blob: e78d3f43d84b7f90f4395cb289c9cf0cb34e8297 [file] [log] [blame]
Jason Riedy731043f2006-01-25 12:38:36 -08001#include "git-compat-util.h"
Linus Torvaldsf7192592005-07-04 11:57:58 -07002#include "cache.h"
Brandon Williamsb2141fc2017-06-14 11:07:36 -07003#include "config.h"
Linus Torvalds41cb7482005-07-05 15:44:09 -07004#include "pkt-line.h"
Junio C Hamanob10d0ec2005-07-08 00:02:52 -07005#include "quote.h"
Junio C Hamano6abf5c02005-10-16 00:25:26 -07006#include "refs.h"
Shawn O. Pearce15a1c0122007-03-12 19:00:19 -04007#include "run-command.h"
Daniel Barkalow6b628162007-05-12 11:45:59 -04008#include "remote.h"
Junio C Hamano47a59182013-07-08 13:56:53 -07009#include "connect.h"
Jeff King9d2e9422010-05-23 05:19:44 -040010#include "url.h"
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070011#include "string-list.h"
Nguyễn Thái Ngọc Duy13eb4622013-12-05 20:02:29 +070012#include "sha1-array.h"
Jeff Kinga5adace2015-09-16 13:12:52 -040013#include "transport.h"
Linus Torvaldsf7192592005-07-04 11:57:58 -070014
David Rientjes96f1e582006-08-15 10:23:48 -070015static char *server_capabilities;
Junio C Hamano5d54cff2013-09-17 16:29:28 -070016static const char *parse_feature_value(const char *, const char *, int *);
Johannes Schindelin211b5f92005-10-28 04:48:54 +020017
René Scharfebe0b3f82014-08-30 11:46:54 +020018static int check_ref(const char *name, unsigned int flags)
Linus Torvalds2718ff02006-07-04 12:29:10 -070019{
20 if (!flags)
21 return 1;
22
René Scharfebe0b3f82014-08-30 11:46:54 +020023 if (!skip_prefix(name, "refs/", &name))
Linus Torvalds2718ff02006-07-04 12:29:10 -070024 return 0;
25
Linus Torvalds2718ff02006-07-04 12:29:10 -070026 /* REF_NORMAL means that we don't want the magic fake tag refs */
Michael Haggerty8d9c5012011-09-15 23:10:25 +020027 if ((flags & REF_NORMAL) && check_refname_format(name, 0))
Linus Torvalds2718ff02006-07-04 12:29:10 -070028 return 0;
29
30 /* REF_HEADS means that we want regular branch heads */
René Scharfebe0b3f82014-08-30 11:46:54 +020031 if ((flags & REF_HEADS) && starts_with(name, "heads/"))
Linus Torvalds2718ff02006-07-04 12:29:10 -070032 return 1;
33
34 /* REF_TAGS means that we want tags */
René Scharfebe0b3f82014-08-30 11:46:54 +020035 if ((flags & REF_TAGS) && starts_with(name, "tags/"))
Linus Torvalds2718ff02006-07-04 12:29:10 -070036 return 1;
37
38 /* All type bits clear means that we are ok with anything */
39 return !(flags & ~REF_NORMAL);
40}
41
Daniel Barkalow45773702007-10-29 21:05:40 -040042int check_ref_type(const struct ref *ref, int flags)
43{
René Scharfebe0b3f82014-08-30 11:46:54 +020044 return check_ref(ref->name, flags);
Daniel Barkalow45773702007-10-29 21:05:40 -040045}
46
Jonathan Nieder55e4f932016-09-09 10:36:29 -070047static void die_initial_contact(int unexpected)
Heiko Voigt46284dd2012-06-19 20:24:50 +020048{
Jonathan Nieder55e4f932016-09-09 10:36:29 -070049 if (unexpected)
Vasco Almeidaf2b93b32016-09-19 13:08:17 +000050 die(_("The remote end hung up upon initial contact"));
Heiko Voigt46284dd2012-06-19 20:24:50 +020051 else
Vasco Almeidaf2b93b32016-09-19 13:08:17 +000052 die(_("Could not read from remote repository.\n\n"
53 "Please make sure you have the correct access rights\n"
54 "and the repository exists."));
Heiko Voigt46284dd2012-06-19 20:24:50 +020055}
56
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070057static void parse_one_symref_info(struct string_list *symref, const char *val, int len)
58{
59 char *sym, *target;
60 struct string_list_item *item;
61
62 if (!len)
63 return; /* just "symref" */
64 /* e.g. "symref=HEAD:refs/heads/master" */
René Scharfe5c0b13f2014-07-19 17:35:34 +020065 sym = xmemdupz(val, len);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070066 target = strchr(sym, ':');
67 if (!target)
68 /* just "symref=something" */
69 goto reject;
70 *(target++) = '\0';
71 if (check_refname_format(sym, REFNAME_ALLOW_ONELEVEL) ||
72 check_refname_format(target, REFNAME_ALLOW_ONELEVEL))
73 /* "symref=bogus:pair */
74 goto reject;
Jeff Kingef4fe562017-05-25 15:33:05 -040075 item = string_list_append_nodup(symref, sym);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070076 item->util = target;
77 return;
78reject:
79 free(sym);
80 return;
81}
82
83static void annotate_refs_with_symref_info(struct ref *ref)
84{
85 struct string_list symref = STRING_LIST_INIT_DUP;
86 const char *feature_list = server_capabilities;
87
88 while (feature_list) {
89 int len;
90 const char *val;
91
92 val = parse_feature_value(feature_list, "symref", &len);
93 if (!val)
94 break;
95 parse_one_symref_info(&symref, val, len);
96 feature_list = val + 1;
97 }
Michael Haggerty3383e192014-11-25 09:02:35 +010098 string_list_sort(&symref);
Junio C Hamanoa45b5f02013-09-17 19:10:31 -070099
100 for (; ref; ref = ref->next) {
101 struct string_list_item *item;
102 item = string_list_lookup(&symref, ref->name);
103 if (!item)
104 continue;
105 ref->symref = xstrdup((char *)item->util);
106 }
107 string_list_clear(&symref, 0);
108}
109
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700110/*
111 * Read all the refs from the other end
112 */
Jeff King85edf4f2013-02-20 15:06:45 -0500113struct ref **get_remote_heads(int in, char *src_buf, size_t src_len,
114 struct ref **list, unsigned int flags,
brian m. carlson910650d2017-03-31 01:40:00 +0000115 struct oid_array *extra_have,
116 struct oid_array *shallow_points)
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700117{
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700118 struct ref **orig_list = list;
Jonathan Nieder55e4f932016-09-09 10:36:29 -0700119
120 /*
121 * A hang-up after seeing some response from the other end
122 * means that it is unexpected, as we know the other end is
123 * willing to talk to us. A hang-up before seeing any
124 * response does not necessarily mean an ACL problem, though.
125 */
126 int saw_response;
Jonathan Taneb398792016-09-09 10:36:30 -0700127 int got_dummy_ref_with_capabilities_declaration = 0;
Heiko Voigt46284dd2012-06-19 20:24:50 +0200128
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700129 *list = NULL;
Jonathan Nieder55e4f932016-09-09 10:36:29 -0700130 for (saw_response = 0; ; saw_response = 1) {
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700131 struct ref *ref;
brian m. carlsone96b16c2015-11-10 02:22:23 +0000132 struct object_id old_oid;
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700133 char *name;
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200134 int len, name_len;
Jeff King74543a02013-02-20 15:02:57 -0500135 char *buffer = packet_buffer;
Jeff Kingae021d82014-06-18 15:47:50 -0400136 const char *arg;
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700137
Jeff King85edf4f2013-02-20 15:06:45 -0500138 len = packet_read(in, &src_buf, &src_len,
Jeff King4981fe72013-02-23 17:31:34 -0500139 packet_buffer, sizeof(packet_buffer),
Jeff King819b9292013-02-20 15:02:28 -0500140 PACKET_READ_GENTLE_ON_EOF |
141 PACKET_READ_CHOMP_NEWLINE);
Heiko Voigt46284dd2012-06-19 20:24:50 +0200142 if (len < 0)
Jonathan Nieder55e4f932016-09-09 10:36:29 -0700143 die_initial_contact(saw_response);
Heiko Voigt46284dd2012-06-19 20:24:50 +0200144
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700145 if (!len)
146 break;
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700147
Jeff Kingae021d82014-06-18 15:47:50 -0400148 if (len > 4 && skip_prefix(buffer, "ERR ", &arg))
149 die("remote error: %s", arg);
Tom Preston-Wernera8073282008-11-01 11:44:45 -0700150
brian m. carlsone96b16c2015-11-10 02:22:23 +0000151 if (len == GIT_SHA1_HEXSZ + strlen("shallow ") &&
152 skip_prefix(buffer, "shallow ", &arg)) {
153 if (get_oid_hex(arg, &old_oid))
Jeff Kingae021d82014-06-18 15:47:50 -0400154 die("protocol error: expected shallow sha-1, got '%s'", arg);
Nguyễn Thái Ngọc Duyb06dcd72013-12-05 20:02:33 +0700155 if (!shallow_points)
156 die("repository on the other end cannot be shallow");
brian m. carlson910650d2017-03-31 01:40:00 +0000157 oid_array_append(shallow_points, &old_oid);
Nguyễn Thái Ngọc Duyb06dcd72013-12-05 20:02:33 +0700158 continue;
159 }
160
brian m. carlsone96b16c2015-11-10 02:22:23 +0000161 if (len < GIT_SHA1_HEXSZ + 2 || get_oid_hex(buffer, &old_oid) ||
162 buffer[GIT_SHA1_HEXSZ] != ' ')
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700163 die("protocol error: expected sha/ref, got '%s'", buffer);
brian m. carlsone96b16c2015-11-10 02:22:23 +0000164 name = buffer + GIT_SHA1_HEXSZ + 1;
Junio C Hamano1a7141f2005-10-13 18:57:40 -0700165
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200166 name_len = strlen(name);
brian m. carlsone96b16c2015-11-10 02:22:23 +0000167 if (len != name_len + GIT_SHA1_HEXSZ + 1) {
Jim Meyering8e0f7002008-01-31 18:26:32 +0100168 free(server_capabilities);
Shawn Pearce9befac42006-09-02 00:16:31 -0400169 server_capabilities = xstrdup(name + name_len + 1);
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200170 }
171
René Scharfe2ae7f902015-02-21 20:49:58 +0100172 if (extra_have && !strcmp(name, ".have")) {
brian m. carlson910650d2017-03-31 01:40:00 +0000173 oid_array_append(extra_have, &old_oid);
Junio C Hamano40c155f2008-09-09 01:27:09 -0700174 continue;
175 }
176
Jonathan Taneb398792016-09-09 10:36:30 -0700177 if (!strcmp(name, "capabilities^{}")) {
178 if (saw_response)
179 die("protocol error: unexpected capabilities^{}");
180 if (got_dummy_ref_with_capabilities_declaration)
181 die("protocol error: multiple capabilities^{}");
182 got_dummy_ref_with_capabilities_declaration = 1;
183 continue;
184 }
185
René Scharfebe0b3f82014-08-30 11:46:54 +0200186 if (!check_ref(name, flags))
Junio C Hamanocfee10a2005-12-25 23:18:37 -0800187 continue;
Jonathan Taneb398792016-09-09 10:36:30 -0700188
189 if (got_dummy_ref_with_capabilities_declaration)
190 die("protocol error: unexpected ref after capabilities^{}");
191
brian m. carlsone96b16c2015-11-10 02:22:23 +0000192 ref = alloc_ref(buffer + GIT_SHA1_HEXSZ + 1);
193 oidcpy(&ref->old_oid, &old_oid);
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700194 *list = ref;
195 list = &ref->next;
196 }
Junio C Hamanoa45b5f02013-09-17 19:10:31 -0700197
198 annotate_refs_with_symref_info(*orig_list);
199
Linus Torvaldsd1c133f2005-07-16 13:55:50 -0700200 return list;
201}
202
Junio C Hamano5d54cff2013-09-17 16:29:28 -0700203static const char *parse_feature_value(const char *feature_list, const char *feature, int *lenp)
Junio C Hamanof47182c2012-01-08 22:06:19 +0100204{
205 int len;
206
207 if (!feature_list)
208 return NULL;
209
210 len = strlen(feature);
211 while (*feature_list) {
212 const char *found = strstr(feature_list, feature);
213 if (!found)
214 return NULL;
Jeff King94427102012-08-13 21:59:27 -0400215 if (feature_list == found || isspace(found[-1])) {
216 const char *value = found + len;
217 /* feature with no value (e.g., "thin-pack") */
218 if (!*value || isspace(*value)) {
219 if (lenp)
220 *lenp = 0;
221 return value;
222 }
223 /* feature with a value (e.g., "agent=git/1.2.3") */
224 else if (*value == '=') {
225 value++;
226 if (lenp)
227 *lenp = strcspn(value, " \t\n");
228 return value;
229 }
230 /*
231 * otherwise we matched a substring of another feature;
232 * keep looking
233 */
234 }
Junio C Hamanof47182c2012-01-08 22:06:19 +0100235 feature_list = found + 1;
236 }
237 return NULL;
Johannes Schindelin211b5f92005-10-28 04:48:54 +0200238}
239
Jeff King94427102012-08-13 21:59:27 -0400240int parse_feature_request(const char *feature_list, const char *feature)
241{
242 return !!parse_feature_value(feature_list, feature, NULL);
243}
244
245const char *server_feature_value(const char *feature, int *len)
246{
247 return parse_feature_value(server_capabilities, feature, len);
248}
249
250int server_supports(const char *feature)
251{
252 return !!server_feature_value(feature, NULL);
253}
254
Linus Torvalds2386d652005-07-13 18:46:20 -0700255enum protocol {
256 PROTO_LOCAL = 1,
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100257 PROTO_FILE,
Linus Torvalds2386d652005-07-13 18:46:20 -0700258 PROTO_SSH,
Gary V. Vaughan4b055482010-05-14 09:31:35 +0000259 PROTO_GIT
Linus Torvalds2386d652005-07-13 18:46:20 -0700260};
261
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100262int url_is_local_not_ssh(const char *url)
263{
264 const char *colon = strchr(url, ':');
265 const char *slash = strchr(url, '/');
266 return !colon || (slash && slash < colon) ||
267 has_dos_drive_prefix(url);
268}
269
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100270static const char *prot_name(enum protocol protocol)
271{
272 switch (protocol) {
273 case PROTO_LOCAL:
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100274 case PROTO_FILE:
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100275 return "file";
276 case PROTO_SSH:
277 return "ssh";
278 case PROTO_GIT:
279 return "git";
280 default:
Tobias Klauser83e6bda2015-09-24 14:44:49 +0200281 return "unknown protocol";
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100282 }
283}
284
Linus Torvalds2386d652005-07-13 18:46:20 -0700285static enum protocol get_protocol(const char *name)
286{
287 if (!strcmp(name, "ssh"))
288 return PROTO_SSH;
289 if (!strcmp(name, "git"))
290 return PROTO_GIT;
Carlos Martín Nieto07c77822016-02-15 15:29:06 +0100291 if (!strcmp(name, "git+ssh")) /* deprecated - do not use */
Linus Torvaldsc05186c2005-10-14 17:14:56 -0700292 return PROTO_SSH;
Carlos Martín Nieto07c77822016-02-15 15:29:06 +0100293 if (!strcmp(name, "ssh+git")) /* deprecated - do not use */
Linus Torvaldsc05186c2005-10-14 17:14:56 -0700294 return PROTO_SSH;
Linus Torvalds72a4f4b2007-08-01 10:03:37 -0700295 if (!strcmp(name, "file"))
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100296 return PROTO_FILE;
Linus Torvalds2386d652005-07-13 18:46:20 -0700297 die("I don't handle protocol '%s'", name);
298}
299
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100300static char *host_end(char **hoststart, int removebrackets)
301{
302 char *host = *hoststart;
303 char *end;
304 char *start = strstr(host, "@[");
305 if (start)
306 start++; /* Jump over '@' */
307 else
308 start = host;
309 if (start[0] == '[') {
310 end = strchr(start + 1, ']');
311 if (end) {
312 if (removebrackets) {
313 *end = 0;
314 memmove(start, start + 1, end - start);
315 end++;
316 }
317 } else
318 end = host;
319 } else
320 end = host;
321 return end;
322}
323
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400324#define STR_(s) # s
325#define STR(s) STR_(s)
Linus Torvalds2386d652005-07-13 18:46:20 -0700326
Michael Lukashov72a534d2010-02-17 20:56:02 +0000327static void get_host_and_port(char **host, const char **port)
328{
329 char *colon, *end;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100330 end = host_end(host, 1);
Michael Lukashov72a534d2010-02-17 20:56:02 +0000331 colon = strchr(end, ':');
Michael Lukashov72a534d2010-02-17 20:56:02 +0000332 if (colon) {
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100333 long portnr = strtol(colon + 1, &end, 10);
334 if (end != colon + 1 && *end == '\0' && 0 <= portnr && portnr < 65536) {
335 *colon = 0;
336 *port = colon + 1;
Torsten Bögershausen6b6c5f72015-04-07 22:03:25 +0200337 } else if (!colon[1]) {
338 *colon = 0;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100339 }
Michael Lukashov72a534d2010-02-17 20:56:02 +0000340 }
341}
342
Eric Wonge47a8582011-12-06 04:39:36 +0000343static void enable_keepalive(int sockfd)
344{
345 int ka = 1;
346
347 if (setsockopt(sockfd, SOL_SOCKET, SO_KEEPALIVE, &ka, sizeof(ka)) < 0)
348 fprintf(stderr, "unable to set SO_KEEPALIVE on socket: %s\n",
349 strerror(errno));
350}
351
hpa49744d62005-09-28 16:52:21 -0700352#ifndef NO_IPV6
hpa4c505f72005-09-28 16:37:58 -0700353
Alex Riesenba505322007-05-23 23:34:27 +0200354static const char *ai_name(const struct addrinfo *ai)
355{
Benjamin Kramer785a9852009-04-24 14:16:41 +0200356 static char addr[NI_MAXHOST];
357 if (getnameinfo(ai->ai_addr, ai->ai_addrlen, addr, sizeof(addr), NULL, 0,
358 NI_NUMERICHOST) != 0)
Jeff King5096d492015-09-24 17:06:08 -0400359 xsnprintf(addr, sizeof(addr), "(unknown)");
Benjamin Kramer785a9852009-04-24 14:16:41 +0200360
Alex Riesenba505322007-05-23 23:34:27 +0200361 return addr;
362}
363
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500364/*
365 * Returns a connected socket() fd, or else die()s.
366 */
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300367static int git_tcp_connect_sock(char *host, int flags)
Linus Torvalds2386d652005-07-13 18:46:20 -0700368{
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700369 struct strbuf error_message = STRBUF_INIT;
370 int sockfd = -1;
Timo Hirvonen554fe202006-06-28 12:04:39 +0300371 const char *port = STR(DEFAULT_GIT_PORT);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400372 struct addrinfo hints, *ai0, *ai;
373 int gai;
Alex Riesenba505322007-05-23 23:34:27 +0200374 int cnt = 0;
Linus Torvalds2386d652005-07-13 18:46:20 -0700375
Michael Lukashov72a534d2010-02-17 20:56:02 +0000376 get_host_and_port(&host, &port);
377 if (!*port)
378 port = "<none>";
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400379
380 memset(&hints, 0, sizeof(hints));
Eric Wongc915f112016-02-03 04:09:14 +0000381 if (flags & CONNECT_IPV4)
382 hints.ai_family = AF_INET;
383 else if (flags & CONNECT_IPV6)
384 hints.ai_family = AF_INET6;
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400385 hints.ai_socktype = SOCK_STREAM;
386 hints.ai_protocol = IPPROTO_TCP;
387
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300388 if (flags & CONNECT_VERBOSE)
389 fprintf(stderr, "Looking up %s ... ", host);
390
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400391 gai = getaddrinfo(host, port, &hints, &ai);
392 if (gai)
Linus Torvalds608d48b2007-03-27 09:50:20 -0700393 die("Unable to look up %s (port %s) (%s)", host, port, gai_strerror(gai));
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400394
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300395 if (flags & CONNECT_VERBOSE)
396 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
397
Erik Faye-Lunde08afec2011-08-01 13:16:09 +0200398 for (ai0 = ai; ai; ai = ai->ai_next, cnt++) {
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500399 sockfd = socket(ai->ai_family,
400 ai->ai_socktype, ai->ai_protocol);
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700401 if ((sockfd < 0) ||
402 (connect(sockfd, ai->ai_addr, ai->ai_addrlen) < 0)) {
403 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
404 host, cnt, ai_name(ai), strerror(errno));
405 if (0 <= sockfd)
406 close(sockfd);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400407 sockfd = -1;
408 continue;
Linus Torvalds2386d652005-07-13 18:46:20 -0700409 }
Alex Riesenba505322007-05-23 23:34:27 +0200410 if (flags & CONNECT_VERBOSE)
411 fprintf(stderr, "%s ", ai_name(ai));
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400412 break;
Linus Torvalds2386d652005-07-13 18:46:20 -0700413 }
414
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400415 freeaddrinfo(ai0);
Linus Torvalds2386d652005-07-13 18:46:20 -0700416
Linus Torvalds2386d652005-07-13 18:46:20 -0700417 if (sockfd < 0)
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700418 die("unable to connect to %s:\n%s", host, error_message.buf);
YOSHIFUJI Hideaki5ba88442005-07-21 09:10:36 -0400419
Eric Wonge47a8582011-12-06 04:39:36 +0000420 enable_keepalive(sockfd);
421
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300422 if (flags & CONNECT_VERBOSE)
423 fprintf(stderr, "done.\n");
424
Dave Zarzycki63a995b2011-07-12 09:28:34 -0700425 strbuf_release(&error_message);
426
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500427 return sockfd;
Linus Torvalds2386d652005-07-13 18:46:20 -0700428}
429
hpa49744d62005-09-28 16:52:21 -0700430#else /* NO_IPV6 */
hpa4c505f72005-09-28 16:37:58 -0700431
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500432/*
433 * Returns a connected socket() fd, or else die()s.
434 */
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300435static int git_tcp_connect_sock(char *host, int flags)
hpa4c505f72005-09-28 16:37:58 -0700436{
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200437 struct strbuf error_message = STRBUF_INIT;
438 int sockfd = -1;
Michael Lukashov72a534d2010-02-17 20:56:02 +0000439 const char *port = STR(DEFAULT_GIT_PORT);
440 char *ep;
hpa4c505f72005-09-28 16:37:58 -0700441 struct hostent *he;
442 struct sockaddr_in sa;
443 char **ap;
444 unsigned int nport;
Alex Riesenba505322007-05-23 23:34:27 +0200445 int cnt;
hpa4c505f72005-09-28 16:37:58 -0700446
Michael Lukashov72a534d2010-02-17 20:56:02 +0000447 get_host_and_port(&host, &port);
hpa4c505f72005-09-28 16:37:58 -0700448
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300449 if (flags & CONNECT_VERBOSE)
450 fprintf(stderr, "Looking up %s ... ", host);
451
hpa4c505f72005-09-28 16:37:58 -0700452 he = gethostbyname(host);
453 if (!he)
454 die("Unable to look up %s (%s)", host, hstrerror(h_errno));
455 nport = strtoul(port, &ep, 10);
456 if ( ep == port || *ep ) {
457 /* Not numeric */
458 struct servent *se = getservbyname(port,"tcp");
459 if ( !se )
Alexander Potashevd7530702009-01-04 21:38:41 +0300460 die("Unknown port %s", port);
hpa4c505f72005-09-28 16:37:58 -0700461 nport = se->s_port;
462 }
463
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300464 if (flags & CONNECT_VERBOSE)
465 fprintf(stderr, "done.\nConnecting to %s (port %s) ... ", host, port);
466
Alex Riesenba505322007-05-23 23:34:27 +0200467 for (cnt = 0, ap = he->h_addr_list; *ap; ap++, cnt++) {
hpa4c505f72005-09-28 16:37:58 -0700468 memset(&sa, 0, sizeof sa);
469 sa.sin_family = he->h_addrtype;
Peter Anvin6573faf2005-09-28 17:26:44 -0700470 sa.sin_port = htons(nport);
Paul Sericec6164212005-11-22 07:54:23 -0600471 memcpy(&sa.sin_addr, *ap, he->h_length);
hpa4c505f72005-09-28 16:37:58 -0700472
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200473 sockfd = socket(he->h_addrtype, SOCK_STREAM, 0);
474 if ((sockfd < 0) ||
475 connect(sockfd, (struct sockaddr *)&sa, sizeof sa) < 0) {
476 strbuf_addf(&error_message, "%s[%d: %s]: errno=%s\n",
Alex Riesenba505322007-05-23 23:34:27 +0200477 host,
478 cnt,
479 inet_ntoa(*(struct in_addr *)&sa.sin_addr),
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200480 strerror(errno));
481 if (0 <= sockfd)
482 close(sockfd);
hpa4c505f72005-09-28 16:37:58 -0700483 sockfd = -1;
484 continue;
485 }
Alex Riesenba505322007-05-23 23:34:27 +0200486 if (flags & CONNECT_VERBOSE)
487 fprintf(stderr, "%s ",
488 inet_ntoa(*(struct in_addr *)&sa.sin_addr));
hpa4c505f72005-09-28 16:37:58 -0700489 break;
490 }
491
492 if (sockfd < 0)
Erik Faye-Lund7203a2d2011-08-01 13:16:10 +0200493 die("unable to connect to %s:\n%s", host, error_message.buf);
hpa4c505f72005-09-28 16:37:58 -0700494
Eric Wonge47a8582011-12-06 04:39:36 +0000495 enable_keepalive(sockfd);
496
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300497 if (flags & CONNECT_VERBOSE)
498 fprintf(stderr, "done.\n");
499
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500500 return sockfd;
hpa4c505f72005-09-28 16:37:58 -0700501}
502
hpa49744d62005-09-28 16:52:21 -0700503#endif /* NO_IPV6 */
hpa4c505f72005-09-28 16:37:58 -0700504
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500505
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300506static void git_tcp_connect(int fd[2], char *host, int flags)
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500507{
Michael S. Tsirkin7841ce72007-05-16 20:09:41 +0300508 int sockfd = git_tcp_connect_sock(host, flags);
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500509
510 fd[0] = sockfd;
Junio C Hamanoec587fd2007-01-21 17:10:51 -0800511 fd[1] = dup(sockfd);
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500512}
513
514
David Rientjes96f1e582006-08-15 10:23:48 -0700515static char *git_proxy_command;
Paul Collinsf8014772005-11-04 14:57:16 +0000516
Johannes Schindelinef90d6d2008-05-14 18:46:53 +0100517static int git_proxy_command_options(const char *var, const char *value,
518 void *cb)
Paul Collinsf8014772005-11-04 14:57:16 +0000519{
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800520 if (!strcmp(var, "core.gitproxy")) {
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900521 const char *for_pos;
522 int matchlen = -1;
523 int hostlen;
Erik Faye-Lund15112c92009-03-11 02:38:12 +0000524 const char *rhost_name = cb;
525 int rhost_len = strlen(rhost_name);
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900526
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800527 if (git_proxy_command)
Paul Collinsf8014772005-11-04 14:57:16 +0000528 return 0;
Junio C Hamanoc64b9ad2008-02-11 10:52:15 -0800529 if (!value)
530 return config_error_nonbool(var);
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800531 /* [core]
532 * ;# matches www.kernel.org as well
533 * gitproxy = netcatter-1 for kernel.org
534 * gitproxy = netcatter-2 for sample.xz
535 * gitproxy = netcatter-default
536 */
YOSHIFUJI Hideaki / 吉藤英明c3df8562005-11-22 12:18:23 +0900537 for_pos = strstr(value, " for ");
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800538 if (!for_pos)
539 /* matches everybody */
540 matchlen = strlen(value);
541 else {
542 hostlen = strlen(for_pos + 5);
543 if (rhost_len < hostlen)
544 matchlen = -1;
545 else if (!strncmp(for_pos + 5,
546 rhost_name + rhost_len - hostlen,
547 hostlen) &&
548 ((rhost_len == hostlen) ||
549 rhost_name[rhost_len - hostlen -1] == '.'))
550 matchlen = for_pos - value;
551 else
552 matchlen = -1;
Paul Collinsf8014772005-11-04 14:57:16 +0000553 }
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800554 if (0 <= matchlen) {
555 /* core.gitproxy = none for kernel.org */
Junio C Hamanoa6080a02007-06-07 00:04:01 -0700556 if (matchlen == 4 &&
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800557 !memcmp(value, "none", 4))
558 matchlen = 0;
Pierre Habouzit182af832007-09-16 00:32:36 +0200559 git_proxy_command = xmemdupz(value, matchlen);
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800560 }
561 return 0;
Paul Collinsf8014772005-11-04 14:57:16 +0000562 }
563
Johannes Schindelinef90d6d2008-05-14 18:46:53 +0100564 return git_default_config(var, value, cb);
Paul Collinsf8014772005-11-04 14:57:16 +0000565}
566
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800567static int git_use_proxy(const char *host)
Paul Collinsf8014772005-11-04 14:57:16 +0000568{
569 git_proxy_command = getenv("GIT_PROXY_COMMAND");
Erik Faye-Lund15112c92009-03-11 02:38:12 +0000570 git_config(git_proxy_command_options, (void*)host);
Junio C Hamanoe814bc42005-11-19 03:48:56 -0800571 return (git_proxy_command && *git_proxy_command);
Paul Collinsf8014772005-11-04 14:57:16 +0000572}
573
Jeff King5cbf8242011-05-16 02:46:07 -0400574static struct child_process *git_proxy_connect(int fd[2], char *host)
Paul Collinsf8014772005-11-04 14:57:16 +0000575{
Timo Hirvonen554fe202006-06-28 12:04:39 +0300576 const char *port = STR(DEFAULT_GIT_PORT);
Jeff King5cbf8242011-05-16 02:46:07 -0400577 struct child_process *proxy;
Paul Collinsf8014772005-11-04 14:57:16 +0000578
Michael Lukashov72a534d2010-02-17 20:56:02 +0000579 get_host_and_port(&host, &port);
Paul Collinsf8014772005-11-04 14:57:16 +0000580
René Scharfe483bbd42014-08-19 21:10:48 +0200581 proxy = xmalloc(sizeof(*proxy));
582 child_process_init(proxy);
Jeff King1823bea2014-05-15 04:34:09 -0400583 argv_array_push(&proxy->args, git_proxy_command);
584 argv_array_push(&proxy->args, host);
585 argv_array_push(&proxy->args, port);
Jeff King5cbf8242011-05-16 02:46:07 -0400586 proxy->in = -1;
587 proxy->out = -1;
588 if (start_command(proxy))
Jeff King1823bea2014-05-15 04:34:09 -0400589 die("cannot start proxy %s", git_proxy_command);
Jeff King5cbf8242011-05-16 02:46:07 -0400590 fd[0] = proxy->out; /* read from proxy stdout */
591 fd[1] = proxy->in; /* write to proxy stdin */
592 return proxy;
Paul Collinsf8014772005-11-04 14:57:16 +0000593}
594
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100595static char *get_port(char *host)
Luben Tuikov2e776662007-09-01 02:36:31 -0700596{
597 char *end;
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100598 char *p = strchr(host, ':');
599
Luben Tuikov2e776662007-09-01 02:36:31 -0700600 if (p) {
René Scharfe8f148252008-12-21 02:12:11 +0100601 long port = strtol(p + 1, &end, 10);
602 if (end != p + 1 && *end == '\0' && 0 <= port && port < 65536) {
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100603 *p = '\0';
604 return p+1;
Luben Tuikov2e776662007-09-01 02:36:31 -0700605 }
606 }
607
608 return NULL;
609}
610
Linus Torvaldsf7192592005-07-04 11:57:58 -0700611/*
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100612 * Extract protocol and relevant parts from the specified connection URL.
613 * The caller must free() the returned strings.
Linus Torvaldsf7192592005-07-04 11:57:58 -0700614 */
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100615static enum protocol parse_connect_url(const char *url_orig, char **ret_host,
Torsten Bögershausen83b05872013-11-28 20:49:54 +0100616 char **ret_path)
Linus Torvaldsf7192592005-07-04 11:57:58 -0700617{
Jeff King9d2e9422010-05-23 05:19:44 -0400618 char *url;
Benjamin Kramer8e76bf32009-03-13 13:51:33 +0100619 char *host, *path;
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900620 char *end;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100621 int separator = '/';
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100622 enum protocol protocol = PROTO_LOCAL;
Junio C Hamanof0b73672006-06-19 18:25:21 -0700623
Jeff King9d2e9422010-05-23 05:19:44 -0400624 if (is_url(url_orig))
625 url = url_decode(url_orig);
626 else
627 url = xstrdup(url_orig);
628
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100629 host = strstr(url, "://");
Brian Gianforcaroeeefa7c2009-09-01 01:35:10 -0400630 if (host) {
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100631 *host = '\0';
632 protocol = get_protocol(url);
633 host += 3;
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900634 } else {
Linus Torvaldsf7192592005-07-04 11:57:58 -0700635 host = url;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100636 if (!url_is_local_not_ssh(url)) {
637 protocol = PROTO_SSH;
638 separator = ':';
639 }
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900640 }
641
Ilari Liusvaara9aa50532010-01-26 20:24:42 +0200642 /*
Torsten Bögershausen83b05872013-11-28 20:49:54 +0100643 * Don't do destructive transforms as protocol code does
644 * '[]' unwrapping in get_host_and_port()
Ilari Liusvaara9aa50532010-01-26 20:24:42 +0200645 */
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100646 end = host_end(&host, 0);
YOSHIFUJI Hideaki / 吉藤英明356bece2005-12-21 19:23:42 +0900647
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100648 if (protocol == PROTO_LOCAL)
Linus Torvalds72a4f4b2007-08-01 10:03:37 -0700649 path = end;
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100650 else if (protocol == PROTO_FILE && has_dos_drive_prefix(end))
651 path = end; /* "file://$(pwd)" may be "file://C:/projects/repo" */
652 else
653 path = strchr(end, separator);
Linus Torvalds2386d652005-07-13 18:46:20 -0700654
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100655 if (!path || !*path)
656 die("No path specified. See 'man git-pull' for valid url syntax");
657
658 /*
659 * null-terminate hostname and point path to ~ for URL's like this:
660 * ssh://host.xz/~user/repo
661 */
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100662
663 end = path; /* Need to \0 terminate host here */
664 if (separator == ':')
665 path++; /* path starts after ':' */
666 if (protocol == PROTO_GIT || protocol == PROTO_SSH) {
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100667 if (path[1] == '~')
668 path++;
Andreas Ericssonfaea9cc2005-11-17 20:37:14 +0100669 }
670
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100671 path = xstrdup(path);
672 *end = '\0';
673
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100674 *ret_host = xstrdup(host);
Torsten Bögershausenc59ab2e2013-11-28 20:50:03 +0100675 *ret_path = path;
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100676 free(url);
677 return protocol;
678}
679
René Scharfed3180272014-08-19 21:09:35 +0200680static struct child_process no_fork = CHILD_PROCESS_INIT;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700681
Nguyễn Thái Ngọc Duy3c8ede32016-06-26 13:16:35 +0200682static const char *get_ssh_command(void)
683{
684 const char *ssh;
685
686 if ((ssh = getenv("GIT_SSH_COMMAND")))
687 return ssh;
688
689 if (!git_config_get_string_const("core.sshcommand", &ssh))
690 return ssh;
691
692 return NULL;
693}
694
Junio C Hamano486c8e82017-02-09 09:20:25 -0800695static int override_ssh_variant(int *port_option, int *needs_batch)
Johannes Schindeline2824e42017-02-01 13:01:10 +0100696{
Junio C Hamano486c8e82017-02-09 09:20:25 -0800697 char *variant;
698
699 variant = xstrdup_or_null(getenv("GIT_SSH_VARIANT"));
700 if (!variant &&
701 git_config_get_string("ssh.variant", &variant))
702 return 0;
703
704 if (!strcmp(variant, "plink") || !strcmp(variant, "putty")) {
705 *port_option = 'P';
706 *needs_batch = 0;
707 } else if (!strcmp(variant, "tortoiseplink")) {
708 *port_option = 'P';
709 *needs_batch = 1;
710 } else {
711 *port_option = 'p';
712 *needs_batch = 0;
713 }
714 free(variant);
715 return 1;
716}
717
718static void handle_ssh_variant(const char *ssh_command, int is_cmdline,
719 int *port_option, int *needs_batch)
720{
721 const char *variant;
Johannes Schindeline2824e42017-02-01 13:01:10 +0100722 char *p = NULL;
723
Junio C Hamano486c8e82017-02-09 09:20:25 -0800724 if (override_ssh_variant(port_option, needs_batch))
725 return;
726
727 if (!is_cmdline) {
Johannes Schindeline2824e42017-02-01 13:01:10 +0100728 p = xstrdup(ssh_command);
729 variant = basename(p);
730 } else {
731 const char **ssh_argv;
732
733 p = xstrdup(ssh_command);
Jeff King22e5ae52017-04-10 20:30:23 -0400734 if (split_cmdline(p, &ssh_argv) > 0) {
Johannes Schindeline2824e42017-02-01 13:01:10 +0100735 variant = basename((char *)ssh_argv[0]);
736 /*
737 * At this point, variant points into the buffer
738 * referenced by p, hence we do not need ssh_argv
739 * any longer.
740 */
741 free(ssh_argv);
Jeff King5d2993b2017-04-20 16:21:58 -0400742 } else {
743 free(p);
Junio C Hamano486c8e82017-02-09 09:20:25 -0800744 return;
Jeff King5d2993b2017-04-20 16:21:58 -0400745 }
Johannes Schindeline2824e42017-02-01 13:01:10 +0100746 }
747
748 if (!strcasecmp(variant, "plink") ||
Junio C Hamano486c8e82017-02-09 09:20:25 -0800749 !strcasecmp(variant, "plink.exe"))
Johannes Schindeline2824e42017-02-01 13:01:10 +0100750 *port_option = 'P';
751 else if (!strcasecmp(variant, "tortoiseplink") ||
752 !strcasecmp(variant, "tortoiseplink.exe")) {
753 *port_option = 'P';
754 *needs_batch = 1;
755 }
756 free(p);
Johannes Schindeline2824e42017-02-01 13:01:10 +0100757}
758
Linus Torvaldsf7192592005-07-04 11:57:58 -0700759/*
760 * This returns a dummy child_process if the transport protocol does not
761 * need fork(2), or a struct child_process object if it does. Once done,
762 * finish the connection with finish_connect() with the value returned from
763 * this function (it is safe to call finish_connect() with NULL to support
764 * the former case).
765 *
766 * If it returns, the connect is successful; it just dies on errors (this
767 * will hopefully be changed in a libification effort, to return NULL when
768 * the connection failed).
769 */
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100770struct child_process *git_connect(int fd[2], const char *url,
Linus Torvaldsf7192592005-07-04 11:57:58 -0700771 const char *prog, int flags)
772{
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100773 char *hostandport, *path;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700774 struct child_process *conn = &no_fork;
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100775 enum protocol protocol;
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100776 struct strbuf cmd = STRBUF_INIT;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700777
778 /* Without this we cannot rely on waitpid() to tell
779 * what happened to our children.
780 */
781 signal(SIGCHLD, SIG_DFL);
782
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100783 protocol = parse_connect_url(url, &hostandport, &path);
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100784 if ((flags & CONNECT_DIAG_URL) && (protocol != PROTO_SSH)) {
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100785 printf("Diag: url=%s\n", url ? url : "NULL");
786 printf("Diag: protocol=%s\n", prot_name(protocol));
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100787 printf("Diag: hostandport=%s\n", hostandport ? hostandport : "NULL");
Torsten Bögershausen5610b7c2013-11-28 20:49:17 +0100788 printf("Diag: path=%s\n", path ? path : "NULL");
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100789 conn = NULL;
790 } else if (protocol == PROTO_GIT) {
Jeff King94bc83c2015-02-17 03:37:35 -0500791 /*
792 * Set up virtual host information based on where we will
793 * connect, unless the user has overridden us in
794 * the environment.
795 */
796 char *target_host = getenv("GIT_OVERRIDE_VIRTUAL_HOST");
797 if (target_host)
798 target_host = xstrdup(target_host);
799 else
800 target_host = xstrdup(hostandport);
801
Jeff Kinga5adace2015-09-16 13:12:52 -0400802 transport_check_allowed("git");
803
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500804 /* These underlying connection commands die() if they
805 * cannot connect.
806 */
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100807 if (git_use_proxy(hostandport))
808 conn = git_proxy_connect(fd, hostandport);
Serge E. Hallynda2a95b2006-04-17 10:14:47 -0500809 else
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100810 git_tcp_connect(fd, hostandport, flags);
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500811 /*
812 * Separate original protocol components prog and path
Shawn O. Pearce73bb33a2009-06-04 18:33:32 -0700813 * from extended host header with a NUL byte.
814 *
815 * Note: Do not add any other headers here! Doing so
816 * will cause older git-daemon servers to crash.
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500817 */
Lars Schneider81c634e2016-10-16 16:20:29 -0700818 packet_write_fmt(fd[1],
Jon Loeliger5ad312b2006-06-06 22:58:41 -0500819 "%s %s%chost=%s%c",
820 prog, path, 0,
821 target_host, 0);
822 free(target_host);
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100823 } else {
René Scharfe483bbd42014-08-19 21:10:48 +0200824 conn = xmalloc(sizeof(*conn));
825 child_process_init(conn);
Linus Torvaldsf7192592005-07-04 11:57:58 -0700826
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100827 strbuf_addstr(&cmd, prog);
828 strbuf_addch(&cmd, ' ');
829 sq_quote_buf(&cmd, path);
Christian Couder0f503d72006-09-11 07:04:50 +0200830
Jeff Kingaab40432015-09-04 18:40:08 -0400831 /* remove repo-local variables from the environment */
832 conn->env = local_repo_env;
Jeff Kinga48b4092015-09-08 04:33:14 -0400833 conn->use_shell = 1;
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100834 conn->in = conn->out = -1;
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100835 if (protocol == PROTO_SSH) {
Thomas Quinot39942762014-11-09 23:42:32 +0100836 const char *ssh;
Junio C Hamano6a4f3a92017-01-26 15:51:58 +0100837 int needs_batch = 0;
838 int port_option = 'p';
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100839 char *ssh_host = hostandport;
840 const char *port = NULL;
Jeff Kinga5adace2015-09-16 13:12:52 -0400841 transport_check_allowed("ssh");
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100842 get_host_and_port(&ssh_host, &port);
Christian Couder0f503d72006-09-11 07:04:50 +0200843
Torsten Bögershausen86ceb332015-02-21 16:52:48 +0100844 if (!port)
845 port = get_port(ssh_host);
Junio C Hamano42da4842015-03-05 12:45:44 -0800846
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100847 if (flags & CONNECT_DIAG_URL) {
848 printf("Diag: url=%s\n", url ? url : "NULL");
849 printf("Diag: protocol=%s\n", prot_name(protocol));
850 printf("Diag: userandhost=%s\n", ssh_host ? ssh_host : "NULL");
851 printf("Diag: port=%s\n", port ? port : "NONE");
852 printf("Diag: path=%s\n", path ? path : "NULL");
Linus Torvaldsf7192592005-07-04 11:57:58 -0700853
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100854 free(hostandport);
855 free(path);
Stefan Beller04f20c02015-03-09 09:58:22 -0700856 free(conn);
Torsten Bögershausen3f55cca2015-02-21 16:52:55 +0100857 return NULL;
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100858 }
brian m. carlson37ee6462015-04-26 20:30:10 +0000859
Nguyễn Thái Ngọc Duy3c8ede32016-06-26 13:16:35 +0200860 ssh = get_ssh_command();
Johannes Schindeline2824e42017-02-01 13:01:10 +0100861 if (ssh)
862 handle_ssh_variant(ssh, 1, &port_option,
863 &needs_batch);
864 else {
Jeff Kinga48b4092015-09-08 04:33:14 -0400865 /*
866 * GIT_SSH is the no-shell version of
867 * GIT_SSH_COMMAND (and must remain so for
868 * historical compatibility).
869 */
870 conn->use_shell = 0;
871
brian m. carlson37ee6462015-04-26 20:30:10 +0000872 ssh = getenv("GIT_SSH");
873 if (!ssh)
874 ssh = "ssh";
Johannes Schindeline2824e42017-02-01 13:01:10 +0100875 else
876 handle_ssh_variant(ssh, 0,
877 &port_option,
878 &needs_batch);
brian m. carlson37ee6462015-04-26 20:30:10 +0000879 }
880
881 argv_array_push(&conn->args, ssh);
Eric Wongc915f112016-02-03 04:09:14 +0000882 if (flags & CONNECT_IPV4)
883 argv_array_push(&conn->args, "-4");
884 else if (flags & CONNECT_IPV6)
885 argv_array_push(&conn->args, "-6");
Junio C Hamano6a4f3a92017-01-26 15:51:58 +0100886 if (needs_batch)
brian m. carlson37ee6462015-04-26 20:30:10 +0000887 argv_array_push(&conn->args, "-batch");
888 if (port) {
Junio C Hamano6a4f3a92017-01-26 15:51:58 +0100889 argv_array_pushf(&conn->args,
890 "-%c", port_option);
brian m. carlson37ee6462015-04-26 20:30:10 +0000891 argv_array_push(&conn->args, port);
892 }
893 argv_array_push(&conn->args, ssh_host);
Nguyễn Thái Ngọc Duyc049b612014-03-13 18:45:31 +0700894 } else {
Jeff Kinga5adace2015-09-16 13:12:52 -0400895 transport_check_allowed("file");
Linus Torvaldsf7192592005-07-04 11:57:58 -0700896 }
Jeff King1823bea2014-05-15 04:34:09 -0400897 argv_array_push(&conn->args, cmd.buf);
Johannes Sixtf364cb82007-10-19 21:47:54 +0200898
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100899 if (start_command(conn))
900 die("unable to fork");
Johannes Sixtf364cb82007-10-19 21:47:54 +0200901
Torsten Bögershausena2036d72013-11-28 20:50:15 +0100902 fd[0] = conn->out; /* read from child's stdout */
903 fd[1] = conn->in; /* write to child's stdin */
904 strbuf_release(&cmd);
905 }
906 free(hostandport);
Johannes Sixtcabc3c12013-11-28 20:49:01 +0100907 free(path);
Johannes Sixt98158e92007-10-19 21:47:53 +0200908 return conn;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700909}
910
Jeff King7ffe8532011-05-16 02:52:11 -0400911int git_connection_is_socket(struct child_process *conn)
912{
913 return conn == &no_fork;
914}
915
Johannes Sixt98158e92007-10-19 21:47:53 +0200916int finish_connect(struct child_process *conn)
Linus Torvaldsf7192592005-07-04 11:57:58 -0700917{
Johannes Sixtf364cb82007-10-19 21:47:54 +0200918 int code;
Jeff King7ffe8532011-05-16 02:52:11 -0400919 if (!conn || git_connection_is_socket(conn))
Franck Bui-Huuf42a5c42006-09-12 11:00:13 +0200920 return 0;
921
Johannes Sixtf364cb82007-10-19 21:47:54 +0200922 code = finish_command(conn);
Johannes Sixt98158e92007-10-19 21:47:53 +0200923 free(conn);
Johannes Sixtf364cb82007-10-19 21:47:54 +0200924 return code;
Linus Torvaldsf7192592005-07-04 11:57:58 -0700925}