blob: c72b1d1151744c5e7c7b82f453892a1bc9b26021 [file] [log] [blame]
Jason Riedy731043f2006-01-25 12:38:36 -08001#include "git-compat-util.h"
Linus Torvaldsf7192592005-07-04 11:57:58 -07002#include "cache.h"
Linus Torvalds41cb7482005-07-05 15:44:09 -07003#include "pkt-line.h"
Junio C Hamanob10d0ec2005-07-08 00:02:52 -07004#include "quote.h"
Junio C Hamano6abf5c02005-10-16 00:25:26 -07005#include "refs.h"
Shawn O. Pearce15a1c0122007-03-12 19:00:19 -04006#include "run-command.h"
Daniel Barkalow6b628162007-05-12 11:45:59 -04007#include "remote.h"
Junio C Hamano47a59182013-07-08 13:56:53 -07008#include "connect.h"
Jeff King9d2e9422010-05-23 05:19:44 -04009#include "url.h"
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070010#include "string-list.h"
Nguyễn Thái Ngọc Duy13eb4622013-12-05 20:02:29 +070011#include "sha1-array.h"
Jeff Kinga5adace2015-09-16 13:12:52 -040012#include "transport.h"
Linus Torvaldsf7192592005-07-04 11:57:58 -070013
David Rientjes96f1e582006-08-15 10:23:48 -070014static char *server_capabilities;
Junio C Hamano5d54cff2013-09-17 16:29:28 -070015static const char *parse_feature_value(const char *, const char *, int *);
Johannes Schindelin211b5f92005-10-28 04:48:54 +020016
René Scharfebe0b3f82014-08-30 11:46:54 +020017static int check_ref(const char *name, unsigned int flags)
Linus Torvalds2718ff02006-07-04 12:29:10 -070018{
19 if (!flags)
20 return 1;
21
René Scharfebe0b3f82014-08-30 11:46:54 +020022 if (!skip_prefix(name, "refs/", &name))
Linus Torvalds2718ff02006-07-04 12:29:10 -070023 return 0;
24
Linus Torvalds2718ff02006-07-04 12:29:10 -070025 /* REF_NORMAL means that we don't want the magic fake tag refs */
Michael Haggerty8d9c5012011-09-15 23:10:25 +020026 if ((flags & REF_NORMAL) && check_refname_format(name, 0))
Linus Torvalds2718ff02006-07-04 12:29:10 -070027 return 0;
28
29 /* REF_HEADS means that we want regular branch heads */
René Scharfebe0b3f82014-08-30 11:46:54 +020030 if ((flags & REF_HEADS) && starts_with(name, "heads/"))
Linus Torvalds2718ff02006-07-04 12:29:10 -070031 return 1;
32
33 /* REF_TAGS means that we want tags */
René Scharfebe0b3f82014-08-30 11:46:54 +020034 if ((flags & REF_TAGS) && starts_with(name, "tags/"))
Linus Torvalds2718ff02006-07-04 12:29:10 -070035 return 1;
36
37 /* All type bits clear means that we are ok with anything */
38 return !(flags & ~REF_NORMAL);
39}
40
Daniel Barkalow45773702007-10-29 21:05:40 -040041int check_ref_type(const struct ref *ref, int flags)
42{
René Scharfebe0b3f82014-08-30 11:46:54 +020043 return check_ref(ref->name, flags);
Daniel Barkalow45773702007-10-29 21:05:40 -040044}
45
Jonathan Nieder55e4f932016-09-09 10:36:29 -070046static void die_initial_contact(int unexpected)
Heiko Voigt46284dd2012-06-19 20:24:50 +020047{
Jonathan Nieder55e4f932016-09-09 10:36:29 -070048 if (unexpected)
Vasco Almeidaf2b93b32016-09-19 13:08:17 +000049 die(_("The remote end hung up upon initial contact"));
Heiko Voigt46284dd2012-06-19 20:24:50 +020050 else
Vasco Almeidaf2b93b32016-09-19 13:08:17 +000051 die(_("Could not read from remote repository.\n\n"
52 "Please make sure you have the correct access rights\n"
53 "and the repository exists."));
Heiko Voigt46284dd2012-06-19 20:24:50 +020054}
55
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070056static void parse_one_symref_info(struct string_list *symref, const char *val, int len)
57{
58 char *sym, *target;
59 struct string_list_item *item;
60
61 if (!len)
62 return; /* just "symref" */
63 /* e.g. "symref=HEAD:refs/heads/master" */
René Scharfe5c0b13f2014-07-19 17:35:34 +020064 sym = xmemdupz(val, len);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070065 target = strchr(sym, ':');
66 if (!target)
67 /* just "symref=something" */
68 goto reject;
69 *(target++) = '\0';
70 if (check_refname_format(sym, REFNAME_ALLOW_ONELEVEL) ||
71 check_refname_format(target, REFNAME_ALLOW_ONELEVEL))
72 /* "symref=bogus:pair */
73 goto reject;
Jeff Kingef4fe562017-05-25 15:33:05 -040074 item = string_list_append_nodup(symref, sym);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070075 item->util = target;
76 return;
77reject:
78 free(sym);
79 return;
80}
81
82static void annotate_refs_with_symref_info(struct ref *ref)
83{
84 struct string_list symref = STRING_LIST_INIT_DUP;
85 const char *feature_list = server_capabilities;
86
87 while (feature_list) {
88 int len;
89 const char *val;
90
91 val = parse_feature_value(feature_list, "symref", &len);
92 if (!val)
93 break;
94 parse_one_symref_info(&symref, val, len);
95 feature_list = val + 1;
96 }
Michael Haggerty3383e192014-11-25 09:02:35 +010097 string_list_sort(&symref);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070098
99 for (; ref; ref = ref->next) {
100 struct string_list_item *item;
101 item = string_list_lookup(&symref, ref->name);
102 if (!item)
103 continue;
104 ref->symref = xstrdup((char *)item->util);
105 }
106 string_list_clear(&symref, 0);
107}
108
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700109/*
110 * Read all the refs from the other end
111 */
Jeff King85edf4f2013-02-20 15:06:45 -0500112struct ref **get_remote_heads(int in, char *src_buf, size_t src_len,
113 struct ref **list, unsigned int flags,
brian m. carlson910650d2017-03-31 01:40:00 +0000114 struct oid_array *extra_have,
115 struct oid_array *shallow_points)
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700116{
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700117 struct ref **orig_list = list;
Jonathan Nieder55e4f932016-09-09 10:36:29 -0700118
119 /*
120 * A hang-up after seeing some response from the other end
121 * means that it is unexpected, as we know the other end is
122 * willing to talk to us. A hang-up before seeing any
123 * response does not necessarily mean an ACL problem, though.
124 */
125 int saw_response;
Jonathan Taneb398792016-09-09 10:36:30 -0700126 int got_dummy_ref_with_capabilities_declaration = 0;
Heiko Voigt46284dd2012-06-19 20:24:50 +0200127
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700128 *list = NULL;
Jonathan Nieder55e4f932016-09-09 10:36:29 -0700129 for (saw_response = 0; ; saw_response = 1) {
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700130 struct ref *ref;
brian m. carlsone96b16c2015-11-10 02:22:23 +0000131 struct object_id old_oid;
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700132 char *name;
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200133 int len, name_len;
Jeff King74543a02013-02-20 15:02:57 -0500134 char *buffer = packet_buffer;
Jeff Kingae021d82014-06-18 15:47:50 -0400135 const char *arg;
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700136
Jeff King85edf4f2013-02-20 15:06:45 -0500137 len = packet_read(in, &src_buf, &src_len,
Jeff King4981fe72013-02-23 17:31:34 -0500138 packet_buffer, sizeof(packet_buffer),
Jeff King819b9292013-02-20 15:02:28 -0500139 PACKET_READ_GENTLE_ON_EOF |
140 PACKET_READ_CHOMP_NEWLINE);
Heiko Voigt46284dd2012-06-19 20:24:50 +0200141 if (len < 0)
Jonathan Nieder55e4f932016-09-09 10:36:29 -0700142 die_initial_contact(saw_response);
Heiko Voigt46284dd2012-06-19 20:24:50 +0200143
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700144 if (!len)
145 break;
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700146
Jeff Kingae021d82014-06-18 15:47:50 -0400147 if (len > 4 && skip_prefix(buffer, "ERR ", &arg))
148 die("remote error: %s", arg);
Tom Preston-Wernera8073282008-11-01 11:44:45 -0700149
brian m. carlsone96b16c2015-11-10 02:22:23 +0000150 if (len == GIT_SHA1_HEXSZ + strlen("shallow ") &&
151 skip_prefix(buffer, "shallow ", &arg)) {
152 if (get_oid_hex(arg, &old_oid))
Jeff Kingae021d82014-06-18 15:47:50 -0400153 die("protocol error: expected shallow sha-1, got '%s'", arg);
Nguyễn Thái Ngọc Duyb06dcd72013-12-05 20:02:33 +0700154 if (!shallow_points)
155 die("repository on the other end cannot be shallow");
brian m. carlson910650d2017-03-31 01:40:00 +0000156 oid_array_append(shallow_points, &old_oid);
Nguyễn Thái Ngọc Duyb06dcd72013-12-05 20:02:33 +0700157 continue;
158 }
159
brian m. carlsone96b16c2015-11-10 02:22:23 +0000160 if (len < GIT_SHA1_HEXSZ + 2 || get_oid_hex(buffer, &old_oid) ||
161 buffer[GIT_SHA1_HEXSZ] != ' ')
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700162 die("protocol error: expected sha/ref, got '%s'", buffer);
brian m. carlsone96b16c2015-11-10 02:22:23 +0000163 name = buffer + GIT_SHA1_HEXSZ + 1;
Junio C Hamano1a7141f2005-10-13 18:57:40 -0700164
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200165 name_len = strlen(name);
brian m. carlsone96b16c2015-11-10 02:22:23 +0000166 if (len != name_len + GIT_SHA1_HEXSZ + 1) {
Jim Meyering8e0f7002008-01-31 18:26:32 +0100167 free(server_capabilities);
Shawn Pearce9befac42006-09-02 00:16:31 -0400168 server_capabilities = xstrdup(name + name_len + 1);
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200169 }
170
René Scharfe2ae7f902015-02-21 20:49:58 +0100171 if (extra_have && !strcmp(name, ".have")) {
brian m. carlson910650d2017-03-31 01:40:00 +0000172 oid_array_append(extra_have, &old_oid);
Junio C Hamano40c155f2008-09-09 01:27:09 -0700173 continue;
174 }
175
Jonathan Taneb398792016-09-09 10:36:30 -0700176 if (!strcmp(name, "capabilities^{}")) {
177 if (saw_response)
178 die("protocol error: unexpected capabilities^{}");
179 if (got_dummy_ref_with_capabilities_declaration)
180 die("protocol error: multiple capabilities^{}");
181 got_dummy_ref_with_capabilities_declaration = 1;
182 continue;
183 }
184
René Scharfebe0b3f82014-08-30 11:46:54 +0200185 if (!check_ref(name, flags))
Junio C Hamanocfee10a2005-12-25 23:18:37 -0800186 continue;
Jonathan Taneb398792016-09-09 10:36:30 -0700187
188 if (got_dummy_ref_with_capabilities_declaration)
189 die("protocol error: unexpected ref after capabilities^{}");
190
brian m. carlsone96b16c2015-11-10 02:22:23 +0000191 ref = alloc_ref(buffer + GIT_SHA1_HEXSZ + 1);
192 oidcpy(&ref->old_oid, &old_oid);
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700193 *list = ref;
194 list = &ref->next;
195 }
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700196
197 annotate_refs_with_symref_info(*orig_list);
198
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700199 return list;
200}
201
Junio C Hamano5d54cff2013-09-17 16:29:28 -0700202static const char *parse_feature_value(const char *feature_list, const char *feature, int *lenp)
Junio C Hamanof47182c2012-01-08 22:06:19 +0100203{
204 int len;
205
206 if (!feature_list)
207 return NULL;
208
209 len = strlen(feature);
210 while (*feature_list) {
211 const char *found = strstr(feature_list, feature);
212 if (!found)
213 return NULL;
Jeff King94427102012-08-13 21:59:27 -0400214 if (feature_list == found || isspace(found[-1])) {
215 const char *value = found + len;
216 /* feature with no value (e.g., "thin-pack") */
217 if (!*value || isspace(*value)) {
218 if (lenp)
219 *lenp = 0;
220 return value;
221 }
222 /* feature with a value (e.g., "agent=git/1.2.3") */
223 else if (*value == '=') {
224 value++;
225 if (lenp)
226 *lenp = strcspn(value, " \t\n");
227 return value;
228 }
229 /*
230 * otherwise we matched a substring of another feature;
231 * keep looking
232 */
233 }
Junio C Hamanof47182c2012-01-08 22:06:19 +0100234 feature_list = found + 1;
235 }
236 return NULL;
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200237}
238
Jeff King94427102012-08-13 21:59:27 -0400239int parse_feature_request(const char *feature_list, const char *feature)
240{
241 return !!parse_feature_value(feature_list, feature, NULL);
242}
243
244const char *server_feature_value(const char *feature, int *len)
245{
246 return parse_feature_value(server_capabilities, feature, len);
247}
248
249int server_supports(const char *feature)
250{
251 return !!server_feature_value(feature, NULL);
252}
253
Linus Torvalds2386d652005-07-13 18:46:20 -0700254enum protocol {
255 PROTO_LOCAL = 1,
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100256 PROTO_FILE,
Linus Torvalds2386d652005-07-13 18:46:20 -0700257 PROTO_SSH,
Gary V. Vaughan4b055482010-05-14 09:31:35 +0000258 PROTO_GIT
Linus Torvalds2386d652005-07-13 18:46:20 -0700259};
260
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100261int url_is_local_not_ssh(const char *url)
262{
263 const char *colon = strchr(url, ':');
264 const char *slash = strchr(url, '/');
265 return !colon || (slash && slash < colon) ||
266 has_dos_drive_prefix(url);
267}
268
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100269static const char *prot_name(enum protocol protocol)
270{
271 switch (protocol) {
272 case PROTO_LOCAL:
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100273 case PROTO_FILE:
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100274 return "file";
275 case PROTO_SSH:
276 return "ssh";
277 case PROTO_GIT:
278 return "git";
279 default:
Tobias Klauser83e6bda2015-09-24 14:44:49 +0200280 return "unknown protocol";
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100281 }
282}
283
Linus Torvalds2386d652005-07-13 18:46:20 -0700284static enum protocol get_protocol(const char *name)
285{
286 if (!strcmp(name, "ssh"))
287 return PROTO_SSH;
288 if (!strcmp(name, "git"))
289 return PROTO_GIT;
Carlos Martín Nieto07c77822016-02-15 15:29:06 +0100290 if (!strcmp(name, "git+ssh")) /* deprecated - do not use */
Linus Torvaldsc05186c2005-10-14 17:14:56 -0700291 return PROTO_SSH;
Carlos Martín Nieto07c77822016-02-15 15:29:06 +0100292 if (!strcmp(name, "ssh+git")) /* deprecated - do not use */
Linus Torvaldsc05186c2005-10-14 17:14:56 -0700293 return PROTO_SSH;
Linus Torvalds72a4f4b2007-08-01 10:03:37 -0700294 if (!strcmp(name, "file"))
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100295 return PROTO_FILE;
Linus Torvalds2386d652005-07-13 18:46:20 -0700296 die("I don't handle protocol '%s'", name);
297}
298
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100299static char *host_end(char **hoststart, int removebrackets)
300{
301 char *host = *hoststart;
302 char *end;
303 char *start = strstr(host, "@[");
304 if (start)
305 start++; /* Jump over '@' */
306 else
307 start = host;
308 if (start[0] == '[') {
309 end = strchr(start + 1, ']');
310 if (end) {
311 if (removebrackets) {
312 *end = 0;
313 memmove(start, start + 1, end - start);
314 end++;
315 }
316 } else
317 end = host;
318 } else
319 end = host;
320 return end;
321}
322
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400323#define STR_(s) # s
324#define STR(s) STR_(s)
Linus Torvalds2386d652005-07-13 18:46:20 -0700325
Michael Lukashov72a534d2010-02-17 20:56:02 +0000326static void get_host_and_port(char **host, const char **port)
327{
328 char *colon, *end;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100329 end = host_end(host, 1);
Michael Lukashov72a534d2010-02-17 20:56:02 +0000330 colon = strchr(end, ':');
Michael Lukashov72a534d2010-02-17 20:56:02 +0000331 if (colon) {
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100332 long portnr = strtol(colon + 1, &end, 10);
333 if (end != colon + 1 && *end == '\0' && 0 <= portnr && portnr < 65536) {
334 *colon = 0;
335 *port = colon + 1;
Torsten Bögershausen6b6c5f72015-04-07 22:03:25 +0200336 } else if (!colon[1]) {
337 *colon = 0;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100338 }
Michael Lukashov72a534d2010-02-17 20:56:02 +0000339 }
340}
341
Eric Wonge47a8582011-12-06 04:39:36 +0000342static void enable_keepalive(int sockfd)
343{
344 int ka = 1;
345
346 if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, &ka, sizeof(ka)) < 0)
347 fprintf(stderr, "unable to set SO_KEEPALIVE on socket: %s\n",
348 strerror(errno));
349}
350
hpa49744d62005-09-28 16:52:21 -0700351#ifndef NO_IPV6
hpa4c505f72005-09-28 16:37:58 -0700352
Alex Riesenba505322007-05-23 23:34:27 +0200353static const char *ai_name(const struct addrinfo *ai)
354{
Benjamin Kramer785a9852009-04-24 14:16:41 +0200355 static char addr[NI_MAXHOST];
356 if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0,
357 NI_NUMERICHOST) != 0)
Jeff King5096d492015-09-24 17:06:08 -0400358 xsnprintf(addr, sizeof(addr), "(unknown)");
Benjamin Kramer785a9852009-04-24 14:16:41 +0200359
Alex Riesenba505322007-05-23 23:34:27 +0200360 return addr;
361}
362
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500363/*
364 * Returns a connected socket() fd, or else die()s.
365 */
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300366static int git_tcp_connect_sock(char *host, int flags)
Linus Torvalds2386d652005-07-13 18:46:20 -0700367{
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700368 struct strbuf error_message = STRBUF_INIT;
369 int sockfd = -1;
Timo Hirvonen554fe202006-06-28 12:04:39 +0300370 const char *port = STR(DEFAULT_GIT_PORT);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400371 struct addrinfo hints, *ai0, *ai;
372 int gai;
Alex Riesenba505322007-05-23 23:34:27 +0200373 int cnt = 0;
Linus Torvalds2386d652005-07-13 18:46:20 -0700374
Michael Lukashov72a534d2010-02-17 20:56:02 +0000375 get_host_and_port(&host, &port);
376 if (!*port)
377 port = "<none>";
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400378
379 memset(&hints, 0, sizeof(hints));
Eric Wongc915f112016-02-03 04:09:14 +0000380 if (flags & CONNECT_IPV4)
381 hints.ai_family = AF_INET;
382 else if (flags & CONNECT_IPV6)
383 hints.ai_family = AF_INET6;
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400384 hints.ai_socktype = SOCK_STREAM;
385 hints.ai_protocol = IPPROTO_TCP;
386
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300387 if (flags & CONNECT_VERBOSE)
388 fprintf(stderr, "Looking up %s ... ", host);
389
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400390 gai = getaddrinfo(host, port, &hints, &ai);
391 if (gai)
Linus Torvalds608d48b2007-03-27 09:50:20 -0700392 die("Unable to look up %s (port %s) (%s)", host, port, gai_strerror(gai));
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400393
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300394 if (flags & CONNECT_VERBOSE)
395 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
396
Erik Faye-Lunde08afec2011-08-01 13:16:09 +0200397 for (ai0 = ai; ai; ai = ai->ai_next, cnt++) {
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500398 sockfd = socket(ai->ai_family,
399 ai->ai_socktype, ai->ai_protocol);
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700400 if ((sockfd < 0) ||
401 (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0)) {
402 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
403 host, cnt, ai_name(ai), strerror(errno));
404 if (0 <= sockfd)
405 close(sockfd);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400406 sockfd = -1;
407 continue;
Linus Torvalds2386d652005-07-13 18:46:20 -0700408 }
Alex Riesenba505322007-05-23 23:34:27 +0200409 if (flags & CONNECT_VERBOSE)
410 fprintf(stderr, "%s ", ai_name(ai));
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400411 break;
Linus Torvalds2386d652005-07-13 18:46:20 -0700412 }
413
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400414 freeaddrinfo(ai0);
Linus Torvalds2386d652005-07-13 18:46:20 -0700415
Linus Torvalds2386d652005-07-13 18:46:20 -0700416 if (sockfd < 0)
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700417 die("unable to connect to %s:\n%s", host, error_message.buf);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400418
Eric Wonge47a8582011-12-06 04:39:36 +0000419 enable_keepalive(sockfd);
420
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300421 if (flags & CONNECT_VERBOSE)
422 fprintf(stderr, "done.\n");
423
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700424 strbuf_release(&error_message);
425
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500426 return sockfd;
Linus Torvalds2386d652005-07-13 18:46:20 -0700427}
428
hpa49744d62005-09-28 16:52:21 -0700429#else /* NO_IPV6 */
hpa4c505f72005-09-28 16:37:58 -0700430
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500431/*
432 * Returns a connected socket() fd, or else die()s.
433 */
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300434static int git_tcp_connect_sock(char *host, int flags)
hpa4c505f72005-09-28 16:37:58 -0700435{
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200436 struct strbuf error_message = STRBUF_INIT;
437 int sockfd = -1;
Michael Lukashov72a534d2010-02-17 20:56:02 +0000438 const char *port = STR(DEFAULT_GIT_PORT);
439 char *ep;
hpa4c505f72005-09-28 16:37:58 -0700440 struct hostent *he;
441 struct sockaddr_in sa;
442 char **ap;
443 unsigned int nport;
Alex Riesenba505322007-05-23 23:34:27 +0200444 int cnt;
hpa4c505f72005-09-28 16:37:58 -0700445
Michael Lukashov72a534d2010-02-17 20:56:02 +0000446 get_host_and_port(&host, &port);
hpa4c505f72005-09-28 16:37:58 -0700447
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300448 if (flags & CONNECT_VERBOSE)
449 fprintf(stderr, "Looking up %s ... ", host);
450
hpa4c505f72005-09-28 16:37:58 -0700451 he = gethostbyname(host);
452 if (!he)
453 die("Unable to look up %s (%s)", host, hstrerror(h_errno));
454 nport = strtoul(port, &ep, 10);
455 if ( ep == port || *ep ) {
456 /* Not numeric */
457 struct servent *se = getservbyname(port,"tcp");
458 if ( !se )
Alexander Potashevd7530702009-01-04 21:38:41 +0300459 die("Unknown port %s", port);
hpa4c505f72005-09-28 16:37:58 -0700460 nport = se->s_port;
461 }
462
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300463 if (flags & CONNECT_VERBOSE)
464 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
465
Alex Riesenba505322007-05-23 23:34:27 +0200466 for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) {
hpa4c505f72005-09-28 16:37:58 -0700467 memset(&sa, 0, sizeof sa);
468 sa.sin_family = he->h_addrtype;
Peter Anvin6573faf2005-09-28 17:26:44 -0700469 sa.sin_port = htons(nport);
Paul Sericec6164212005-11-22 07:54:23 -0600470 memcpy(&sa.sin_addr, *ap, he->h_length);
hpa4c505f72005-09-28 16:37:58 -0700471
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200472 sockfd = socket(he->h_addrtype, SOCK_STREAM, 0);
473 if ((sockfd < 0) ||
474 connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) {
475 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
Alex Riesenba505322007-05-23 23:34:27 +0200476 host,
477 cnt,
478 inet_ntoa(*(struct in_addr *)&sa.sin_addr),
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200479 strerror(errno));
480 if (0 <= sockfd)
481 close(sockfd);
hpa4c505f72005-09-28 16:37:58 -0700482 sockfd = -1;
483 continue;
484 }
Alex Riesenba505322007-05-23 23:34:27 +0200485 if (flags & CONNECT_VERBOSE)
486 fprintf(stderr, "%s ",
487 inet_ntoa(*(struct in_addr *)&sa.sin_addr));
hpa4c505f72005-09-28 16:37:58 -0700488 break;
489 }
490
491 if (sockfd < 0)
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200492 die("unable to connect to %s:\n%s", host, error_message.buf);
hpa4c505f72005-09-28 16:37:58 -0700493
Eric Wonge47a8582011-12-06 04:39:36 +0000494 enable_keepalive(sockfd);
495
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300496 if (flags & CONNECT_VERBOSE)
497 fprintf(stderr, "done.\n");
498
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500499 return sockfd;
hpa4c505f72005-09-28 16:37:58 -0700500}
501
hpa49744d62005-09-28 16:52:21 -0700502#endif /* NO_IPV6 */
hpa4c505f72005-09-28 16:37:58 -0700503
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500504
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300505static void git_tcp_connect(int fd[2], char *host, int flags)
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500506{
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300507 int sockfd = git_tcp_connect_sock(host, flags);
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500508
509 fd[0] = sockfd;
Junio C Hamanoec587fd2007-01-21 17:10:51 -0800510 fd[1] = dup(sockfd);
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500511}
512
513
David Rientjes96f1e582006-08-15 10:23:48 -0700514static char *git_proxy_command;
Paul Collinsf8014772005-11-04 14:57:16 +0000515
Johannes Schindelinef90d6d2008-05-14 18:46:53 +0100516static int git_proxy_command_options(const char *var, const char *value,
517 void *cb)
Paul Collinsf8014772005-11-04 14:57:16 +0000518{
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800519 if (!strcmp(var, "core.gitproxy")) {
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900520 const char *for_pos;
521 int matchlen = -1;
522 int hostlen;
Erik Faye-Lund15112c92009-03-11 02:38:12 +0000523 const char *rhost_name = cb;
524 int rhost_len = strlen(rhost_name);
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900525
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800526 if (git_proxy_command)
Paul Collinsf8014772005-11-04 14:57:16 +0000527 return 0;
Junio C Hamanoc64b9ad2008-02-11 10:52:15 -0800528 if (!value)
529 return config_error_nonbool(var);
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800530 /* [core]
531 * ;# matches www.kernel.org as well
532 * gitproxy = netcatter-1 for kernel.org
533 * gitproxy = netcatter-2 for sample.xz
534 * gitproxy = netcatter-default
535 */
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900536 for_pos = strstr(value, " for ");
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800537 if (!for_pos)
538 /* matches everybody */
539 matchlen = strlen(value);
540 else {
541 hostlen = strlen(for_pos + 5);
542 if (rhost_len < hostlen)
543 matchlen = -1;
544 else if (!strncmp(for_pos + 5,
545 rhost_name + rhost_len - hostlen,
546 hostlen) &&
547 ((rhost_len == hostlen) ||
548 rhost_name[rhost_len - hostlen -1] == '.'))
549 matchlen = for_pos - value;
550 else
551 matchlen = -1;
Paul Collinsf8014772005-11-04 14:57:16 +0000552 }
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800553 if (0 <= matchlen) {
554 /* core.gitproxy = none for kernel.org */
Junio C Hamanoa6080a02007-06-07 00:04:01 -0700555 if (matchlen == 4 &&
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800556 !memcmp(value, "none", 4))
557 matchlen = 0;
Pierre Habouzit182af832007-09-16 00:32:36 +0200558 git_proxy_command = xmemdupz(value, matchlen);
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800559 }
560 return 0;
Paul Collinsf8014772005-11-04 14:57:16 +0000561 }
562
Johannes Schindelinef90d6d2008-05-14 18:46:53 +0100563 return git_default_config(var, value, cb);
Paul Collinsf8014772005-11-04 14:57:16 +0000564}
565
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800566static int git_use_proxy(const char *host)
Paul Collinsf8014772005-11-04 14:57:16 +0000567{
568 git_proxy_command = getenv("GIT_PROXY_COMMAND");
Erik Faye-Lund15112c92009-03-11 02:38:12 +0000569 git_config(git_proxy_command_options, (void*)host);
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800570 return (git_proxy_command && *git_proxy_command);
Paul Collinsf8014772005-11-04 14:57:16 +0000571}
572
Jeff King5cbf8242011-05-16 02:46:07 -0400573static struct child_process *git_proxy_connect(int fd[2], char *host)
Paul Collinsf8014772005-11-04 14:57:16 +0000574{
Timo Hirvonen554fe202006-06-28 12:04:39 +0300575 const char *port = STR(DEFAULT_GIT_PORT);
Jeff King5cbf8242011-05-16 02:46:07 -0400576 struct child_process *proxy;
Paul Collinsf8014772005-11-04 14:57:16 +0000577
Michael Lukashov72a534d2010-02-17 20:56:02 +0000578 get_host_and_port(&host, &port);
Paul Collinsf8014772005-11-04 14:57:16 +0000579
René Scharfe483bbd42014-08-19 21:10:48 +0200580 proxy = xmalloc(sizeof(*proxy));
581 child_process_init(proxy);
Jeff King1823bea2014-05-15 04:34:09 -0400582 argv_array_push(&proxy->args, git_proxy_command);
583 argv_array_push(&proxy->args, host);
584 argv_array_push(&proxy->args, port);
Jeff King5cbf8242011-05-16 02:46:07 -0400585 proxy->in = -1;
586 proxy->out = -1;
587 if (start_command(proxy))
Jeff King1823bea2014-05-15 04:34:09 -0400588 die("cannot start proxy %s", git_proxy_command);
Jeff King5cbf8242011-05-16 02:46:07 -0400589 fd[0] = proxy->out; /* read from proxy stdout */
590 fd[1] = proxy->in; /* write to proxy stdin */
591 return proxy;
Paul Collinsf8014772005-11-04 14:57:16 +0000592}
593
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100594static char *get_port(char *host)
Luben Tuikov2e776662007-09-01 02:36:31 -0700595{
596 char *end;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100597 char *p = strchr(host, ':');
598
Luben Tuikov2e776662007-09-01 02:36:31 -0700599 if (p) {
René Scharfe8f148252008-12-21 02:12:11 +0100600 long port = strtol(p + 1, &end, 10);
601 if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) {
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100602 *p = '\0';
603 return p+1;
Luben Tuikov2e776662007-09-01 02:36:31 -0700604 }
605 }
606
607 return NULL;
608}
609
Linus Torvaldsf7192592005-07-04 11:57:58 -0700610/*
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100611 * Extract protocol and relevant parts from the specified connection URL.
612 * The caller must free() the returned strings.
Linus Torvaldsf7192592005-07-04 11:57:58 -0700613 */
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100614static enum protocol parse_connect_url(const char *url_orig, char **ret_host,
Torsten Bögershausen83b05872013-11-28 20:49:54 +0100615 char **ret_path)
Linus Torvaldsf7192592005-07-04 11:57:58 -0700616{
Jeff King9d2e9422010-05-23 05:19:44 -0400617 char *url;
Benjamin Kramer8e76bf32009-03-13 13:51:33 +0100618 char *host, *path;
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900619 char *end;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100620 int separator = '/';
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100621 enum protocol protocol = PROTO_LOCAL;
Junio C Hamanof0b73672006-06-19 18:25:21 -0700622
Jeff King9d2e9422010-05-23 05:19:44 -0400623 if (is_url(url_orig))
624 url = url_decode(url_orig);
625 else
626 url = xstrdup(url_orig);
627
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100628 host = strstr(url, "://");
Brian Gianforcaroeeefa7c2009-09-01 01:35:10 -0400629 if (host) {
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100630 *host = '\0';
631 protocol = get_protocol(url);
632 host += 3;
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900633 } else {
Linus Torvaldsf7192592005-07-04 11:57:58 -0700634 host = url;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100635 if (!url_is_local_not_ssh(url)) {
636 protocol = PROTO_SSH;
637 separator = ':';
638 }
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900639 }
640
Ilari Liusvaara9aa50532010-01-26 20:24:42 +0200641 /*
Torsten Bögershausen83b05872013-11-28 20:49:54 +0100642 * Don't do destructive transforms as protocol code does
643 * '[]' unwrapping in get_host_and_port()
Ilari Liusvaara9aa50532010-01-26 20:24:42 +0200644 */
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100645 end = host_end(&host, 0);
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900646
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100647 if (protocol == PROTO_LOCAL)
Linus Torvalds72a4f4b2007-08-01 10:03:37 -0700648 path = end;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100649 else if (protocol == PROTO_FILE && has_dos_drive_prefix(end))
650 path = end; /* "file://$(pwd)" may be "file://C:/projects/repo" */
651 else
652 path = strchr(end, separator);
Linus Torvalds2386d652005-07-13 18:46:20 -0700653
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100654 if (!path || !*path)
655 die("No path specified. See 'man git-pull' for valid url syntax");
656
657 /*
658 * null-terminate hostname and point path to ~ for URL's like this:
659 * ssh://host.xz/~user/repo
660 */
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100661
662 end = path; /* Need to \0 terminate host here */
663 if (separator == ':')
664 path++; /* path starts after ':' */
665 if (protocol == PROTO_GIT || protocol == PROTO_SSH) {
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100666 if (path[1] == '~')
667 path++;
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100668 }
669
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100670 path = xstrdup(path);
671 *end = '\0';
672
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100673 *ret_host = xstrdup(host);
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100674 *ret_path = path;
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100675 free(url);
676 return protocol;
677}
678
René Scharfed3180272014-08-19 21:09:35 +0200679static struct child_process no_fork = CHILD_PROCESS_INIT;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700680
Nguyễn Thái Ngọc Duy3c8ede32016-06-26 13:16:35 +0200681static const char *get_ssh_command(void)
682{
683 const char *ssh;
684
685 if ((ssh = getenv("GIT_SSH_COMMAND")))
686 return ssh;
687
688 if (!git_config_get_string_const("core.sshcommand", &ssh))
689 return ssh;
690
691 return NULL;
692}
693
Junio C Hamano486c8e82017-02-09 09:20:25 -0800694static int override_ssh_variant(int *port_option, int *needs_batch)
Johannes Schindeline2824e42017-02-01 13:01:10 +0100695{
Junio C Hamano486c8e82017-02-09 09:20:25 -0800696 char *variant;
697
698 variant = xstrdup_or_null(getenv("GIT_SSH_VARIANT"));
699 if (!variant &&
700 git_config_get_string("ssh.variant", &variant))
701 return 0;
702
703 if (!strcmp(variant, "plink") || !strcmp(variant, "putty")) {
704 *port_option = 'P';
705 *needs_batch = 0;
706 } else if (!strcmp(variant, "tortoiseplink")) {
707 *port_option = 'P';
708 *needs_batch = 1;
709 } else {
710 *port_option = 'p';
711 *needs_batch = 0;
712 }
713 free(variant);
714 return 1;
715}
716
717static void handle_ssh_variant(const char *ssh_command, int is_cmdline,
718 int *port_option, int *needs_batch)
719{
720 const char *variant;
Johannes Schindeline2824e42017-02-01 13:01:10 +0100721 char *p = NULL;
722
Junio C Hamano486c8e82017-02-09 09:20:25 -0800723 if (override_ssh_variant(port_option, needs_batch))
724 return;
725
726 if (!is_cmdline) {
Johannes Schindeline2824e42017-02-01 13:01:10 +0100727 p = xstrdup(ssh_command);
728 variant = basename(p);
729 } else {
730 const char **ssh_argv;
731
732 p = xstrdup(ssh_command);
Jeff King22e5ae52017-04-10 20:30:23 -0400733 if (split_cmdline(p, &ssh_argv) > 0) {
Johannes Schindeline2824e42017-02-01 13:01:10 +0100734 variant = basename((char *)ssh_argv[0]);
735 /*
736 * At this point, variant points into the buffer
737 * referenced by p, hence we do not need ssh_argv
738 * any longer.
739 */
740 free(ssh_argv);
Jeff King5d2993b2017-04-20 16:21:58 -0400741 } else {
742 free(p);
Junio C Hamano486c8e82017-02-09 09:20:25 -0800743 return;
Jeff King5d2993b2017-04-20 16:21:58 -0400744 }
Johannes Schindeline2824e42017-02-01 13:01:10 +0100745 }
746
747 if (!strcasecmp(variant, "plink") ||
Junio C Hamano486c8e82017-02-09 09:20:25 -0800748 !strcasecmp(variant, "plink.exe"))
Johannes Schindeline2824e42017-02-01 13:01:10 +0100749 *port_option = 'P';
750 else if (!strcasecmp(variant, "tortoiseplink") ||
751 !strcasecmp(variant, "tortoiseplink.exe")) {
752 *port_option = 'P';
753 *needs_batch = 1;
754 }
755 free(p);
Johannes Schindeline2824e42017-02-01 13:01:10 +0100756}
757
Linus Torvaldsf7192592005-07-04 11:57:58 -0700758/*
759 * This returns a dummy child_process if the transport protocol does not
760 * need fork(2), or a struct child_process object if it does. Once done,
761 * finish the connection with finish_connect() with the value returned from
762 * this function (it is safe to call finish_connect() with NULL to support
763 * the former case).
764 *
765 * If it returns, the connect is successful; it just dies on errors (this
766 * will hopefully be changed in a libification effort, to return NULL when
767 * the connection failed).
768 */
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100769struct child_process *git_connect(int fd[2], const char *url,
Linus Torvaldsf7192592005-07-04 11:57:58 -0700770 const char *prog, int flags)
771{
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100772 char *hostandport, *path;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700773 struct child_process *conn = &no_fork;
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100774 enum protocol protocol;
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100775 struct strbuf cmd = STRBUF_INIT;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700776
777 /* Without this we cannot rely on waitpid() to tell
778 * what happened to our children.
779 */
780 signal(SIGCHLD, SIG_DFL);
781
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100782 protocol = parse_connect_url(url, &hostandport, &path);
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100783 if ((flags & CONNECT_DIAG_URL) && (protocol != PROTO_SSH)) {
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100784 printf("Diag: url=%s\n", url ? url : "NULL");
785 printf("Diag: protocol=%s\n", prot_name(protocol));
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100786 printf("Diag: hostandport=%s\n", hostandport ? hostandport : "NULL");
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100787 printf("Diag: path=%s\n", path ? path : "NULL");
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100788 conn = NULL;
789 } else if (protocol == PROTO_GIT) {
Jeff King94bc83c2015-02-17 03:37:35 -0500790 /*
791 * Set up virtual host information based on where we will
792 * connect, unless the user has overridden us in
793 * the environment.
794 */
795 char *target_host = getenv("GIT_OVERRIDE_VIRTUAL_HOST");
796 if (target_host)
797 target_host = xstrdup(target_host);
798 else
799 target_host = xstrdup(hostandport);
800
Jeff Kinga5adace2015-09-16 13:12:52 -0400801 transport_check_allowed("git");
802
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500803 /* These underlying connection commands die() if they
804 * cannot connect.
805 */
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100806 if (git_use_proxy(hostandport))
807 conn = git_proxy_connect(fd, hostandport);
Serge E. Hallynda2a95b2006-04-17 10:14:47 -0500808 else
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100809 git_tcp_connect(fd, hostandport, flags);
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500810 /*
811 * Separate original protocol components prog and path
Shawn O. Pearce73bb33a2009-06-04 18:33:32 -0700812 * from extended host header with a NUL byte.
813 *
814 * Note: Do not add any other headers here! Doing so
815 * will cause older git-daemon servers to crash.
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500816 */
Lars Schneider81c634e2016-10-16 16:20:29 -0700817 packet_write_fmt(fd[1],
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500818 "%s %s%chost=%s%c",
819 prog, path, 0,
820 target_host, 0);
821 free(target_host);
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100822 } else {
René Scharfe483bbd42014-08-19 21:10:48 +0200823 conn = xmalloc(sizeof(*conn));
824 child_process_init(conn);
Linus Torvaldsf7192592005-07-04 11:57:58 -0700825
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100826 strbuf_addstr(&cmd, prog);
827 strbuf_addch(&cmd, ' ');
828 sq_quote_buf(&cmd, path);
Christian Couder0f503d72006-09-11 07:04:50 +0200829
Jeff Kingaab40432015-09-04 18:40:08 -0400830 /* remove repo-local variables from the environment */
831 conn->env = local_repo_env;
Jeff Kinga48b4092015-09-08 04:33:14 -0400832 conn->use_shell = 1;
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100833 conn->in = conn->out = -1;
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100834 if (protocol == PROTO_SSH) {
Thomas Quinot39942762014-11-09 23:42:32 +0100835 const char *ssh;
Junio C Hamano6a4f3a92017-01-26 15:51:58 +0100836 int needs_batch = 0;
837 int port_option = 'p';
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100838 char *ssh_host = hostandport;
839 const char *port = NULL;
Jeff Kinga5adace2015-09-16 13:12:52 -0400840 transport_check_allowed("ssh");
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100841 get_host_and_port(&ssh_host, &port);
Christian Couder0f503d72006-09-11 07:04:50 +0200842
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100843 if (!port)
844 port = get_port(ssh_host);
Junio C Hamano42da4842015-03-05 12:45:44 -0800845
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100846 if (flags & CONNECT_DIAG_URL) {
847 printf("Diag: url=%s\n", url ? url : "NULL");
848 printf("Diag: protocol=%s\n", prot_name(protocol));
849 printf("Diag: userandhost=%s\n", ssh_host ? ssh_host : "NULL");
850 printf("Diag: port=%s\n", port ? port : "NONE");
851 printf("Diag: path=%s\n", path ? path : "NULL");
Linus Torvaldsf7192592005-07-04 11:57:58 -0700852
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100853 free(hostandport);
854 free(path);
Stefan Beller04f20c02015-03-09 09:58:22 -0700855 free(conn);
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100856 return NULL;
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100857 }
brian m. carlson37ee6462015-04-26 20:30:10 +0000858
Nguyễn Thái Ngọc Duy3c8ede32016-06-26 13:16:35 +0200859 ssh = get_ssh_command();
Johannes Schindeline2824e42017-02-01 13:01:10 +0100860 if (ssh)
861 handle_ssh_variant(ssh, 1, &port_option,
862 &needs_batch);
863 else {
Jeff Kinga48b4092015-09-08 04:33:14 -0400864 /*
865 * GIT_SSH is the no-shell version of
866 * GIT_SSH_COMMAND (and must remain so for
867 * historical compatibility).
868 */
869 conn->use_shell = 0;
870
brian m. carlson37ee6462015-04-26 20:30:10 +0000871 ssh = getenv("GIT_SSH");
872 if (!ssh)
873 ssh = "ssh";
Johannes Schindeline2824e42017-02-01 13:01:10 +0100874 else
875 handle_ssh_variant(ssh, 0,
876 &port_option,
877 &needs_batch);
brian m. carlson37ee6462015-04-26 20:30:10 +0000878 }
879
880 argv_array_push(&conn->args, ssh);
Eric Wongc915f112016-02-03 04:09:14 +0000881 if (flags & CONNECT_IPV4)
882 argv_array_push(&conn->args, "-4");
883 else if (flags & CONNECT_IPV6)
884 argv_array_push(&conn->args, "-6");
Junio C Hamano6a4f3a92017-01-26 15:51:58 +0100885 if (needs_batch)
brian m. carlson37ee6462015-04-26 20:30:10 +0000886 argv_array_push(&conn->args, "-batch");
887 if (port) {
Junio C Hamano6a4f3a92017-01-26 15:51:58 +0100888 argv_array_pushf(&conn->args,
889 "-%c", port_option);
brian m. carlson37ee6462015-04-26 20:30:10 +0000890 argv_array_push(&conn->args, port);
891 }
892 argv_array_push(&conn->args, ssh_host);
Nguyễn Thái Ngọc Duyc049b612014-03-13 18:45:31 +0700893 } else {
Jeff Kinga5adace2015-09-16 13:12:52 -0400894 transport_check_allowed("file");
Linus Torvaldsf7192592005-07-04 11:57:58 -0700895 }
Jeff King1823bea2014-05-15 04:34:09 -0400896 argv_array_push(&conn->args, cmd.buf);
Johannes Sixtf364cb82007-10-19 21:47:54 +0200897
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100898 if (start_command(conn))
899 die("unable to fork");
Johannes Sixtf364cb82007-10-19 21:47:54 +0200900
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100901 fd[0] = conn->out; /* read from child's stdout */
902 fd[1] = conn->in; /* write to child's stdin */
903 strbuf_release(&cmd);
904 }
905 free(hostandport);
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100906 free(path);
Johannes Sixt98158e92007-10-19 21:47:53 +0200907 return conn;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700908}
909
Jeff King7ffe8532011-05-16 02:52:11 -0400910int git_connection_is_socket(struct child_process *conn)
911{
912 return conn == &no_fork;
913}
914
Johannes Sixt98158e92007-10-19 21:47:53 +0200915int finish_connect(struct child_process *conn)
Linus Torvaldsf7192592005-07-04 11:57:58 -0700916{
Johannes Sixtf364cb82007-10-19 21:47:54 +0200917 int code;
Jeff King7ffe8532011-05-16 02:52:11 -0400918 if (!conn || git_connection_is_socket(conn))
Franck Bui-Huuf42a5c42006-09-12 11:00:13 +0200919 return 0;
920
Johannes Sixtf364cb82007-10-19 21:47:54 +0200921 code = finish_command(conn);
Johannes Sixt98158e92007-10-19 21:47:53 +0200922 free(conn);
Johannes Sixtf364cb82007-10-19 21:47:54 +0200923 return code;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700924}