sparse-index: add guard to ensure full index
[git] / remote-curl.c
1 #include "cache.h"
2 #include "config.h"
3 #include "remote.h"
4 #include "connect.h"
5 #include "strbuf.h"
6 #include "walker.h"
7 #include "http.h"
8 #include "exec-cmd.h"
9 #include "run-command.h"
10 #include "pkt-line.h"
11 #include "string-list.h"
12 #include "sideband.h"
13 #include "strvec.h"
14 #include "credential.h"
15 #include "oid-array.h"
16 #include "send-pack.h"
17 #include "protocol.h"
18 #include "quote.h"
19 #include "transport.h"
20
21 static struct remote *remote;
22 /* always ends with a trailing slash */
23 static struct strbuf url = STRBUF_INIT;
24
25 struct options {
26         int verbosity;
27         unsigned long depth;
28         char *deepen_since;
29         struct string_list deepen_not;
30         struct string_list push_options;
31         char *filter;
32         unsigned progress : 1,
33                 check_self_contained_and_connected : 1,
34                 cloning : 1,
35                 update_shallow : 1,
36                 followtags : 1,
37                 dry_run : 1,
38                 thin : 1,
39                 /* One of the SEND_PACK_PUSH_CERT_* constants. */
40                 push_cert : 2,
41                 deepen_relative : 1,
42
43                 /* see documentation of corresponding flag in fetch-pack.h */
44                 from_promisor : 1,
45
46                 atomic : 1,
47                 object_format : 1,
48                 force_if_includes : 1;
49         const struct git_hash_algo *hash_algo;
50 };
51 static struct options options;
52 static struct string_list cas_options = STRING_LIST_INIT_DUP;
53
54 static int set_option(const char *name, const char *value)
55 {
56         if (!strcmp(name, "verbosity")) {
57                 char *end;
58                 int v = strtol(value, &end, 10);
59                 if (value == end || *end)
60                         return -1;
61                 options.verbosity = v;
62                 return 0;
63         }
64         else if (!strcmp(name, "progress")) {
65                 if (!strcmp(value, "true"))
66                         options.progress = 1;
67                 else if (!strcmp(value, "false"))
68                         options.progress = 0;
69                 else
70                         return -1;
71                 return 0;
72         }
73         else if (!strcmp(name, "depth")) {
74                 char *end;
75                 unsigned long v = strtoul(value, &end, 10);
76                 if (value == end || *end)
77                         return -1;
78                 options.depth = v;
79                 return 0;
80         }
81         else if (!strcmp(name, "deepen-since")) {
82                 options.deepen_since = xstrdup(value);
83                 return 0;
84         }
85         else if (!strcmp(name, "deepen-not")) {
86                 string_list_append(&options.deepen_not, value);
87                 return 0;
88         }
89         else if (!strcmp(name, "deepen-relative")) {
90                 if (!strcmp(value, "true"))
91                         options.deepen_relative = 1;
92                 else if (!strcmp(value, "false"))
93                         options.deepen_relative = 0;
94                 else
95                         return -1;
96                 return 0;
97         }
98         else if (!strcmp(name, "followtags")) {
99                 if (!strcmp(value, "true"))
100                         options.followtags = 1;
101                 else if (!strcmp(value, "false"))
102                         options.followtags = 0;
103                 else
104                         return -1;
105                 return 0;
106         }
107         else if (!strcmp(name, "dry-run")) {
108                 if (!strcmp(value, "true"))
109                         options.dry_run = 1;
110                 else if (!strcmp(value, "false"))
111                         options.dry_run = 0;
112                 else
113                         return -1;
114                 return 0;
115         }
116         else if (!strcmp(name, "check-connectivity")) {
117                 if (!strcmp(value, "true"))
118                         options.check_self_contained_and_connected = 1;
119                 else if (!strcmp(value, "false"))
120                         options.check_self_contained_and_connected = 0;
121                 else
122                         return -1;
123                 return 0;
124         }
125         else if (!strcmp(name, "cas")) {
126                 struct strbuf val = STRBUF_INIT;
127                 strbuf_addstr(&val, "--force-with-lease=");
128                 if (*value != '"')
129                         strbuf_addstr(&val, value);
130                 else if (unquote_c_style(&val, value, NULL))
131                         return -1;
132                 string_list_append(&cas_options, val.buf);
133                 strbuf_release(&val);
134                 return 0;
135         } else if (!strcmp(name, TRANS_OPT_FORCE_IF_INCLUDES)) {
136                 if (!strcmp(value, "true"))
137                         options.force_if_includes = 1;
138                 else if (!strcmp(value, "false"))
139                         options.force_if_includes = 0;
140                 else
141                         return -1;
142                 return 0;
143         } else if (!strcmp(name, "cloning")) {
144                 if (!strcmp(value, "true"))
145                         options.cloning = 1;
146                 else if (!strcmp(value, "false"))
147                         options.cloning = 0;
148                 else
149                         return -1;
150                 return 0;
151         } else if (!strcmp(name, "update-shallow")) {
152                 if (!strcmp(value, "true"))
153                         options.update_shallow = 1;
154                 else if (!strcmp(value, "false"))
155                         options.update_shallow = 0;
156                 else
157                         return -1;
158                 return 0;
159         } else if (!strcmp(name, "pushcert")) {
160                 if (!strcmp(value, "true"))
161                         options.push_cert = SEND_PACK_PUSH_CERT_ALWAYS;
162                 else if (!strcmp(value, "false"))
163                         options.push_cert = SEND_PACK_PUSH_CERT_NEVER;
164                 else if (!strcmp(value, "if-asked"))
165                         options.push_cert = SEND_PACK_PUSH_CERT_IF_ASKED;
166                 else
167                         return -1;
168                 return 0;
169         } else if (!strcmp(name, "atomic")) {
170                 if (!strcmp(value, "true"))
171                         options.atomic = 1;
172                 else if (!strcmp(value, "false"))
173                         options.atomic = 0;
174                 else
175                         return -1;
176                 return 0;
177         } else if (!strcmp(name, "push-option")) {
178                 if (*value != '"')
179                         string_list_append(&options.push_options, value);
180                 else {
181                         struct strbuf unquoted = STRBUF_INIT;
182                         if (unquote_c_style(&unquoted, value, NULL) < 0)
183                                 die(_("invalid quoting in push-option value: '%s'"), value);
184                         string_list_append_nodup(&options.push_options,
185                                                  strbuf_detach(&unquoted, NULL));
186                 }
187                 return 0;
188
189 #if LIBCURL_VERSION_NUM >= 0x070a08
190         } else if (!strcmp(name, "family")) {
191                 if (!strcmp(value, "ipv4"))
192                         git_curl_ipresolve = CURL_IPRESOLVE_V4;
193                 else if (!strcmp(value, "ipv6"))
194                         git_curl_ipresolve = CURL_IPRESOLVE_V6;
195                 else if (!strcmp(value, "all"))
196                         git_curl_ipresolve = CURL_IPRESOLVE_WHATEVER;
197                 else
198                         return -1;
199                 return 0;
200 #endif /* LIBCURL_VERSION_NUM >= 0x070a08 */
201         } else if (!strcmp(name, "from-promisor")) {
202                 options.from_promisor = 1;
203                 return 0;
204         } else if (!strcmp(name, "filter")) {
205                 options.filter = xstrdup(value);
206                 return 0;
207         } else if (!strcmp(name, "object-format")) {
208                 int algo;
209                 options.object_format = 1;
210                 if (strcmp(value, "true")) {
211                         algo = hash_algo_by_name(value);
212                         if (algo == GIT_HASH_UNKNOWN)
213                                 die("unknown object format '%s'", value);
214                         options.hash_algo = &hash_algos[algo];
215                 }
216                 return 0;
217         } else {
218                 return 1 /* unsupported */;
219         }
220 }
221
222 struct discovery {
223         char *service;
224         char *buf_alloc;
225         char *buf;
226         size_t len;
227         struct ref *refs;
228         struct oid_array shallow;
229         enum protocol_version version;
230         unsigned proto_git : 1;
231 };
232 static struct discovery *last_discovery;
233
234 static struct ref *parse_git_refs(struct discovery *heads, int for_push)
235 {
236         struct ref *list = NULL;
237         struct packet_reader reader;
238
239         packet_reader_init(&reader, -1, heads->buf, heads->len,
240                            PACKET_READ_CHOMP_NEWLINE |
241                            PACKET_READ_GENTLE_ON_EOF |
242                            PACKET_READ_DIE_ON_ERR_PACKET);
243
244         heads->version = discover_version(&reader);
245         switch (heads->version) {
246         case protocol_v2:
247                 /*
248                  * Do nothing.  This isn't a list of refs but rather a
249                  * capability advertisement.  Client would have run
250                  * 'stateless-connect' so we'll dump this capability listing
251                  * and let them request the refs themselves.
252                  */
253                 break;
254         case protocol_v1:
255         case protocol_v0:
256                 get_remote_heads(&reader, &list, for_push ? REF_NORMAL : 0,
257                                  NULL, &heads->shallow);
258                 options.hash_algo = reader.hash_algo;
259                 break;
260         case protocol_unknown_version:
261                 BUG("unknown protocol version");
262         }
263
264         return list;
265 }
266
267 static const struct git_hash_algo *detect_hash_algo(struct discovery *heads)
268 {
269         const char *p = memchr(heads->buf, '\t', heads->len);
270         int algo;
271         if (!p)
272                 return the_hash_algo;
273
274         algo = hash_algo_by_length((p - heads->buf) / 2);
275         if (algo == GIT_HASH_UNKNOWN)
276                 return NULL;
277         return &hash_algos[algo];
278 }
279
280 static struct ref *parse_info_refs(struct discovery *heads)
281 {
282         char *data, *start, *mid;
283         char *ref_name;
284         int i = 0;
285
286         struct ref *refs = NULL;
287         struct ref *ref = NULL;
288         struct ref *last_ref = NULL;
289
290         options.hash_algo = detect_hash_algo(heads);
291         if (!options.hash_algo)
292                 die("%sinfo/refs not valid: could not determine hash algorithm; "
293                     "is this a git repository?",
294                     transport_anonymize_url(url.buf));
295
296         data = heads->buf;
297         start = NULL;
298         mid = data;
299         while (i < heads->len) {
300                 if (!start) {
301                         start = &data[i];
302                 }
303                 if (data[i] == '\t')
304                         mid = &data[i];
305                 if (data[i] == '\n') {
306                         if (mid - start != options.hash_algo->hexsz)
307                                 die(_("%sinfo/refs not valid: is this a git repository?"),
308                                     transport_anonymize_url(url.buf));
309                         data[i] = 0;
310                         ref_name = mid + 1;
311                         ref = alloc_ref(ref_name);
312                         get_oid_hex_algop(start, &ref->old_oid, options.hash_algo);
313                         if (!refs)
314                                 refs = ref;
315                         if (last_ref)
316                                 last_ref->next = ref;
317                         last_ref = ref;
318                         start = NULL;
319                 }
320                 i++;
321         }
322
323         ref = alloc_ref("HEAD");
324         if (!http_fetch_ref(url.buf, ref) &&
325             !resolve_remote_symref(ref, refs)) {
326                 ref->next = refs;
327                 refs = ref;
328         } else {
329                 free(ref);
330         }
331
332         return refs;
333 }
334
335 static void free_discovery(struct discovery *d)
336 {
337         if (d) {
338                 if (d == last_discovery)
339                         last_discovery = NULL;
340                 free(d->shallow.oid);
341                 free(d->buf_alloc);
342                 free_refs(d->refs);
343                 free(d->service);
344                 free(d);
345         }
346 }
347
348 static int show_http_message(struct strbuf *type, struct strbuf *charset,
349                              struct strbuf *msg)
350 {
351         const char *p, *eol;
352
353         /*
354          * We only show text/plain parts, as other types are likely
355          * to be ugly to look at on the user's terminal.
356          */
357         if (strcmp(type->buf, "text/plain"))
358                 return -1;
359         if (charset->len)
360                 strbuf_reencode(msg, charset->buf, get_log_output_encoding());
361
362         strbuf_trim(msg);
363         if (!msg->len)
364                 return -1;
365
366         p = msg->buf;
367         do {
368                 eol = strchrnul(p, '\n');
369                 fprintf(stderr, "remote: %.*s\n", (int)(eol - p), p);
370                 p = eol + 1;
371         } while(*eol);
372         return 0;
373 }
374
375 static int get_protocol_http_header(enum protocol_version version,
376                                     struct strbuf *header)
377 {
378         if (version > 0) {
379                 strbuf_addf(header, GIT_PROTOCOL_HEADER ": version=%d",
380                             version);
381
382                 return 1;
383         }
384
385         return 0;
386 }
387
388 static void check_smart_http(struct discovery *d, const char *service,
389                              struct strbuf *type)
390 {
391         const char *p;
392         struct packet_reader reader;
393
394         /*
395          * If we don't see x-$service-advertisement, then it's not smart-http.
396          * But once we do, we commit to it and assume any other protocol
397          * violations are hard errors.
398          */
399         if (!skip_prefix(type->buf, "application/x-", &p) ||
400             !skip_prefix(p, service, &p) ||
401             strcmp(p, "-advertisement"))
402                 return;
403
404         packet_reader_init(&reader, -1, d->buf, d->len,
405                            PACKET_READ_CHOMP_NEWLINE |
406                            PACKET_READ_DIE_ON_ERR_PACKET);
407         if (packet_reader_read(&reader) != PACKET_READ_NORMAL)
408                 die(_("invalid server response; expected service, got flush packet"));
409
410         if (skip_prefix(reader.line, "# service=", &p) && !strcmp(p, service)) {
411                 /*
412                  * The header can include additional metadata lines, up
413                  * until a packet flush marker.  Ignore these now, but
414                  * in the future we might start to scan them.
415                  */
416                 for (;;) {
417                         packet_reader_read(&reader);
418                         if (reader.pktlen <= 0) {
419                                 break;
420                         }
421                 }
422
423                 /*
424                  * v0 smart http; callers expect us to soak up the
425                  * service and header packets
426                  */
427                 d->buf = reader.src_buffer;
428                 d->len = reader.src_len;
429                 d->proto_git = 1;
430
431         } else if (!strcmp(reader.line, "version 2")) {
432                 /*
433                  * v2 smart http; do not consume version packet, which will
434                  * be handled elsewhere.
435                  */
436                 d->proto_git = 1;
437
438         } else {
439                 die(_("invalid server response; got '%s'"), reader.line);
440         }
441 }
442
443 static struct discovery *discover_refs(const char *service, int for_push)
444 {
445         struct strbuf type = STRBUF_INIT;
446         struct strbuf charset = STRBUF_INIT;
447         struct strbuf buffer = STRBUF_INIT;
448         struct strbuf refs_url = STRBUF_INIT;
449         struct strbuf effective_url = STRBUF_INIT;
450         struct strbuf protocol_header = STRBUF_INIT;
451         struct string_list extra_headers = STRING_LIST_INIT_DUP;
452         struct discovery *last = last_discovery;
453         int http_ret, maybe_smart = 0;
454         struct http_get_options http_options;
455         enum protocol_version version = get_protocol_version_config();
456
457         if (last && !strcmp(service, last->service))
458                 return last;
459         free_discovery(last);
460
461         strbuf_addf(&refs_url, "%sinfo/refs", url.buf);
462         if ((starts_with(url.buf, "http://") || starts_with(url.buf, "https://")) &&
463              git_env_bool("GIT_SMART_HTTP", 1)) {
464                 maybe_smart = 1;
465                 if (!strchr(url.buf, '?'))
466                         strbuf_addch(&refs_url, '?');
467                 else
468                         strbuf_addch(&refs_url, '&');
469                 strbuf_addf(&refs_url, "service=%s", service);
470         }
471
472         /*
473          * NEEDSWORK: If we are trying to use protocol v2 and we are planning
474          * to perform a push, then fallback to v0 since the client doesn't know
475          * how to push yet using v2.
476          */
477         if (version == protocol_v2 && !strcmp("git-receive-pack", service))
478                 version = protocol_v0;
479
480         /* Add the extra Git-Protocol header */
481         if (get_protocol_http_header(version, &protocol_header))
482                 string_list_append(&extra_headers, protocol_header.buf);
483
484         memset(&http_options, 0, sizeof(http_options));
485         http_options.content_type = &type;
486         http_options.charset = &charset;
487         http_options.effective_url = &effective_url;
488         http_options.base_url = &url;
489         http_options.extra_headers = &extra_headers;
490         http_options.initial_request = 1;
491         http_options.no_cache = 1;
492
493         http_ret = http_get_strbuf(refs_url.buf, &buffer, &http_options);
494         switch (http_ret) {
495         case HTTP_OK:
496                 break;
497         case HTTP_MISSING_TARGET:
498                 show_http_message(&type, &charset, &buffer);
499                 die(_("repository '%s' not found"),
500                     transport_anonymize_url(url.buf));
501         case HTTP_NOAUTH:
502                 show_http_message(&type, &charset, &buffer);
503                 die(_("Authentication failed for '%s'"),
504                     transport_anonymize_url(url.buf));
505         default:
506                 show_http_message(&type, &charset, &buffer);
507                 die(_("unable to access '%s': %s"),
508                     transport_anonymize_url(url.buf), curl_errorstr);
509         }
510
511         if (options.verbosity && !starts_with(refs_url.buf, url.buf)) {
512                 char *u = transport_anonymize_url(url.buf);
513                 warning(_("redirecting to %s"), u);
514                 free(u);
515         }
516
517         last= xcalloc(1, sizeof(*last_discovery));
518         last->service = xstrdup(service);
519         last->buf_alloc = strbuf_detach(&buffer, &last->len);
520         last->buf = last->buf_alloc;
521
522         if (maybe_smart)
523                 check_smart_http(last, service, &type);
524
525         if (last->proto_git)
526                 last->refs = parse_git_refs(last, for_push);
527         else
528                 last->refs = parse_info_refs(last);
529
530         strbuf_release(&refs_url);
531         strbuf_release(&type);
532         strbuf_release(&charset);
533         strbuf_release(&effective_url);
534         strbuf_release(&buffer);
535         strbuf_release(&protocol_header);
536         string_list_clear(&extra_headers, 0);
537         last_discovery = last;
538         return last;
539 }
540
541 static struct ref *get_refs(int for_push)
542 {
543         struct discovery *heads;
544
545         if (for_push)
546                 heads = discover_refs("git-receive-pack", for_push);
547         else
548                 heads = discover_refs("git-upload-pack", for_push);
549
550         return heads->refs;
551 }
552
553 static void output_refs(struct ref *refs)
554 {
555         struct ref *posn;
556         if (options.object_format && options.hash_algo) {
557                 printf(":object-format %s\n", options.hash_algo->name);
558         }
559         for (posn = refs; posn; posn = posn->next) {
560                 if (posn->symref)
561                         printf("@%s %s\n", posn->symref, posn->name);
562                 else
563                         printf("%s %s\n", hash_to_hex_algop(posn->old_oid.hash,
564                                                             options.hash_algo),
565                                           posn->name);
566         }
567         printf("\n");
568         fflush(stdout);
569 }
570
571 struct rpc_state {
572         const char *service_name;
573         char *service_url;
574         char *hdr_content_type;
575         char *hdr_accept;
576         char *protocol_header;
577         char *buf;
578         size_t alloc;
579         size_t len;
580         size_t pos;
581         int in;
582         int out;
583         int any_written;
584         unsigned gzip_request : 1;
585         unsigned initial_buffer : 1;
586
587         /*
588          * Whenever a pkt-line is read into buf, append the 4 characters
589          * denoting its length before appending the payload.
590          */
591         unsigned write_line_lengths : 1;
592
593         /*
594          * Used by rpc_out; initialize to 0. This is true if a flush has been
595          * read, but the corresponding line length (if write_line_lengths is
596          * true) and EOF have not been sent to libcurl. Since each flush marks
597          * the end of a request, each flush must be completely sent before any
598          * further reading occurs.
599          */
600         unsigned flush_read_but_not_sent : 1;
601 };
602
603 /*
604  * Appends the result of reading from rpc->out to the string represented by
605  * rpc->buf and rpc->len if there is enough space. Returns 1 if there was
606  * enough space, 0 otherwise.
607  *
608  * If rpc->write_line_lengths is true, appends the line length as a 4-byte
609  * hexadecimal string before appending the result described above.
610  *
611  * Writes the total number of bytes appended into appended.
612  */
613 static int rpc_read_from_out(struct rpc_state *rpc, int options,
614                              size_t *appended,
615                              enum packet_read_status *status) {
616         size_t left;
617         char *buf;
618         int pktlen_raw;
619
620         if (rpc->write_line_lengths) {
621                 left = rpc->alloc - rpc->len - 4;
622                 buf = rpc->buf + rpc->len + 4;
623         } else {
624                 left = rpc->alloc - rpc->len;
625                 buf = rpc->buf + rpc->len;
626         }
627
628         if (left < LARGE_PACKET_MAX)
629                 return 0;
630
631         *status = packet_read_with_status(rpc->out, NULL, NULL, buf,
632                         left, &pktlen_raw, options);
633         if (*status != PACKET_READ_EOF) {
634                 *appended = pktlen_raw + (rpc->write_line_lengths ? 4 : 0);
635                 rpc->len += *appended;
636         }
637
638         if (rpc->write_line_lengths) {
639                 switch (*status) {
640                 case PACKET_READ_EOF:
641                         if (!(options & PACKET_READ_GENTLE_ON_EOF))
642                                 die(_("shouldn't have EOF when not gentle on EOF"));
643                         break;
644                 case PACKET_READ_NORMAL:
645                         set_packet_header(buf - 4, *appended);
646                         break;
647                 case PACKET_READ_DELIM:
648                         memcpy(buf - 4, "0001", 4);
649                         break;
650                 case PACKET_READ_FLUSH:
651                         memcpy(buf - 4, "0000", 4);
652                         break;
653                 case PACKET_READ_RESPONSE_END:
654                         die(_("remote server sent stateless separator"));
655                 }
656         }
657
658         return 1;
659 }
660
661 static size_t rpc_out(void *ptr, size_t eltsize,
662                 size_t nmemb, void *buffer_)
663 {
664         size_t max = eltsize * nmemb;
665         struct rpc_state *rpc = buffer_;
666         size_t avail = rpc->len - rpc->pos;
667         enum packet_read_status status;
668
669         if (!avail) {
670                 rpc->initial_buffer = 0;
671                 rpc->len = 0;
672                 rpc->pos = 0;
673                 if (!rpc->flush_read_but_not_sent) {
674                         if (!rpc_read_from_out(rpc, 0, &avail, &status))
675                                 BUG("The entire rpc->buf should be larger than LARGE_PACKET_MAX");
676                         if (status == PACKET_READ_FLUSH)
677                                 rpc->flush_read_but_not_sent = 1;
678                 }
679                 /*
680                  * If flush_read_but_not_sent is true, we have already read one
681                  * full request but have not fully sent it + EOF, which is why
682                  * we need to refrain from reading.
683                  */
684         }
685         if (rpc->flush_read_but_not_sent) {
686                 if (!avail) {
687                         /*
688                          * The line length either does not need to be sent at
689                          * all or has already been completely sent. Now we can
690                          * return 0, indicating EOF, meaning that the flush has
691                          * been fully sent.
692                          */
693                         rpc->flush_read_but_not_sent = 0;
694                         return 0;
695                 }
696                 /*
697                  * If avail is non-zero, the line length for the flush still
698                  * hasn't been fully sent. Proceed with sending the line
699                  * length.
700                  */
701         }
702
703         if (max < avail)
704                 avail = max;
705         memcpy(ptr, rpc->buf + rpc->pos, avail);
706         rpc->pos += avail;
707         return avail;
708 }
709
710 #ifndef NO_CURL_IOCTL
711 static curlioerr rpc_ioctl(CURL *handle, int cmd, void *clientp)
712 {
713         struct rpc_state *rpc = clientp;
714
715         switch (cmd) {
716         case CURLIOCMD_NOP:
717                 return CURLIOE_OK;
718
719         case CURLIOCMD_RESTARTREAD:
720                 if (rpc->initial_buffer) {
721                         rpc->pos = 0;
722                         return CURLIOE_OK;
723                 }
724                 error(_("unable to rewind rpc post data - try increasing http.postBuffer"));
725                 return CURLIOE_FAILRESTART;
726
727         default:
728                 return CURLIOE_UNKNOWNCMD;
729         }
730 }
731 #endif
732
733 struct check_pktline_state {
734         char len_buf[4];
735         int len_filled;
736         int remaining;
737 };
738
739 static void check_pktline(struct check_pktline_state *state, const char *ptr, size_t size)
740 {
741         while (size) {
742                 if (!state->remaining) {
743                         int digits_remaining = 4 - state->len_filled;
744                         if (digits_remaining > size)
745                                 digits_remaining = size;
746                         memcpy(&state->len_buf[state->len_filled], ptr, digits_remaining);
747                         state->len_filled += digits_remaining;
748                         ptr += digits_remaining;
749                         size -= digits_remaining;
750
751                         if (state->len_filled == 4) {
752                                 state->remaining = packet_length(state->len_buf);
753                                 if (state->remaining < 0) {
754                                         die(_("remote-curl: bad line length character: %.4s"), state->len_buf);
755                                 } else if (state->remaining == 2) {
756                                         die(_("remote-curl: unexpected response end packet"));
757                                 } else if (state->remaining < 4) {
758                                         state->remaining = 0;
759                                 } else {
760                                         state->remaining -= 4;
761                                 }
762                                 state->len_filled = 0;
763                         }
764                 }
765
766                 if (state->remaining) {
767                         int remaining = state->remaining;
768                         if (remaining > size)
769                                 remaining = size;
770                         ptr += remaining;
771                         size -= remaining;
772                         state->remaining -= remaining;
773                 }
774         }
775 }
776
777 struct rpc_in_data {
778         struct rpc_state *rpc;
779         struct active_request_slot *slot;
780         int check_pktline;
781         struct check_pktline_state pktline_state;
782 };
783
784 /*
785  * A callback for CURLOPT_WRITEFUNCTION. The return value is the bytes consumed
786  * from ptr.
787  */
788 static size_t rpc_in(char *ptr, size_t eltsize,
789                 size_t nmemb, void *buffer_)
790 {
791         size_t size = eltsize * nmemb;
792         struct rpc_in_data *data = buffer_;
793         long response_code;
794
795         if (curl_easy_getinfo(data->slot->curl, CURLINFO_RESPONSE_CODE,
796                               &response_code) != CURLE_OK)
797                 return size;
798         if (response_code >= 300)
799                 return size;
800         if (size)
801                 data->rpc->any_written = 1;
802         if (data->check_pktline)
803                 check_pktline(&data->pktline_state, ptr, size);
804         write_or_die(data->rpc->in, ptr, size);
805         return size;
806 }
807
808 static int run_slot(struct active_request_slot *slot,
809                     struct slot_results *results)
810 {
811         int err;
812         struct slot_results results_buf;
813
814         if (!results)
815                 results = &results_buf;
816
817         err = run_one_slot(slot, results);
818
819         if (err != HTTP_OK && err != HTTP_REAUTH) {
820                 struct strbuf msg = STRBUF_INIT;
821                 if (results->http_code && results->http_code != 200)
822                         strbuf_addf(&msg, "HTTP %ld", results->http_code);
823                 if (results->curl_result != CURLE_OK) {
824                         if (msg.len)
825                                 strbuf_addch(&msg, ' ');
826                         strbuf_addf(&msg, "curl %d", results->curl_result);
827                         if (curl_errorstr[0]) {
828                                 strbuf_addch(&msg, ' ');
829                                 strbuf_addstr(&msg, curl_errorstr);
830                         }
831                 }
832                 error(_("RPC failed; %s"), msg.buf);
833                 strbuf_release(&msg);
834         }
835
836         return err;
837 }
838
839 static int probe_rpc(struct rpc_state *rpc, struct slot_results *results)
840 {
841         struct active_request_slot *slot;
842         struct curl_slist *headers = http_copy_default_headers();
843         struct strbuf buf = STRBUF_INIT;
844         int err;
845
846         slot = get_active_slot();
847
848         headers = curl_slist_append(headers, rpc->hdr_content_type);
849         headers = curl_slist_append(headers, rpc->hdr_accept);
850
851         curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
852         curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
853         curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
854         curl_easy_setopt(slot->curl, CURLOPT_ENCODING, NULL);
855         curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, "0000");
856         curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE, 4);
857         curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
858         curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, fwrite_buffer);
859         curl_easy_setopt(slot->curl, CURLOPT_FILE, &buf);
860
861         err = run_slot(slot, results);
862
863         curl_slist_free_all(headers);
864         strbuf_release(&buf);
865         return err;
866 }
867
868 static curl_off_t xcurl_off_t(size_t len)
869 {
870         uintmax_t size = len;
871         if (size > maximum_signed_value_of_type(curl_off_t))
872                 die(_("cannot handle pushes this big"));
873         return (curl_off_t)size;
874 }
875
876 /*
877  * If flush_received is true, do not attempt to read any more; just use what's
878  * in rpc->buf.
879  */
880 static int post_rpc(struct rpc_state *rpc, int stateless_connect, int flush_received)
881 {
882         struct active_request_slot *slot;
883         struct curl_slist *headers = http_copy_default_headers();
884         int use_gzip = rpc->gzip_request;
885         char *gzip_body = NULL;
886         size_t gzip_size = 0;
887         int err, large_request = 0;
888         int needs_100_continue = 0;
889         struct rpc_in_data rpc_in_data;
890
891         /* Try to load the entire request, if we can fit it into the
892          * allocated buffer space we can use HTTP/1.0 and avoid the
893          * chunked encoding mess.
894          */
895         if (!flush_received) {
896                 while (1) {
897                         size_t n;
898                         enum packet_read_status status;
899
900                         if (!rpc_read_from_out(rpc, 0, &n, &status)) {
901                                 large_request = 1;
902                                 use_gzip = 0;
903                                 break;
904                         }
905                         if (status == PACKET_READ_FLUSH)
906                                 break;
907                 }
908         }
909
910         if (large_request) {
911                 struct slot_results results;
912
913                 do {
914                         err = probe_rpc(rpc, &results);
915                         if (err == HTTP_REAUTH)
916                                 credential_fill(&http_auth);
917                 } while (err == HTTP_REAUTH);
918                 if (err != HTTP_OK)
919                         return -1;
920
921                 if (results.auth_avail & CURLAUTH_GSSNEGOTIATE)
922                         needs_100_continue = 1;
923         }
924
925         headers = curl_slist_append(headers, rpc->hdr_content_type);
926         headers = curl_slist_append(headers, rpc->hdr_accept);
927         headers = curl_slist_append(headers, needs_100_continue ?
928                 "Expect: 100-continue" : "Expect:");
929
930         /* Add the extra Git-Protocol header */
931         if (rpc->protocol_header)
932                 headers = curl_slist_append(headers, rpc->protocol_header);
933
934 retry:
935         slot = get_active_slot();
936
937         curl_easy_setopt(slot->curl, CURLOPT_NOBODY, 0);
938         curl_easy_setopt(slot->curl, CURLOPT_POST, 1);
939         curl_easy_setopt(slot->curl, CURLOPT_URL, rpc->service_url);
940         curl_easy_setopt(slot->curl, CURLOPT_ENCODING, "");
941
942         if (large_request) {
943                 /* The request body is large and the size cannot be predicted.
944                  * We must use chunked encoding to send it.
945                  */
946                 headers = curl_slist_append(headers, "Transfer-Encoding: chunked");
947                 rpc->initial_buffer = 1;
948                 curl_easy_setopt(slot->curl, CURLOPT_READFUNCTION, rpc_out);
949                 curl_easy_setopt(slot->curl, CURLOPT_INFILE, rpc);
950 #ifndef NO_CURL_IOCTL
951                 curl_easy_setopt(slot->curl, CURLOPT_IOCTLFUNCTION, rpc_ioctl);
952                 curl_easy_setopt(slot->curl, CURLOPT_IOCTLDATA, rpc);
953 #endif
954                 if (options.verbosity > 1) {
955                         fprintf(stderr, "POST %s (chunked)\n", rpc->service_name);
956                         fflush(stderr);
957                 }
958
959         } else if (gzip_body) {
960                 /*
961                  * If we are looping to retry authentication, then the previous
962                  * run will have set up the headers and gzip buffer already,
963                  * and we just need to send it.
964                  */
965                 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
966                 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
967
968         } else if (use_gzip && 1024 < rpc->len) {
969                 /* The client backend isn't giving us compressed data so
970                  * we can try to deflate it ourselves, this may save on
971                  * the transfer time.
972                  */
973                 git_zstream stream;
974                 int ret;
975
976                 git_deflate_init_gzip(&stream, Z_BEST_COMPRESSION);
977                 gzip_size = git_deflate_bound(&stream, rpc->len);
978                 gzip_body = xmalloc(gzip_size);
979
980                 stream.next_in = (unsigned char *)rpc->buf;
981                 stream.avail_in = rpc->len;
982                 stream.next_out = (unsigned char *)gzip_body;
983                 stream.avail_out = gzip_size;
984
985                 ret = git_deflate(&stream, Z_FINISH);
986                 if (ret != Z_STREAM_END)
987                         die(_("cannot deflate request; zlib deflate error %d"), ret);
988
989                 ret = git_deflate_end_gently(&stream);
990                 if (ret != Z_OK)
991                         die(_("cannot deflate request; zlib end error %d"), ret);
992
993                 gzip_size = stream.total_out;
994
995                 headers = curl_slist_append(headers, "Content-Encoding: gzip");
996                 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, gzip_body);
997                 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(gzip_size));
998
999                 if (options.verbosity > 1) {
1000                         fprintf(stderr, "POST %s (gzip %lu to %lu bytes)\n",
1001                                 rpc->service_name,
1002                                 (unsigned long)rpc->len, (unsigned long)gzip_size);
1003                         fflush(stderr);
1004                 }
1005         } else {
1006                 /* We know the complete request size in advance, use the
1007                  * more normal Content-Length approach.
1008                  */
1009                 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDS, rpc->buf);
1010                 curl_easy_setopt(slot->curl, CURLOPT_POSTFIELDSIZE_LARGE, xcurl_off_t(rpc->len));
1011                 if (options.verbosity > 1) {
1012                         fprintf(stderr, "POST %s (%lu bytes)\n",
1013                                 rpc->service_name, (unsigned long)rpc->len);
1014                         fflush(stderr);
1015                 }
1016         }
1017
1018         curl_easy_setopt(slot->curl, CURLOPT_HTTPHEADER, headers);
1019         curl_easy_setopt(slot->curl, CURLOPT_WRITEFUNCTION, rpc_in);
1020         rpc_in_data.rpc = rpc;
1021         rpc_in_data.slot = slot;
1022         rpc_in_data.check_pktline = stateless_connect;
1023         memset(&rpc_in_data.pktline_state, 0, sizeof(rpc_in_data.pktline_state));
1024         curl_easy_setopt(slot->curl, CURLOPT_FILE, &rpc_in_data);
1025         curl_easy_setopt(slot->curl, CURLOPT_FAILONERROR, 0);
1026
1027
1028         rpc->any_written = 0;
1029         err = run_slot(slot, NULL);
1030         if (err == HTTP_REAUTH && !large_request) {
1031                 credential_fill(&http_auth);
1032                 goto retry;
1033         }
1034         if (err != HTTP_OK)
1035                 err = -1;
1036
1037         if (!rpc->any_written)
1038                 err = -1;
1039
1040         if (rpc_in_data.pktline_state.len_filled)
1041                 err = error(_("%d bytes of length header were received"), rpc_in_data.pktline_state.len_filled);
1042         if (rpc_in_data.pktline_state.remaining)
1043                 err = error(_("%d bytes of body are still expected"), rpc_in_data.pktline_state.remaining);
1044
1045         if (stateless_connect)
1046                 packet_response_end(rpc->in);
1047
1048         curl_slist_free_all(headers);
1049         free(gzip_body);
1050         return err;
1051 }
1052
1053 static int rpc_service(struct rpc_state *rpc, struct discovery *heads,
1054                        const char **client_argv, const struct strbuf *preamble,
1055                        struct strbuf *rpc_result)
1056 {
1057         const char *svc = rpc->service_name;
1058         struct strbuf buf = STRBUF_INIT;
1059         struct child_process client = CHILD_PROCESS_INIT;
1060         int err = 0;
1061
1062         client.in = -1;
1063         client.out = -1;
1064         client.git_cmd = 1;
1065         client.argv = client_argv;
1066         if (start_command(&client))
1067                 exit(1);
1068         write_or_die(client.in, preamble->buf, preamble->len);
1069         if (heads)
1070                 write_or_die(client.in, heads->buf, heads->len);
1071
1072         rpc->alloc = http_post_buffer;
1073         rpc->buf = xmalloc(rpc->alloc);
1074         rpc->in = client.in;
1075         rpc->out = client.out;
1076
1077         strbuf_addf(&buf, "%s%s", url.buf, svc);
1078         rpc->service_url = strbuf_detach(&buf, NULL);
1079
1080         strbuf_addf(&buf, "Content-Type: application/x-%s-request", svc);
1081         rpc->hdr_content_type = strbuf_detach(&buf, NULL);
1082
1083         strbuf_addf(&buf, "Accept: application/x-%s-result", svc);
1084         rpc->hdr_accept = strbuf_detach(&buf, NULL);
1085
1086         if (get_protocol_http_header(heads->version, &buf))
1087                 rpc->protocol_header = strbuf_detach(&buf, NULL);
1088         else
1089                 rpc->protocol_header = NULL;
1090
1091         while (!err) {
1092                 int n = packet_read(rpc->out, NULL, NULL, rpc->buf, rpc->alloc, 0);
1093                 if (!n)
1094                         break;
1095                 rpc->pos = 0;
1096                 rpc->len = n;
1097                 err |= post_rpc(rpc, 0, 0);
1098         }
1099
1100         close(client.in);
1101         client.in = -1;
1102         if (!err) {
1103                 strbuf_read(rpc_result, client.out, 0);
1104         } else {
1105                 char buf[4096];
1106                 for (;;)
1107                         if (xread(client.out, buf, sizeof(buf)) <= 0)
1108                                 break;
1109         }
1110
1111         close(client.out);
1112         client.out = -1;
1113
1114         err |= finish_command(&client);
1115         free(rpc->service_url);
1116         free(rpc->hdr_content_type);
1117         free(rpc->hdr_accept);
1118         free(rpc->protocol_header);
1119         free(rpc->buf);
1120         strbuf_release(&buf);
1121         return err;
1122 }
1123
1124 static int fetch_dumb(int nr_heads, struct ref **to_fetch)
1125 {
1126         struct walker *walker;
1127         char **targets;
1128         int ret, i;
1129
1130         ALLOC_ARRAY(targets, nr_heads);
1131         if (options.depth || options.deepen_since)
1132                 die(_("dumb http transport does not support shallow capabilities"));
1133         for (i = 0; i < nr_heads; i++)
1134                 targets[i] = xstrdup(oid_to_hex(&to_fetch[i]->old_oid));
1135
1136         walker = get_http_walker(url.buf);
1137         walker->get_verbosely = options.verbosity >= 3;
1138         walker->get_progress = options.progress;
1139         walker->get_recover = 0;
1140         ret = walker_fetch(walker, nr_heads, targets, NULL, NULL);
1141         walker_free(walker);
1142
1143         for (i = 0; i < nr_heads; i++)
1144                 free(targets[i]);
1145         free(targets);
1146
1147         return ret ? error(_("fetch failed.")) : 0;
1148 }
1149
1150 static int fetch_git(struct discovery *heads,
1151         int nr_heads, struct ref **to_fetch)
1152 {
1153         struct rpc_state rpc;
1154         struct strbuf preamble = STRBUF_INIT;
1155         int i, err;
1156         struct strvec args = STRVEC_INIT;
1157         struct strbuf rpc_result = STRBUF_INIT;
1158
1159         strvec_pushl(&args, "fetch-pack", "--stateless-rpc",
1160                      "--stdin", "--lock-pack", NULL);
1161         if (options.followtags)
1162                 strvec_push(&args, "--include-tag");
1163         if (options.thin)
1164                 strvec_push(&args, "--thin");
1165         if (options.verbosity >= 3)
1166                 strvec_pushl(&args, "-v", "-v", NULL);
1167         if (options.check_self_contained_and_connected)
1168                 strvec_push(&args, "--check-self-contained-and-connected");
1169         if (options.cloning)
1170                 strvec_push(&args, "--cloning");
1171         if (options.update_shallow)
1172                 strvec_push(&args, "--update-shallow");
1173         if (!options.progress)
1174                 strvec_push(&args, "--no-progress");
1175         if (options.depth)
1176                 strvec_pushf(&args, "--depth=%lu", options.depth);
1177         if (options.deepen_since)
1178                 strvec_pushf(&args, "--shallow-since=%s", options.deepen_since);
1179         for (i = 0; i < options.deepen_not.nr; i++)
1180                 strvec_pushf(&args, "--shallow-exclude=%s",
1181                              options.deepen_not.items[i].string);
1182         if (options.deepen_relative && options.depth)
1183                 strvec_push(&args, "--deepen-relative");
1184         if (options.from_promisor)
1185                 strvec_push(&args, "--from-promisor");
1186         if (options.filter)
1187                 strvec_pushf(&args, "--filter=%s", options.filter);
1188         strvec_push(&args, url.buf);
1189
1190         for (i = 0; i < nr_heads; i++) {
1191                 struct ref *ref = to_fetch[i];
1192                 if (!*ref->name)
1193                         die(_("cannot fetch by sha1 over smart http"));
1194                 packet_buf_write(&preamble, "%s %s\n",
1195                                  oid_to_hex(&ref->old_oid), ref->name);
1196         }
1197         packet_buf_flush(&preamble);
1198
1199         memset(&rpc, 0, sizeof(rpc));
1200         rpc.service_name = "git-upload-pack",
1201         rpc.gzip_request = 1;
1202
1203         err = rpc_service(&rpc, heads, args.v, &preamble, &rpc_result);
1204         if (rpc_result.len)
1205                 write_or_die(1, rpc_result.buf, rpc_result.len);
1206         strbuf_release(&rpc_result);
1207         strbuf_release(&preamble);
1208         strvec_clear(&args);
1209         return err;
1210 }
1211
1212 static int fetch(int nr_heads, struct ref **to_fetch)
1213 {
1214         struct discovery *d = discover_refs("git-upload-pack", 0);
1215         if (d->proto_git)
1216                 return fetch_git(d, nr_heads, to_fetch);
1217         else
1218                 return fetch_dumb(nr_heads, to_fetch);
1219 }
1220
1221 static void parse_fetch(struct strbuf *buf)
1222 {
1223         struct ref **to_fetch = NULL;
1224         struct ref *list_head = NULL;
1225         struct ref **list = &list_head;
1226         int alloc_heads = 0, nr_heads = 0;
1227
1228         do {
1229                 const char *p;
1230                 if (skip_prefix(buf->buf, "fetch ", &p)) {
1231                         const char *name;
1232                         struct ref *ref;
1233                         struct object_id old_oid;
1234                         const char *q;
1235
1236                         if (parse_oid_hex(p, &old_oid, &q))
1237                                 die(_("protocol error: expected sha/ref, got '%s'"), p);
1238                         if (*q == ' ')
1239                                 name = q + 1;
1240                         else if (!*q)
1241                                 name = "";
1242                         else
1243                                 die(_("protocol error: expected sha/ref, got '%s'"), p);
1244
1245                         ref = alloc_ref(name);
1246                         oidcpy(&ref->old_oid, &old_oid);
1247
1248                         *list = ref;
1249                         list = &ref->next;
1250
1251                         ALLOC_GROW(to_fetch, nr_heads + 1, alloc_heads);
1252                         to_fetch[nr_heads++] = ref;
1253                 }
1254                 else
1255                         die(_("http transport does not support %s"), buf->buf);
1256
1257                 strbuf_reset(buf);
1258                 if (strbuf_getline_lf(buf, stdin) == EOF)
1259                         return;
1260                 if (!*buf->buf)
1261                         break;
1262         } while (1);
1263
1264         if (fetch(nr_heads, to_fetch))
1265                 exit(128); /* error already reported */
1266         free_refs(list_head);
1267         free(to_fetch);
1268
1269         printf("\n");
1270         fflush(stdout);
1271         strbuf_reset(buf);
1272 }
1273
1274 static int push_dav(int nr_spec, const char **specs)
1275 {
1276         struct child_process child = CHILD_PROCESS_INIT;
1277         size_t i;
1278
1279         child.git_cmd = 1;
1280         strvec_push(&child.args, "http-push");
1281         strvec_push(&child.args, "--helper-status");
1282         if (options.dry_run)
1283                 strvec_push(&child.args, "--dry-run");
1284         if (options.verbosity > 1)
1285                 strvec_push(&child.args, "--verbose");
1286         strvec_push(&child.args, url.buf);
1287         for (i = 0; i < nr_spec; i++)
1288                 strvec_push(&child.args, specs[i]);
1289
1290         if (run_command(&child))
1291                 die(_("git-http-push failed"));
1292         return 0;
1293 }
1294
1295 static int push_git(struct discovery *heads, int nr_spec, const char **specs)
1296 {
1297         struct rpc_state rpc;
1298         int i, err;
1299         struct strvec args;
1300         struct string_list_item *cas_option;
1301         struct strbuf preamble = STRBUF_INIT;
1302         struct strbuf rpc_result = STRBUF_INIT;
1303
1304         strvec_init(&args);
1305         strvec_pushl(&args, "send-pack", "--stateless-rpc", "--helper-status",
1306                      NULL);
1307
1308         if (options.thin)
1309                 strvec_push(&args, "--thin");
1310         if (options.dry_run)
1311                 strvec_push(&args, "--dry-run");
1312         if (options.push_cert == SEND_PACK_PUSH_CERT_ALWAYS)
1313                 strvec_push(&args, "--signed=yes");
1314         else if (options.push_cert == SEND_PACK_PUSH_CERT_IF_ASKED)
1315                 strvec_push(&args, "--signed=if-asked");
1316         if (options.atomic)
1317                 strvec_push(&args, "--atomic");
1318         if (options.verbosity == 0)
1319                 strvec_push(&args, "--quiet");
1320         else if (options.verbosity > 1)
1321                 strvec_push(&args, "--verbose");
1322         for (i = 0; i < options.push_options.nr; i++)
1323                 strvec_pushf(&args, "--push-option=%s",
1324                              options.push_options.items[i].string);
1325         strvec_push(&args, options.progress ? "--progress" : "--no-progress");
1326         for_each_string_list_item(cas_option, &cas_options)
1327                 strvec_push(&args, cas_option->string);
1328         strvec_push(&args, url.buf);
1329
1330         if (options.force_if_includes)
1331                 strvec_push(&args, "--force-if-includes");
1332
1333         strvec_push(&args, "--stdin");
1334         for (i = 0; i < nr_spec; i++)
1335                 packet_buf_write(&preamble, "%s\n", specs[i]);
1336         packet_buf_flush(&preamble);
1337
1338         memset(&rpc, 0, sizeof(rpc));
1339         rpc.service_name = "git-receive-pack",
1340
1341         err = rpc_service(&rpc, heads, args.v, &preamble, &rpc_result);
1342         if (rpc_result.len)
1343                 write_or_die(1, rpc_result.buf, rpc_result.len);
1344         strbuf_release(&rpc_result);
1345         strbuf_release(&preamble);
1346         strvec_clear(&args);
1347         return err;
1348 }
1349
1350 static int push(int nr_spec, const char **specs)
1351 {
1352         struct discovery *heads = discover_refs("git-receive-pack", 1);
1353         int ret;
1354
1355         if (heads->proto_git)
1356                 ret = push_git(heads, nr_spec, specs);
1357         else
1358                 ret = push_dav(nr_spec, specs);
1359         free_discovery(heads);
1360         return ret;
1361 }
1362
1363 static void parse_push(struct strbuf *buf)
1364 {
1365         struct strvec specs = STRVEC_INIT;
1366         int ret;
1367
1368         do {
1369                 const char *arg;
1370                 if (skip_prefix(buf->buf, "push ", &arg))
1371                         strvec_push(&specs, arg);
1372                 else
1373                         die(_("http transport does not support %s"), buf->buf);
1374
1375                 strbuf_reset(buf);
1376                 if (strbuf_getline_lf(buf, stdin) == EOF)
1377                         goto free_specs;
1378                 if (!*buf->buf)
1379                         break;
1380         } while (1);
1381
1382         ret = push(specs.nr, specs.v);
1383         printf("\n");
1384         fflush(stdout);
1385
1386         if (ret)
1387                 exit(128); /* error already reported */
1388
1389 free_specs:
1390         strvec_clear(&specs);
1391 }
1392
1393 static int stateless_connect(const char *service_name)
1394 {
1395         struct discovery *discover;
1396         struct rpc_state rpc;
1397         struct strbuf buf = STRBUF_INIT;
1398
1399         /*
1400          * Run the info/refs request and see if the server supports protocol
1401          * v2.  If and only if the server supports v2 can we successfully
1402          * establish a stateless connection, otherwise we need to tell the
1403          * client to fallback to using other transport helper functions to
1404          * complete their request.
1405          */
1406         discover = discover_refs(service_name, 0);
1407         if (discover->version != protocol_v2) {
1408                 printf("fallback\n");
1409                 fflush(stdout);
1410                 return -1;
1411         } else {
1412                 /* Stateless Connection established */
1413                 printf("\n");
1414                 fflush(stdout);
1415         }
1416
1417         rpc.service_name = service_name;
1418         rpc.service_url = xstrfmt("%s%s", url.buf, rpc.service_name);
1419         rpc.hdr_content_type = xstrfmt("Content-Type: application/x-%s-request", rpc.service_name);
1420         rpc.hdr_accept = xstrfmt("Accept: application/x-%s-result", rpc.service_name);
1421         if (get_protocol_http_header(discover->version, &buf)) {
1422                 rpc.protocol_header = strbuf_detach(&buf, NULL);
1423         } else {
1424                 rpc.protocol_header = NULL;
1425                 strbuf_release(&buf);
1426         }
1427         rpc.buf = xmalloc(http_post_buffer);
1428         rpc.alloc = http_post_buffer;
1429         rpc.len = 0;
1430         rpc.pos = 0;
1431         rpc.in = 1;
1432         rpc.out = 0;
1433         rpc.any_written = 0;
1434         rpc.gzip_request = 1;
1435         rpc.initial_buffer = 0;
1436         rpc.write_line_lengths = 1;
1437         rpc.flush_read_but_not_sent = 0;
1438
1439         /*
1440          * Dump the capability listing that we got from the server earlier
1441          * during the info/refs request.
1442          */
1443         write_or_die(rpc.in, discover->buf, discover->len);
1444
1445         /* Until we see EOF keep sending POSTs */
1446         while (1) {
1447                 size_t avail;
1448                 enum packet_read_status status;
1449
1450                 if (!rpc_read_from_out(&rpc, PACKET_READ_GENTLE_ON_EOF, &avail,
1451                                        &status))
1452                         BUG("The entire rpc->buf should be larger than LARGE_PACKET_MAX");
1453                 if (status == PACKET_READ_EOF)
1454                         break;
1455                 if (post_rpc(&rpc, 1, status == PACKET_READ_FLUSH))
1456                         /* We would have an err here */
1457                         break;
1458                 /* Reset the buffer for next request */
1459                 rpc.len = 0;
1460         }
1461
1462         free(rpc.service_url);
1463         free(rpc.hdr_content_type);
1464         free(rpc.hdr_accept);
1465         free(rpc.protocol_header);
1466         free(rpc.buf);
1467         strbuf_release(&buf);
1468
1469         return 0;
1470 }
1471
1472 int cmd_main(int argc, const char **argv)
1473 {
1474         struct strbuf buf = STRBUF_INIT;
1475         int nongit;
1476
1477         setup_git_directory_gently(&nongit);
1478         if (argc < 2) {
1479                 error(_("remote-curl: usage: git remote-curl <remote> [<url>]"));
1480                 return 1;
1481         }
1482
1483         options.verbosity = 1;
1484         options.progress = !!isatty(2);
1485         options.thin = 1;
1486         string_list_init(&options.deepen_not, 1);
1487         string_list_init(&options.push_options, 1);
1488
1489         /*
1490          * Just report "remote-curl" here (folding all the various aliases
1491          * ("git-remote-http", "git-remote-https", and etc.) here since they
1492          * are all just copies of the same actual executable.
1493          */
1494         trace2_cmd_name("remote-curl");
1495
1496         remote = remote_get(argv[1]);
1497
1498         if (argc > 2) {
1499                 end_url_with_slash(&url, argv[2]);
1500         } else {
1501                 end_url_with_slash(&url, remote->url[0]);
1502         }
1503
1504         http_init(remote, url.buf, 0);
1505
1506         do {
1507                 const char *arg;
1508
1509                 if (strbuf_getline_lf(&buf, stdin) == EOF) {
1510                         if (ferror(stdin))
1511                                 error(_("remote-curl: error reading command stream from git"));
1512                         return 1;
1513                 }
1514                 if (buf.len == 0)
1515                         break;
1516                 if (starts_with(buf.buf, "fetch ")) {
1517                         if (nongit)
1518                                 die(_("remote-curl: fetch attempted without a local repo"));
1519                         parse_fetch(&buf);
1520
1521                 } else if (!strcmp(buf.buf, "list") || starts_with(buf.buf, "list ")) {
1522                         int for_push = !!strstr(buf.buf + 4, "for-push");
1523                         output_refs(get_refs(for_push));
1524
1525                 } else if (starts_with(buf.buf, "push ")) {
1526                         parse_push(&buf);
1527
1528                 } else if (skip_prefix(buf.buf, "option ", &arg)) {
1529                         char *value = strchr(arg, ' ');
1530                         int result;
1531
1532                         if (value)
1533                                 *value++ = '\0';
1534                         else
1535                                 value = "true";
1536
1537                         result = set_option(arg, value);
1538                         if (!result)
1539                                 printf("ok\n");
1540                         else if (result < 0)
1541                                 printf("error invalid value\n");
1542                         else
1543                                 printf("unsupported\n");
1544                         fflush(stdout);
1545
1546                 } else if (!strcmp(buf.buf, "capabilities")) {
1547                         printf("stateless-connect\n");
1548                         printf("fetch\n");
1549                         printf("option\n");
1550                         printf("push\n");
1551                         printf("check-connectivity\n");
1552                         printf("object-format\n");
1553                         printf("\n");
1554                         fflush(stdout);
1555                 } else if (skip_prefix(buf.buf, "stateless-connect ", &arg)) {
1556                         if (!stateless_connect(arg))
1557                                 break;
1558                 } else {
1559                         error(_("remote-curl: unknown command '%s' from git"), buf.buf);
1560                         return 1;
1561                 }
1562                 strbuf_reset(&buf);
1563         } while (1);
1564
1565         http_cleanup();
1566
1567         return 0;
1568 }