), or a struct child_process object if it does. Once
1402 * done, finish the connection with finish_connect() with the value returned
1403 * from this function (it is safe to call finish_connect() with NULL to
1404 * support the former case).
Linus Torvaldsf7192592005-07-04 11:57:58 -07001405 *
1406 * If it returns, the connect is successful; it just dies on errors (this
1407 * will hopefully be changed in a libification effort, to return NULL when
1408 * the connection failed).
1409 */
Johannes Sixtcabc3c12013-11-28 20:49:01 +01001410struct child_process *git_connect(int fd[2], const char *url,
Jeff Kingeaa0fd62023-03-17 15:08:51 -04001411 const char *name,
Linus Torvaldsf7192592005-07-04 11:57:58 -07001412 const char *prog, int flags)
1413{
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001414 char *hostandport, *path;
Jonathan Nieder8e349782017-11-20 13:22:54 -08001415 struct child_process *conn;
Johannes Sixtcabc3c12013-11-28 20:49:01 +01001416 enum protocol protocol;
Brandon Williams40fc51e2018-03-15 10:31:30 -07001417 enum protocol_version version = get_protocol_version_config();
Linus Torvaldsf7192592005-07-04 11:57:58 -07001418
Brandon Williams1aa8dded2018-03-15 10:31:31 -07001419 /*
1420 * NEEDSWORK: If we are trying to use protocol v2 and we are planning
Jeff Kingeaa0fd62023-03-17 15:08:51 -04001421 * to perform any operation that doesn't involve upload-pack (i.e., a
1422 * fetch, ls-remote, etc), then fallback to v0 since we don't know how
1423 * to do anything else (like push or remote archive) via v2.
Brandon Williams1aa8dded2018-03-15 10:31:31 -07001424 */
Jeff Kingeaa0fd62023-03-17 15:08:51 -04001425 if (version == protocol_v2 && strcmp("git-upload-pack", name))
Brandon Williams1aa8dded2018-03-15 10:31:31 -07001426 version = protocol_v0;
1427
Linus Torvaldsf7192592005-07-04 11:57:58 -07001428 /* Without this we cannot rely on waitpid() to tell
1429 * what happened to our children.
1430 */
1431 signal(SIGCHLD, SIG_DFL);
1432
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001433 protocol = parse_connect_url(url, &hostandport, &path);
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +01001434 if ((flags & CONNECT_DIAG_URL) && (protocol != PROTO_SSH)) {
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +01001435 printf("Diag: url=%s\n", url ? url : "NULL");
1436 printf("Diag: protocol=%s\n", prot_name(protocol));
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001437 printf("Diag: hostandport=%s\n", hostandport ? hostandport : "NULL");
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +01001438 printf("Diag: path=%s\n", path ? path : "NULL");
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001439 conn = NULL;
1440 } else if (protocol == PROTO_GIT) {
Brandon Williams40fc51e2018-03-15 10:31:30 -07001441 conn = git_connect_git(fd, hostandport, path, prog, version, flags);
Jeff Hostetlerabd81a32019-02-22 14:25:05 -08001442 conn->trace2_child_class = "transport/git";
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001443 } else {
Rene Scharfef1399292017-08-30 19:49:39 +02001444 struct strbuf cmd = STRBUF_INIT;
Brandon Williams0c2f0d22017-10-16 10:55:28 -07001445 const char *const *var;
Rene Scharfef1399292017-08-30 19:49:39 +02001446
René Scharfe483bbd42014-08-19 21:10:48 +02001447 conn = xmalloc(sizeof(*conn));
1448 child_process_init(conn);
Linus Torvaldsf7192592005-07-04 11:57:58 -07001449
Jeff Kingaeeb2d42017-07-28 15:28:55 -04001450 if (looks_like_command_line_option(path))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001451 die(_("strange pathname '%s' blocked"), path);
Jeff Kingaeeb2d42017-07-28 15:28:55 -04001452
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001453 strbuf_addstr(&cmd, prog);
1454 strbuf_addch(&cmd, ' ');
1455 sq_quote_buf(&cmd, path);
Christian Couder0f503d72006-09-11 07:04:50 +02001456
Jeff Kingaab40432015-09-04 18:40:08 -04001457 /* remove repo-local variables from the environment */
Brandon Williams0c2f0d22017-10-16 10:55:28 -07001458 for (var = local_repo_env; *var; var++)
Ævar Arnfjörð Bjarmason29fda242022-06-02 11:09:50 +02001459 strvec_push(&conn->env, *var);
Brandon Williams0c2f0d22017-10-16 10:55:28 -07001460
Jeff Kinga48b4092015-09-08 04:33:14 -04001461 conn->use_shell = 1;
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001462 conn->in = conn->out = -1;
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001463 if (protocol == PROTO_SSH) {
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001464 char *ssh_host = hostandport;
1465 const char *port = NULL;
Jeff Kinga5adace2015-09-16 13:12:52 -04001466 transport_check_allowed("ssh");
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001467 get_host_and_port(&ssh_host, &port);
Christian Couder0f503d72006-09-11 07:04:50 +02001468
Torsten Bögershausen86ceb332015-02-21 16:52:48 +01001469 if (!port)
1470 port = get_port(ssh_host);
Junio C Hamano42da4842015-03-05 12:45:44 -08001471
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +01001472 if (flags & CONNECT_DIAG_URL) {
1473 printf("Diag: url=%s\n", url ? url : "NULL");
1474 printf("Diag: protocol=%s\n", prot_name(protocol));
1475 printf("Diag: userandhost=%s\n", ssh_host ? ssh_host : "NULL");
1476 printf("Diag: port=%s\n", port ? port : "NONE");
1477 printf("Diag: path=%s\n", path ? path : "NULL");
Linus Torvaldsf7192592005-07-04 11:57:58 -07001478
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +01001479 free(hostandport);
1480 free(path);
Stefan Beller04f20c02015-03-09 09:58:22 -07001481 free(conn);
Rene Scharfef1399292017-08-30 19:49:39 +02001482 strbuf_release(&cmd);
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +01001483 return NULL;
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001484 }
Jeff Hostetlerabd81a32019-02-22 14:25:05 -08001485 conn->trace2_child_class = "transport/ssh";
Brandon Williams40fc51e2018-03-15 10:31:30 -07001486 fill_ssh_args(conn, ssh_host, port, version, flags);
Nguyễn Thái Ngọc Duyc049b612014-03-13 18:45:31 +07001487 } else {
Jeff Kinga5adace2015-09-16 13:12:52 -04001488 transport_check_allowed("file");
Jeff Hostetlerabd81a32019-02-22 14:25:05 -08001489 conn->trace2_child_class = "transport/file";
Brandon Williams40fc51e2018-03-15 10:31:30 -07001490 if (version > 0) {
Ævar Arnfjörð Bjarmason29fda242022-06-02 11:09:50 +02001491 strvec_pushf(&conn->env,
Jeff Kingf6d89422020-07-28 16:26:31 -04001492 GIT_PROTOCOL_ENVIRONMENT "=version=%d",
1493 version);
Brandon Williams0c2f0d22017-10-16 10:55:28 -07001494 }
Linus Torvaldsf7192592005-07-04 11:57:58 -07001495 }
Jeff Kingef8d7ac2020-07-28 16:24:53 -04001496 strvec_push(&conn->args, cmd.buf);
Johannes Sixtf364cb82007-10-19 21:47:54 +02001497
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001498 if (start_command(conn))
Nguyễn Thái Ngọc Duyaad6fdd2018-07-21 09:49:28 +02001499 die(_("unable to fork"));
Johannes Sixtf364cb82007-10-19 21:47:54 +02001500
Torsten Bögershausena2036d72013-11-28 20:50:15 +01001501 fd[0] = conn->out; /* read from child's stdout */
1502 fd[1] = conn->in; /* write to child's stdin */
1503 strbuf_release(&cmd);
1504 }
1505 free(hostandport);
Johannes Sixtcabc3c12013-11-28 20:49:01 +01001506 free(path);
Johannes Sixt98158e92007-10-19 21:47:53 +02001507 return conn;
Linus Torvaldsf7192592005-07-04 11:57:58 -07001508}
1509
Johannes Sixt98158e92007-10-19 21:47:53 +02001510int finish_connect(struct child_process *conn)
Linus Torvaldsf7192592005-07-04 11:57:58 -07001511{
Johannes Sixtf364cb82007-10-19 21:47:54 +02001512 int code;
Jeff King7ffe8532011-05-16 02:52:11 -04001513 if (!conn || git_connection_is_socket(conn))
Franck Bui-Huuf42a5c42006-09-12 11:00:13 +02001514 return 0;
1515
Johannes Sixtf364cb82007-10-19 21:47:54 +02001516 code = finish_command(conn);
Johannes Sixt98158e92007-10-19 21:47:53 +02001517 free(conn);
Johannes Sixtf364cb82007-10-19 21:47:54 +02001518 return code;
Linus Torvaldsf7192592005-07-04 11:57:58 -07001519}