org.eclipse.jgit.transport.TransportHttp.java Source code

Java tutorial

Introduction

Here is the source code for org.eclipse.jgit.transport.TransportHttp.java

Source

/*
 * Copyright (C) 2008-2010, Google Inc.
 * Copyright (C) 2008, Shawn O. Pearce <spearce@spearce.org>
 * Copyright (C) 2013, Matthias Sohn <matthias.sohn@sap.com>
 * Copyright (C) 2017, Thomas Wolf <thomas.wolf@paranor.ch>
 * and other copyright owners as documented in the project's IP log.
 *
 * This program and the accompanying materials are made available
 * under the terms of the Eclipse Distribution License v1.0 which
 * accompanies this distribution, is reproduced below, and is
 * available at http://www.eclipse.org/org/documents/edl-v10.php
 *
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or
 * without modification, are permitted provided that the following
 * conditions are met:
 *
 * - Redistributions of source code must retain the above copyright
 *   notice, this list of conditions and the following disclaimer.
 *
 * - Redistributions in binary form must reproduce the above
 *   copyright notice, this list of conditions and the following
 *   disclaimer in the documentation and/or other materials provided
 *   with the distribution.
 *
 * - Neither the name of the Eclipse Foundation, Inc. nor the
 *   names of its contributors may be used to endorse or promote
 *   products derived from this software without specific prior
 *   written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
 * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
 * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
 * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

package org.eclipse.jgit.transport;

import static java.nio.charset.StandardCharsets.UTF_8;
import static org.eclipse.jgit.lib.Constants.HEAD;
import static org.eclipse.jgit.lib.Constants.INFO_ALTERNATES;
import static org.eclipse.jgit.lib.Constants.INFO_HTTP_ALTERNATES;
import static org.eclipse.jgit.util.HttpSupport.ENCODING_GZIP;
import static org.eclipse.jgit.util.HttpSupport.ENCODING_X_GZIP;
import static org.eclipse.jgit.util.HttpSupport.HDR_ACCEPT;
import static org.eclipse.jgit.util.HttpSupport.HDR_ACCEPT_ENCODING;
import static org.eclipse.jgit.util.HttpSupport.HDR_CONTENT_ENCODING;
import static org.eclipse.jgit.util.HttpSupport.HDR_CONTENT_TYPE;
import static org.eclipse.jgit.util.HttpSupport.HDR_COOKIE;
import static org.eclipse.jgit.util.HttpSupport.HDR_LOCATION;
import static org.eclipse.jgit.util.HttpSupport.HDR_PRAGMA;
import static org.eclipse.jgit.util.HttpSupport.HDR_SET_COOKIE;
import static org.eclipse.jgit.util.HttpSupport.HDR_SET_COOKIE2;
import static org.eclipse.jgit.util.HttpSupport.HDR_USER_AGENT;
import static org.eclipse.jgit.util.HttpSupport.HDR_WWW_AUTHENTICATE;
import static org.eclipse.jgit.util.HttpSupport.METHOD_GET;
import static org.eclipse.jgit.util.HttpSupport.METHOD_POST;

import java.io.BufferedReader;
import java.io.ByteArrayInputStream;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.io.OutputStream;
import java.net.HttpCookie;
import java.net.MalformedURLException;
import java.net.Proxy;
import java.net.ProxySelector;
import java.net.URI;
import java.net.URISyntaxException;
import java.net.URL;
import java.nio.file.InvalidPathException;
import java.nio.file.Path;
import java.nio.file.Paths;
import java.security.cert.CertPathBuilderException;
import java.security.cert.CertPathValidatorException;
import java.security.cert.CertificateException;
import java.text.MessageFormat;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Collection;
import java.util.Collections;
import java.util.EnumSet;
import java.util.HashSet;
import java.util.LinkedHashSet;
import java.util.LinkedList;
import java.util.List;
import java.util.Locale;
import java.util.Map;
import java.util.Set;
import java.util.TreeMap;
import java.util.zip.GZIPInputStream;
import java.util.zip.GZIPOutputStream;

import javax.net.ssl.SSLHandshakeException;

import org.eclipse.jgit.errors.ConfigInvalidException;
import org.eclipse.jgit.errors.NoRemoteRepositoryException;
import org.eclipse.jgit.errors.NotSupportedException;
import org.eclipse.jgit.errors.PackProtocolException;
import org.eclipse.jgit.errors.TransportException;
import org.eclipse.jgit.internal.JGitText;
import org.eclipse.jgit.internal.storage.file.RefDirectory;
import org.eclipse.jgit.internal.transport.http.NetscapeCookieFile;
import org.eclipse.jgit.internal.transport.http.NetscapeCookieFileCache;
import org.eclipse.jgit.lib.Constants;
import org.eclipse.jgit.lib.ObjectId;
import org.eclipse.jgit.lib.ObjectIdRef;
import org.eclipse.jgit.lib.ProgressMonitor;
import org.eclipse.jgit.lib.Ref;
import org.eclipse.jgit.lib.Repository;
import org.eclipse.jgit.lib.StoredConfig;
import org.eclipse.jgit.lib.SymbolicRef;
import org.eclipse.jgit.transport.HttpAuthMethod.Type;
import org.eclipse.jgit.transport.HttpConfig.HttpRedirectMode;
import org.eclipse.jgit.transport.http.HttpConnection;
import org.eclipse.jgit.util.HttpSupport;
import org.eclipse.jgit.util.IO;
import org.eclipse.jgit.util.RawParseUtils;
import org.eclipse.jgit.util.StringUtils;
import org.eclipse.jgit.util.SystemReader;
import org.eclipse.jgit.util.TemporaryBuffer;
import org.eclipse.jgit.util.io.DisabledOutputStream;
import org.eclipse.jgit.util.io.UnionInputStream;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

/**
 * Transport over HTTP and FTP protocols.
 * <p>
 * If the transport is using HTTP and the remote HTTP service is Git-aware
 * (speaks the "smart-http protocol") this client will automatically take
 * advantage of the additional Git-specific HTTP extensions. If the remote
 * service does not support these extensions, the client will degrade to direct
 * file fetching.
 * <p>
 * If the remote (server side) repository does not have the specialized Git
 * support, object files are retrieved directly through standard HTTP GET (or
 * binary FTP GET) requests. This make it easy to serve a Git repository through
 * a standard web host provider that does not offer specific support for Git.
 *
 * @see WalkFetchConnection
 */
public class TransportHttp extends HttpTransport implements WalkTransport, PackTransport {

    private static final Logger LOG = LoggerFactory.getLogger(TransportHttp.class);

    private static final String SVC_UPLOAD_PACK = "git-upload-pack"; //$NON-NLS-1$

    private static final String SVC_RECEIVE_PACK = "git-receive-pack"; //$NON-NLS-1$

    /**
     * Accept-Encoding header in the HTTP request
     * (https://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html).
     *
     * @since 4.6
     */
    public enum AcceptEncoding {
        /**
         * Do not specify an Accept-Encoding header. In most servers this
         * results in the content being transmitted as-is.
         */
        UNSPECIFIED,

        /**
         * Accept gzip content encoding.
         */
        GZIP
    }

    static final TransportProtocol PROTO_HTTP = new TransportProtocol() {
        private final String[] schemeNames = { "http", "https" }; //$NON-NLS-1$ //$NON-NLS-2$

        private final Set<String> schemeSet = Collections
                .unmodifiableSet(new LinkedHashSet<>(Arrays.asList(schemeNames)));

        @Override
        public String getName() {
            return JGitText.get().transportProtoHTTP;
        }

        @Override
        public Set<String> getSchemes() {
            return schemeSet;
        }

        @Override
        public Set<URIishField> getRequiredFields() {
            return Collections.unmodifiableSet(EnumSet.of(URIishField.HOST, URIishField.PATH));
        }

        @Override
        public Set<URIishField> getOptionalFields() {
            return Collections.unmodifiableSet(EnumSet.of(URIishField.USER, URIishField.PASS, URIishField.PORT));
        }

        @Override
        public int getDefaultPort() {
            return 80;
        }

        @Override
        public Transport open(URIish uri, Repository local, String remoteName) throws NotSupportedException {
            return new TransportHttp(local, uri);
        }

        @Override
        public Transport open(URIish uri) throws NotSupportedException {
            return new TransportHttp(uri);
        }
    };

    static final TransportProtocol PROTO_FTP = new TransportProtocol() {
        @Override
        public String getName() {
            return JGitText.get().transportProtoFTP;
        }

        @Override
        public Set<String> getSchemes() {
            return Collections.singleton("ftp"); //$NON-NLS-1$
        }

        @Override
        public Set<URIishField> getRequiredFields() {
            return Collections.unmodifiableSet(EnumSet.of(URIishField.HOST, URIishField.PATH));
        }

        @Override
        public Set<URIishField> getOptionalFields() {
            return Collections.unmodifiableSet(EnumSet.of(URIishField.USER, URIishField.PASS, URIishField.PORT));
        }

        @Override
        public int getDefaultPort() {
            return 21;
        }

        @Override
        public Transport open(URIish uri, Repository local, String remoteName) throws NotSupportedException {
            return new TransportHttp(local, uri);
        }
    };

    /**
     * The current URI we're talking to. The inherited (final) field
     * {@link #uri} stores the original URI; {@code currentUri} may be different
     * after redirects.
     */
    private URIish currentUri;

    private URL baseUrl;

    private URL objectsUrl;

    private final HttpConfig http;

    private final ProxySelector proxySelector;

    private boolean useSmartHttp = true;

    private HttpAuthMethod authMethod = HttpAuthMethod.Type.NONE.method(null);

    private Map<String, String> headers;

    private boolean sslVerify;

    private boolean sslFailure = false;

    /**
     * All stored cookies bound to this repo (independent of the baseUrl)
     */
    private final NetscapeCookieFile cookieFile;

    /**
     * The cookies to be sent with each request to the given {@link #baseUrl}.
     * Filtered view on top of {@link #cookieFile} where only cookies which
     * apply to the current url are left. This set needs to be filtered for
     * expired entries each time prior to sending them.
     */
    private final Set<HttpCookie> relevantCookies;

    TransportHttp(Repository local, URIish uri) throws NotSupportedException {
        super(local, uri);
        setURI(uri);
        http = new HttpConfig(local.getConfig(), uri);
        proxySelector = ProxySelector.getDefault();
        sslVerify = http.isSslVerify();
        cookieFile = getCookieFileFromConfig(http);
        relevantCookies = filterCookies(cookieFile, baseUrl);
    }

    private URL toURL(URIish urish) throws MalformedURLException {
        String uriString = urish.toString();
        if (!uriString.endsWith("/")) { //$NON-NLS-1$
            uriString += '/';
        }
        return new URL(uriString);
    }

    /**
     * Set uri a {@link org.eclipse.jgit.transport.URIish} object.
     *
     * @param uri
     *            a {@link org.eclipse.jgit.transport.URIish} object.
     * @throws org.eclipse.jgit.errors.NotSupportedException
     * @since 4.9
     */
    protected void setURI(URIish uri) throws NotSupportedException {
        try {
            currentUri = uri;
            baseUrl = toURL(uri);
            objectsUrl = new URL(baseUrl, "objects/"); //$NON-NLS-1$
        } catch (MalformedURLException e) {
            throw new NotSupportedException(MessageFormat.format(JGitText.get().invalidURL, uri), e);
        }
    }

    /**
     * Create a minimal HTTP transport with default configuration values.
     *
     * @param uri
     * @throws NotSupportedException
     */
    TransportHttp(URIish uri) throws NotSupportedException {
        super(uri);
        setURI(uri);
        http = new HttpConfig(uri);
        proxySelector = ProxySelector.getDefault();
        sslVerify = http.isSslVerify();
        cookieFile = getCookieFileFromConfig(http);
        relevantCookies = filterCookies(cookieFile, baseUrl);
    }

    /**
     * Toggle whether or not smart HTTP transport should be used.
     * <p>
     * This flag exists primarily to support backwards compatibility testing
     * within a testing framework, there is no need to modify it in most
     * applications.
     *
     * @param on
     *            if {@code true} (default), smart HTTP is enabled.
     */
    public void setUseSmartHttp(boolean on) {
        useSmartHttp = on;
    }

    @SuppressWarnings("resource") // Closed by caller
    private FetchConnection getConnection(HttpConnection c, InputStream in, String service) throws IOException {
        BaseConnection f;
        if (isSmartHttp(c, service)) {
            readSmartHeaders(in, service);
            f = new SmartHttpFetchConnection(in);
        } else {
            // Assume this server doesn't support smart HTTP fetch
            // and fall back on dumb object walking.
            f = newDumbConnection(in);
        }
        f.setPeerUserAgent(c.getHeaderField(HttpSupport.HDR_SERVER));
        return (FetchConnection) f;
    }

    /** {@inheritDoc} */
    @Override
    public FetchConnection openFetch() throws TransportException, NotSupportedException {
        final String service = SVC_UPLOAD_PACK;
        try {
            final HttpConnection c = connect(service);
            try (InputStream in = openInputStream(c)) {
                return getConnection(c, in, service);
            }
        } catch (NotSupportedException | TransportException err) {
            throw err;
        } catch (IOException err) {
            throw new TransportException(uri, JGitText.get().errorReadingInfoRefs, err);
        }
    }

    private WalkFetchConnection newDumbConnection(InputStream in) throws IOException, PackProtocolException {
        HttpObjectDB d = new HttpObjectDB(objectsUrl);
        Map<String, Ref> refs;
        try (BufferedReader br = toBufferedReader(in)) {
            refs = d.readAdvertisedImpl(br);
        }

        if (!refs.containsKey(HEAD)) {
            // If HEAD was not published in the info/refs file (it usually
            // is not there) download HEAD by itself as a loose file and do
            // the resolution by hand.
            //
            HttpConnection conn = httpOpen(METHOD_GET, new URL(baseUrl, HEAD), AcceptEncoding.GZIP);
            int status = HttpSupport.response(conn);
            switch (status) {
            case HttpConnection.HTTP_OK: {
                try (BufferedReader br = toBufferedReader(openInputStream(conn))) {
                    String line = br.readLine();
                    if (line != null && line.startsWith(RefDirectory.SYMREF)) {
                        String target = line.substring(RefDirectory.SYMREF.length());
                        Ref r = refs.get(target);
                        if (r == null)
                            r = new ObjectIdRef.Unpeeled(Ref.Storage.NEW, target, null);
                        r = new SymbolicRef(HEAD, r);
                        refs.put(r.getName(), r);
                    } else if (line != null && ObjectId.isId(line)) {
                        Ref r = new ObjectIdRef.Unpeeled(Ref.Storage.NETWORK, HEAD, ObjectId.fromString(line));
                        refs.put(r.getName(), r);
                    }
                }
                break;
            }

            case HttpConnection.HTTP_NOT_FOUND:
                break;

            default:
                throw new TransportException(uri, MessageFormat.format(JGitText.get().cannotReadHEAD,
                        Integer.valueOf(status), conn.getResponseMessage()));
            }
        }

        WalkFetchConnection wfc = new WalkFetchConnection(this, d);
        wfc.available(refs);
        return wfc;
    }

    private BufferedReader toBufferedReader(InputStream in) {
        return new BufferedReader(new InputStreamReader(in, UTF_8));
    }

    /** {@inheritDoc} */
    @Override
    public PushConnection openPush() throws NotSupportedException, TransportException {
        final String service = SVC_RECEIVE_PACK;
        try {
            final HttpConnection c = connect(service);
            try (InputStream in = openInputStream(c)) {
                if (isSmartHttp(c, service)) {
                    return smartPush(service, c, in);
                } else if (!useSmartHttp) {
                    final String msg = JGitText.get().smartHTTPPushDisabled;
                    throw new NotSupportedException(msg);

                } else {
                    final String msg = JGitText.get().remoteDoesNotSupportSmartHTTPPush;
                    throw new NotSupportedException(msg);
                }
            }
        } catch (NotSupportedException | TransportException err) {
            throw err;
        } catch (IOException err) {
            throw new TransportException(uri, JGitText.get().errorReadingInfoRefs, err);
        }
    }

    private PushConnection smartPush(String service, HttpConnection c, InputStream in)
            throws IOException, TransportException {
        readSmartHeaders(in, service);
        SmartHttpPushConnection p = new SmartHttpPushConnection(in);
        p.setPeerUserAgent(c.getHeaderField(HttpSupport.HDR_SERVER));
        return p;
    }

    /** {@inheritDoc} */
    @Override
    public void close() {
        // No explicit connections are maintained.
    }

    /**
     * Set additional headers on the HTTP connection
     *
     * @param headers
     *            a map of name:values that are to be set as headers on the HTTP
     *            connection
     * @since 3.4
     */
    public void setAdditionalHeaders(Map<String, String> headers) {
        this.headers = headers;
    }

    private NoRemoteRepositoryException createNotFoundException(URIish u, URL url, String msg) {
        String text;
        if (msg != null && !msg.isEmpty()) {
            text = MessageFormat.format(JGitText.get().uriNotFoundWithMessage, url, msg);
        } else {
            text = MessageFormat.format(JGitText.get().uriNotFound, url);
        }
        return new NoRemoteRepositoryException(u, text);
    }

    private HttpConnection connect(String service) throws TransportException, NotSupportedException {
        URL u = getServiceURL(service);
        int authAttempts = 1;
        int redirects = 0;
        Collection<Type> ignoreTypes = null;
        for (;;) {
            try {
                final HttpConnection conn = httpOpen(METHOD_GET, u, AcceptEncoding.GZIP);
                if (useSmartHttp) {
                    String exp = "application/x-" + service + "-advertisement"; //$NON-NLS-1$ //$NON-NLS-2$
                    conn.setRequestProperty(HDR_ACCEPT, exp + ", */*"); //$NON-NLS-1$
                } else {
                    conn.setRequestProperty(HDR_ACCEPT, "*/*"); //$NON-NLS-1$
                }
                final int status = HttpSupport.response(conn);
                processResponseCookies(conn);
                switch (status) {
                case HttpConnection.HTTP_OK:
                    // Check if HttpConnection did some authentication in the
                    // background (e.g Kerberos/SPNEGO).
                    // That may not work for streaming requests and jgit
                    // explicit authentication would be required
                    if (authMethod.getType() == HttpAuthMethod.Type.NONE
                            && conn.getHeaderField(HDR_WWW_AUTHENTICATE) != null)
                        authMethod = HttpAuthMethod.scanResponse(conn, ignoreTypes);
                    return conn;

                case HttpConnection.HTTP_NOT_FOUND:
                    throw createNotFoundException(uri, u, conn.getResponseMessage());

                case HttpConnection.HTTP_UNAUTHORIZED:
                    authMethod = HttpAuthMethod.scanResponse(conn, ignoreTypes);
                    if (authMethod.getType() == HttpAuthMethod.Type.NONE)
                        throw new TransportException(uri,
                                MessageFormat.format(JGitText.get().authenticationNotSupported, uri));
                    CredentialsProvider credentialsProvider = getCredentialsProvider();
                    if (credentialsProvider == null)
                        throw new TransportException(uri, JGitText.get().noCredentialsProvider);
                    if (authAttempts > 1)
                        credentialsProvider.reset(currentUri);
                    if (3 < authAttempts || !authMethod.authorize(currentUri, credentialsProvider)) {
                        throw new TransportException(uri, JGitText.get().notAuthorized);
                    }
                    authAttempts++;
                    continue;

                case HttpConnection.HTTP_FORBIDDEN:
                    throw new TransportException(uri,
                            MessageFormat.format(JGitText.get().serviceNotPermitted, baseUrl, service));

                case HttpConnection.HTTP_MOVED_PERM:
                case HttpConnection.HTTP_MOVED_TEMP:
                case HttpConnection.HTTP_SEE_OTHER:
                case HttpConnection.HTTP_11_MOVED_TEMP:
                    // SEE_OTHER should actually never be sent by a git server,
                    // and in general should occur only on POST requests. But it
                    // doesn't hurt to accept it here as a redirect.
                    if (http.getFollowRedirects() == HttpRedirectMode.FALSE) {
                        throw new TransportException(uri,
                                MessageFormat.format(JGitText.get().redirectsOff, Integer.valueOf(status)));
                    }
                    URIish newUri = redirect(u, conn.getHeaderField(HDR_LOCATION), Constants.INFO_REFS,
                            redirects++);
                    setURI(newUri);
                    u = getServiceURL(service);
                    authAttempts = 1;
                    break;
                default:
                    String err = status + " " + conn.getResponseMessage(); //$NON-NLS-1$
                    throw new TransportException(uri, err);
                }
            } catch (NotSupportedException | TransportException e) {
                throw e;
            } catch (SSLHandshakeException e) {
                handleSslFailure(e);
                continue; // Re-try
            } catch (IOException e) {
                if (authMethod.getType() != HttpAuthMethod.Type.NONE) {
                    if (ignoreTypes == null) {
                        ignoreTypes = new HashSet<>();
                    }

                    ignoreTypes.add(authMethod.getType());

                    // reset auth method & attempts for next authentication type
                    authMethod = HttpAuthMethod.Type.NONE.method(null);
                    authAttempts = 1;

                    continue;
                }

                throw new TransportException(uri, MessageFormat.format(JGitText.get().cannotOpenService, service),
                        e);
            }
        }
    }

    void processResponseCookies(HttpConnection conn) {
        if (cookieFile != null && http.getSaveCookies()) {
            List<HttpCookie> foundCookies = new LinkedList<>();

            List<String> cookieHeaderValues = conn.getHeaderFields(HDR_SET_COOKIE);
            if (!cookieHeaderValues.isEmpty()) {
                foundCookies.addAll(extractCookies(HDR_SET_COOKIE, cookieHeaderValues));
            }
            cookieHeaderValues = conn.getHeaderFields(HDR_SET_COOKIE2);
            if (!cookieHeaderValues.isEmpty()) {
                foundCookies.addAll(extractCookies(HDR_SET_COOKIE2, cookieHeaderValues));
            }
            if (!foundCookies.isEmpty()) {
                try {
                    // update cookie lists with the newly received cookies!
                    Set<HttpCookie> cookies = cookieFile.getCookies(false);
                    cookies.addAll(foundCookies);
                    cookieFile.write(baseUrl);
                    relevantCookies.addAll(foundCookies);
                } catch (IOException | IllegalArgumentException | InterruptedException e) {
                    LOG.warn(MessageFormat.format(JGitText.get().couldNotPersistCookies, cookieFile.getPath()), e);
                }
            }
        }
    }

    private List<HttpCookie> extractCookies(String headerKey, List<String> headerValues) {
        List<HttpCookie> foundCookies = new LinkedList<>();
        for (String headerValue : headerValues) {
            foundCookies.addAll(HttpCookie.parse(headerKey + ':' + headerValue));
        }
        // HttpCookies.parse(...) is only compliant with RFC 2965. Make it RFC
        // 6265 compliant by applying the logic from
        // https://tools.ietf.org/html/rfc6265#section-5.2.3
        for (HttpCookie foundCookie : foundCookies) {
            String domain = foundCookie.getDomain();
            if (domain != null && domain.startsWith(".")) { //$NON-NLS-1$
                foundCookie.setDomain(domain.substring(1));
            }
        }
        return foundCookies;
    }

    private static class CredentialItems {
        CredentialItem.InformationalMessage message;

        /** Trust the server for this git operation */
        CredentialItem.YesNoType now;

        /**
         * Trust the server for all git operations from this repository; may be
         * {@code null} if the transport was created via
         * {@link #TransportHttp(URIish)}.
         */
        CredentialItem.YesNoType forRepo;

        /** Always trust the server from now on. */
        CredentialItem.YesNoType always;

        public CredentialItem[] items() {
            if (forRepo == null) {
                return new CredentialItem[] { message, now, always };
            }
            return new CredentialItem[] { message, now, forRepo, always };
        }
    }

    private void handleSslFailure(Throwable e) throws TransportException {
        if (sslFailure || !trustInsecureSslConnection(e.getCause())) {
            throw new TransportException(uri,
                    MessageFormat.format(JGitText.get().sslFailureExceptionMessage, currentUri.setPass(null)), e);
        }
        sslFailure = true;
    }

    private boolean trustInsecureSslConnection(Throwable cause) {
        if (cause instanceof CertificateException || cause instanceof CertPathBuilderException
                || cause instanceof CertPathValidatorException) {
            // Certificate expired or revoked, PKIX path building not
            // possible, self-signed certificate, host does not match ...
            CredentialsProvider provider = getCredentialsProvider();
            if (provider != null) {
                CredentialItems trust = constructSslTrustItems(cause);
                CredentialItem[] items = trust.items();
                if (provider.supports(items)) {
                    boolean answered = provider.get(uri, items);
                    if (answered) {
                        // Not canceled
                        boolean trustNow = trust.now.getValue();
                        boolean trustLocal = trust.forRepo != null && trust.forRepo.getValue();
                        boolean trustAlways = trust.always.getValue();
                        if (trustNow || trustLocal || trustAlways) {
                            sslVerify = false;
                            if (trustAlways) {
                                updateSslVerifyUser(false);
                            } else if (trustLocal) {
                                updateSslVerify(local.getConfig(), false);
                            }
                            return true;
                        }
                    }
                }
            }
        }
        return false;
    }

    private CredentialItems constructSslTrustItems(Throwable cause) {
        CredentialItems items = new CredentialItems();
        String info = MessageFormat.format(JGitText.get().sslFailureInfo, currentUri.setPass(null));
        String sslMessage = cause.getLocalizedMessage();
        if (sslMessage == null) {
            sslMessage = cause.toString();
        }
        sslMessage = MessageFormat.format(JGitText.get().sslFailureCause, sslMessage);
        items.message = new CredentialItem.InformationalMessage(
                info + '\n' + sslMessage + '\n' + JGitText.get().sslFailureTrustExplanation);
        items.now = new CredentialItem.YesNoType(JGitText.get().sslTrustNow);
        if (local != null) {
            items.forRepo = new CredentialItem.YesNoType(
                    MessageFormat.format(JGitText.get().sslTrustForRepo, local.getDirectory()));
        }
        items.always = new CredentialItem.YesNoType(JGitText.get().sslTrustAlways);
        return items;
    }

    private void updateSslVerify(StoredConfig config, boolean value) {
        // Since git uses the original URI for matching, we must also use the
        // original URI and cannot use the current URI (which might be different
        // after redirects).
        String uriPattern = uri.getScheme() + "://" + uri.getHost(); //$NON-NLS-1$
        int port = uri.getPort();
        if (port > 0) {
            uriPattern += ":" + port; //$NON-NLS-1$
        }
        config.setBoolean(HttpConfig.HTTP, uriPattern, HttpConfig.SSL_VERIFY_KEY, value);
        try {
            config.save();
        } catch (IOException e) {
            LOG.error(JGitText.get().sslVerifyCannotSave, e);
        }
    }

    private void updateSslVerifyUser(boolean value) {
        StoredConfig userConfig = null;
        try {
            userConfig = SystemReader.getInstance().getUserConfig();
            updateSslVerify(userConfig, value);
        } catch (IOException | ConfigInvalidException e) {
            // Log it, but otherwise ignore here.
            LOG.error(e.getMessage(), e);
        }
    }

    private URIish redirect(URL currentUrl, String location, String checkFor, int redirects)
            throws TransportException {
        if (location == null || location.isEmpty()) {
            throw new TransportException(uri,
                    MessageFormat.format(JGitText.get().redirectLocationMissing, baseUrl));
        }
        if (redirects >= http.getMaxRedirects()) {
            throw new TransportException(uri, MessageFormat.format(JGitText.get().redirectLimitExceeded,
                    Integer.valueOf(http.getMaxRedirects()), baseUrl, location));
        }
        try {
            URI redirectTo = new URI(location);
            redirectTo = currentUrl.toURI().resolve(redirectTo);
            String redirected = redirectTo.toASCIIString();
            if (!isValidRedirect(baseUrl, redirected, checkFor)) {
                throw new TransportException(uri,
                        MessageFormat.format(JGitText.get().redirectBlocked, baseUrl, redirected));
            }
            redirected = redirected.substring(0, redirected.indexOf(checkFor));
            URIish result = new URIish(redirected);
            if (LOG.isInfoEnabled()) {
                LOG.info(MessageFormat.format(JGitText.get().redirectHttp, uri.setPass(null),
                        Integer.valueOf(redirects), baseUrl, result));
            }
            return result;
        } catch (URISyntaxException e) {
            throw new TransportException(uri,
                    MessageFormat.format(JGitText.get().invalidRedirectLocation, baseUrl, location), e);
        }
    }

    private boolean isValidRedirect(URL current, String next, String checkFor) {
        // Protocols must be the same, or current is "http" and next "https". We
        // do not follow redirects from https back to http.
        String oldProtocol = current.getProtocol().toLowerCase(Locale.ROOT);
        int schemeEnd = next.indexOf("://"); //$NON-NLS-1$
        if (schemeEnd < 0) {
            return false;
        }
        String newProtocol = next.substring(0, schemeEnd).toLowerCase(Locale.ROOT);
        if (!oldProtocol.equals(newProtocol)) {
            if (!"https".equals(newProtocol)) { //$NON-NLS-1$
                return false;
            }
        }
        // git allows only rewriting the root, i.e., everything before INFO_REFS
        // or the service name
        if (!next.contains(checkFor)) {
            return false;
        }
        // Basically we should test here that whatever follows INFO_REFS is
        // unchanged. But since we re-construct the query part
        // anyway, it doesn't matter.
        return true;
    }

    private URL getServiceURL(String service) throws NotSupportedException {
        try {
            final StringBuilder b = new StringBuilder();
            b.append(baseUrl);

            if (b.charAt(b.length() - 1) != '/') {
                b.append('/');
            }
            b.append(Constants.INFO_REFS);

            if (useSmartHttp) {
                b.append(b.indexOf("?") < 0 ? '?' : '&'); //$NON-NLS-1$
                b.append("service="); //$NON-NLS-1$
                b.append(service);
            }

            return new URL(b.toString());
        } catch (MalformedURLException e) {
            throw new NotSupportedException(MessageFormat.format(JGitText.get().invalidURL, uri), e);
        }
    }

    /**
     * Open an HTTP connection.
     *
     * @param method HTTP request method
     * @param u url of the HTTP connection
     * @param acceptEncoding accept-encoding header option
     * @return the HTTP connection
     * @throws java.io.IOException
     * @since 4.6
     */
    protected HttpConnection httpOpen(String method, URL u, AcceptEncoding acceptEncoding) throws IOException {
        if (method == null || u == null || acceptEncoding == null) {
            throw new NullPointerException();
        }

        final Proxy proxy = HttpSupport.proxyFor(proxySelector, u);
        HttpConnection conn = connectionFactory.create(u, proxy);

        if (!sslVerify && "https".equals(u.getProtocol())) { //$NON-NLS-1$
            HttpSupport.disableSslVerify(conn);
        }

        // We must do our own redirect handling to implement git rules and to
        // handle http->https redirects
        conn.setInstanceFollowRedirects(false);

        conn.setRequestMethod(method);
        conn.setUseCaches(false);
        if (acceptEncoding == AcceptEncoding.GZIP) {
            conn.setRequestProperty(HDR_ACCEPT_ENCODING, ENCODING_GZIP);
        }
        conn.setRequestProperty(HDR_PRAGMA, "no-cache"); //$NON-NLS-1$
        if (UserAgent.get() != null) {
            conn.setRequestProperty(HDR_USER_AGENT, UserAgent.get());
        }
        int timeOut = getTimeout();
        if (timeOut != -1) {
            int effTimeOut = timeOut * 1000;
            conn.setConnectTimeout(effTimeOut);
            conn.setReadTimeout(effTimeOut);
        }
        // set cookie header if necessary
        if (!relevantCookies.isEmpty()) {
            setCookieHeader(conn);
        }

        if (this.headers != null && !this.headers.isEmpty()) {
            for (Map.Entry<String, String> entry : this.headers.entrySet()) {
                conn.setRequestProperty(entry.getKey(), entry.getValue());
            }
        }
        authMethod.configureRequest(conn);
        return conn;
    }

    private void setCookieHeader(HttpConnection conn) {
        StringBuilder cookieHeaderValue = new StringBuilder();
        for (HttpCookie cookie : relevantCookies) {
            if (!cookie.hasExpired()) {
                if (cookieHeaderValue.length() > 0) {
                    cookieHeaderValue.append(';');
                }
                cookieHeaderValue.append(cookie.toString());
            }
        }
        if (cookieHeaderValue.length() > 0) {
            conn.setRequestProperty(HDR_COOKIE, cookieHeaderValue.toString());
        }
    }

    final InputStream openInputStream(HttpConnection conn) throws IOException {
        InputStream input = conn.getInputStream();
        if (isGzipContent(conn))
            input = new GZIPInputStream(input);
        return input;
    }

    IOException wrongContentType(String expType, String actType) {
        final String why = MessageFormat.format(JGitText.get().expectedReceivedContentType, expType, actType);
        return new TransportException(uri, why);
    }

    private static NetscapeCookieFile getCookieFileFromConfig(HttpConfig config) {
        if (!StringUtils.isEmptyOrNull(config.getCookieFile())) {
            try {
                Path cookieFilePath = Paths.get(config.getCookieFile());
                return NetscapeCookieFileCache.getInstance(config).getEntry(cookieFilePath);
            } catch (InvalidPathException e) {
                LOG.warn(MessageFormat.format(JGitText.get().couldNotReadCookieFile, config.getCookieFile()), e);
            }
        }
        return null;
    }

    private static Set<HttpCookie> filterCookies(NetscapeCookieFile cookieFile, URL url) {
        if (cookieFile != null) {
            return filterCookies(cookieFile.getCookies(true), url);
        }
        return Collections.emptySet();
    }

    /**
     *
     * @param allCookies
     *            a list of cookies.
     * @param url
     *            the url for which to filter the list of cookies.
     * @return only the cookies from {@code allCookies} which are relevant (i.e.
     *         are not expired, have a matching domain, have a matching path and
     *         have a matching secure attribute)
     */
    private static Set<HttpCookie> filterCookies(Set<HttpCookie> allCookies, URL url) {
        Set<HttpCookie> filteredCookies = new HashSet<>();
        for (HttpCookie cookie : allCookies) {
            if (cookie.hasExpired()) {
                continue;
            }
            if (!matchesCookieDomain(url.getHost(), cookie.getDomain())) {
                continue;
            }
            if (!matchesCookiePath(url.getPath(), cookie.getPath())) {
                continue;
            }
            if (cookie.getSecure() && !"https".equals(url.getProtocol())) { //$NON-NLS-1$
                continue;
            }
            filteredCookies.add(cookie);
        }
        return filteredCookies;
    }

    /**
     *
     * The utility method to check whether a host name is in a cookie's domain
     * or not. Similar to {@link HttpCookie#domainMatches(String, String)} but
     * implements domain matching rules according to
     * <a href="https://tools.ietf.org/html/rfc6265#section-5.1.3">RFC 6265,
     * section 5.1.3</a> instead of the rules from
     * <a href="https://tools.ietf.org/html/rfc2965#section-3.3">RFC 2965,
     * section 3.3.1</a>.
     * <p>
     * The former rules are also used by libcurl internally.
     * <p>
     * The rules are as follows
     *
     * A string matches another domain string if at least one of the following
     * conditions holds:
     * <ul>
     * <li>The domain string and the string are identical. (Note that both the
     * domain string and the string will have been canonicalized to lower case
     * at this point.)</li>
     * <li>All of the following conditions hold
     * <ul>
     * <li>The domain string is a suffix of the string.</li>
     * <li>The last character of the string that is not included in the domain
     * string is a %x2E (".") character.</li>
     * <li>The string is a host name (i.e., not an IP address).</li>
     * </ul>
     * </li>
     * </ul>
     *
     * @param host
     *            the host to compare against the cookieDomain
     * @param cookieDomain
     *            the domain to compare against
     * @return {@code true} if they domain-match; {@code false} if not
     *
     * @see <a href= "https://tools.ietf.org/html/rfc6265#section-5.1.3">RFC
     *      6265, section 5.1.3 (Domain Matching)</a>
     * @see <a href=
     *      "https://bugs.java.com/bugdatabase/view_bug.do?bug_id=8206092">JDK-8206092
     *      : HttpCookie.domainMatches() does not match to sub-sub-domain</a>
     */
    static boolean matchesCookieDomain(String host, String cookieDomain) {
        cookieDomain = cookieDomain.toLowerCase(Locale.ROOT);
        host = host.toLowerCase(Locale.ROOT);
        if (host.equals(cookieDomain)) {
            return true;
        }
        if (!host.endsWith(cookieDomain)) {
            return false;
        }
        return host.charAt(host.length() - cookieDomain.length() - 1) == '.';
    }

    /**
     * The utility method to check whether a path is matching a cookie path
     * domain or not. The rules are defined by
     * <a href="https://tools.ietf.org/html/rfc6265#section-5.1.4">RFC 6265,
     * section 5.1.4</a>:
     *
     * A request-path path-matches a given cookie-path if at least one of the
     * following conditions holds:
     * <ul>
     * <li>The cookie-path and the request-path are identical.</li>
     * <li>The cookie-path is a prefix of the request-path, and the last
     * character of the cookie-path is %x2F ("/").</li>
     * <li>The cookie-path is a prefix of the request-path, and the first
     * character of the request-path that is not included in the cookie- path is
     * a %x2F ("/") character.</li>
     * </ul>
     * @param path
     *            the path to check
     * @param cookiePath
     *            the cookie's path
     *
     * @return {@code true} if they path-match; {@code false} if not
     */
    static boolean matchesCookiePath(String path, String cookiePath) {
        if (cookiePath.equals(path)) {
            return true;
        }
        if (!cookiePath.endsWith("/")) { //$NON-NLS-1$
            cookiePath += "/"; //$NON-NLS-1$
        }
        return path.startsWith(cookiePath);
    }

    private boolean isSmartHttp(HttpConnection c, String service) {
        final String expType = "application/x-" + service + "-advertisement"; //$NON-NLS-1$ //$NON-NLS-2$
        final String actType = c.getContentType();
        return expType.equals(actType);
    }

    private boolean isGzipContent(HttpConnection c) {
        return ENCODING_GZIP.equals(c.getHeaderField(HDR_CONTENT_ENCODING))
                || ENCODING_X_GZIP.equals(c.getHeaderField(HDR_CONTENT_ENCODING));
    }

    private void readSmartHeaders(InputStream in, String service) throws IOException {
        // A smart reply will have a '#' after the first 4 bytes, but
        // a dumb reply cannot contain a '#' until after byte 41. Do a
        // quick check to make sure its a smart reply before we parse
        // as a pkt-line stream.
        //
        final byte[] magic = new byte[5];
        IO.readFully(in, magic, 0, magic.length);
        if (magic[4] != '#') {
            throw new TransportException(uri,
                    MessageFormat.format(JGitText.get().expectedPktLineWithService, RawParseUtils.decode(magic)));
        }

        final PacketLineIn pckIn = new PacketLineIn(new UnionInputStream(new ByteArrayInputStream(magic), in));
        final String exp = "# service=" + service; //$NON-NLS-1$
        final String act = pckIn.readString();
        if (!exp.equals(act)) {
            throw new TransportException(uri, MessageFormat.format(JGitText.get().expectedGot, exp, act));
        }

        while (!PacketLineIn.isEnd(pckIn.readString())) {
            // for now, ignore the remaining header lines
        }
    }

    class HttpObjectDB extends WalkRemoteObjectDatabase {
        private final URL httpObjectsUrl;

        HttpObjectDB(URL b) {
            httpObjectsUrl = b;
        }

        @Override
        URIish getURI() {
            return new URIish(httpObjectsUrl);
        }

        @Override
        Collection<WalkRemoteObjectDatabase> getAlternates() throws IOException {
            try {
                return readAlternates(INFO_HTTP_ALTERNATES);
            } catch (FileNotFoundException err) {
                // Fall through.
            }

            try {
                return readAlternates(INFO_ALTERNATES);
            } catch (FileNotFoundException err) {
                // Fall through.
            }

            return null;
        }

        @Override
        WalkRemoteObjectDatabase openAlternate(String location) throws IOException {
            return new HttpObjectDB(new URL(httpObjectsUrl, location));
        }

        @Override
        BufferedReader openReader(String path) throws IOException {
            // Line oriented readable content is likely to compress well.
            // Request gzip encoding.
            InputStream is = open(path, AcceptEncoding.GZIP).in;
            return new BufferedReader(new InputStreamReader(is, UTF_8));
        }

        @Override
        Collection<String> getPackNames() throws IOException {
            final Collection<String> packs = new ArrayList<>();
            try (BufferedReader br = openReader(INFO_PACKS)) {
                for (;;) {
                    final String s = br.readLine();
                    if (s == null || s.length() == 0)
                        break;
                    if (!s.startsWith("P pack-") || !s.endsWith(".pack")) //$NON-NLS-1$ //$NON-NLS-2$
                        throw invalidAdvertisement(s);
                    packs.add(s.substring(2));
                }
                return packs;
            } catch (FileNotFoundException err) {
                return packs;
            }
        }

        @Override
        FileStream open(String path) throws IOException {
            return open(path, AcceptEncoding.UNSPECIFIED);
        }

        FileStream open(String path, AcceptEncoding acceptEncoding) throws IOException {
            final URL base = httpObjectsUrl;
            final URL u = new URL(base, path);
            final HttpConnection c = httpOpen(METHOD_GET, u, acceptEncoding);
            switch (HttpSupport.response(c)) {
            case HttpConnection.HTTP_OK:
                final InputStream in = openInputStream(c);
                // If content is being gzipped and then transferred, the content
                // length in the header is the zipped content length, not the
                // actual content length.
                if (!isGzipContent(c)) {
                    final int len = c.getContentLength();
                    return new FileStream(in, len);
                }
                return new FileStream(in);
            case HttpConnection.HTTP_NOT_FOUND:
                throw new FileNotFoundException(u.toString());
            default:
                throw new IOException(u.toString() + ": " //$NON-NLS-1$
                        + HttpSupport.response(c) + " " //$NON-NLS-1$
                        + c.getResponseMessage());
            }
        }

        Map<String, Ref> readAdvertisedImpl(final BufferedReader br) throws IOException, PackProtocolException {
            final TreeMap<String, Ref> avail = new TreeMap<>();
            for (;;) {
                String line = br.readLine();
                if (line == null)
                    break;

                final int tab = line.indexOf('\t');
                if (tab < 0)
                    throw invalidAdvertisement(line);

                String name;
                final ObjectId id;

                name = line.substring(tab + 1);
                id = ObjectId.fromString(line.substring(0, tab));
                if (name.endsWith("^{}")) { //$NON-NLS-1$
                    name = name.substring(0, name.length() - 3);
                    final Ref prior = avail.get(name);
                    if (prior == null)
                        throw outOfOrderAdvertisement(name);

                    if (prior.getPeeledObjectId() != null)
                        throw duplicateAdvertisement(name + "^{}"); //$NON-NLS-1$

                    avail.put(name, new ObjectIdRef.PeeledTag(Ref.Storage.NETWORK, name, prior.getObjectId(), id));
                } else {
                    Ref prior = avail.put(name, new ObjectIdRef.PeeledNonTag(Ref.Storage.NETWORK, name, id));
                    if (prior != null)
                        throw duplicateAdvertisement(name);
                }
            }
            return avail;
        }

        private PackProtocolException outOfOrderAdvertisement(String n) {
            return new PackProtocolException(MessageFormat.format(JGitText.get().advertisementOfCameBefore, n, n));
        }

        private PackProtocolException invalidAdvertisement(String n) {
            return new PackProtocolException(MessageFormat.format(JGitText.get().invalidAdvertisementOf, n));
        }

        private PackProtocolException duplicateAdvertisement(String n) {
            return new PackProtocolException(MessageFormat.format(JGitText.get().duplicateAdvertisementsOf, n));
        }

        @Override
        void close() {
            // We do not maintain persistent connections.
        }
    }

    class SmartHttpFetchConnection extends BasePackFetchConnection {
        private MultiRequestService svc;

        SmartHttpFetchConnection(InputStream advertisement) throws TransportException {
            super(TransportHttp.this);
            statelessRPC = true;

            init(advertisement, DisabledOutputStream.INSTANCE);
            outNeedsEnd = false;
            readAdvertisedRefs();
        }

        @Override
        protected void doFetch(final ProgressMonitor monitor, final Collection<Ref> want, final Set<ObjectId> have,
                final OutputStream outputStream) throws TransportException {
            try {
                svc = new MultiRequestService(SVC_UPLOAD_PACK);
                init(svc.getInputStream(), svc.getOutputStream());
                super.doFetch(monitor, want, have, outputStream);
            } finally {
                svc = null;
            }
        }

        @Override
        protected void onReceivePack() {
            svc.finalRequest = true;
        }
    }

    class SmartHttpPushConnection extends BasePackPushConnection {
        SmartHttpPushConnection(InputStream advertisement) throws TransportException {
            super(TransportHttp.this);
            statelessRPC = true;

            init(advertisement, DisabledOutputStream.INSTANCE);
            outNeedsEnd = false;
            readAdvertisedRefs();
        }

        @Override
        protected void doPush(final ProgressMonitor monitor, final Map<String, RemoteRefUpdate> refUpdates,
                OutputStream outputStream) throws TransportException {
            final Service svc = new MultiRequestService(SVC_RECEIVE_PACK);
            init(svc.getInputStream(), svc.getOutputStream());
            super.doPush(monitor, refUpdates, outputStream);
        }
    }

    /** Basic service for sending and receiving HTTP requests. */
    abstract class Service {
        protected final String serviceName;

        protected final String requestType;

        protected final String responseType;

        protected HttpConnection conn;

        protected HttpOutputStream out;

        protected final HttpExecuteStream execute;

        final UnionInputStream in;

        Service(String serviceName) {
            this.serviceName = serviceName;
            this.requestType = "application/x-" + serviceName + "-request"; //$NON-NLS-1$ //$NON-NLS-2$
            this.responseType = "application/x-" + serviceName + "-result"; //$NON-NLS-1$ //$NON-NLS-2$

            this.out = new HttpOutputStream();
            this.execute = new HttpExecuteStream();
            this.in = new UnionInputStream(execute);
        }

        void openStream() throws IOException {
            conn = httpOpen(METHOD_POST, new URL(baseUrl, serviceName), AcceptEncoding.GZIP);
            conn.setInstanceFollowRedirects(false);
            conn.setDoOutput(true);
            conn.setRequestProperty(HDR_CONTENT_TYPE, requestType);
            conn.setRequestProperty(HDR_ACCEPT, responseType);
        }

        void sendRequest() throws IOException {
            // Try to compress the content, but only if that is smaller.
            TemporaryBuffer buf = new TemporaryBuffer.Heap(http.getPostBuffer());
            try (GZIPOutputStream gzip = new GZIPOutputStream(buf)) {
                out.writeTo(gzip, null);
                if (out.length() < buf.length())
                    buf = out;
            } catch (IOException err) {
                // Most likely caused by overflowing the buffer, meaning
                // its larger if it were compressed. Don't compress.
                buf = out;
            }

            HttpAuthMethod authenticator = null;
            Collection<Type> ignoreTypes = EnumSet.noneOf(Type.class);
            // Counts number of repeated authentication attempts using the same
            // authentication scheme
            int authAttempts = 1;
            int redirects = 0;
            for (;;) {
                try {
                    // The very first time we will try with the authentication
                    // method used on the initial GET request. This is a hint
                    // only; it may fail. If so, we'll then re-try with proper
                    // 401 handling, going through the available authentication
                    // schemes.
                    openStream();
                    if (buf != out) {
                        conn.setRequestProperty(HDR_CONTENT_ENCODING, ENCODING_GZIP);
                    }
                    conn.setFixedLengthStreamingMode((int) buf.length());
                    try (OutputStream httpOut = conn.getOutputStream()) {
                        buf.writeTo(httpOut, null);
                    }

                    final int status = HttpSupport.response(conn);
                    switch (status) {
                    case HttpConnection.HTTP_OK:
                        // We're done.
                        return;

                    case HttpConnection.HTTP_NOT_FOUND:
                        throw createNotFoundException(uri, conn.getURL(), conn.getResponseMessage());

                    case HttpConnection.HTTP_FORBIDDEN:
                        throw new TransportException(uri,
                                MessageFormat.format(JGitText.get().serviceNotPermitted, baseUrl, serviceName));

                    case HttpConnection.HTTP_MOVED_PERM:
                    case HttpConnection.HTTP_MOVED_TEMP:
                    case HttpConnection.HTTP_11_MOVED_TEMP:
                        // SEE_OTHER after a POST doesn't make sense for a git
                        // server, so we don't handle it here and thus we'll
                        // report an error in openResponse() later on.
                        if (http.getFollowRedirects() != HttpRedirectMode.TRUE) {
                            // Let openResponse() issue an error
                            return;
                        }
                        currentUri = redirect(conn.getURL(), conn.getHeaderField(HDR_LOCATION), '/' + serviceName,
                                redirects++);
                        try {
                            baseUrl = toURL(currentUri);
                        } catch (MalformedURLException e) {
                            throw new TransportException(uri, MessageFormat
                                    .format(JGitText.get().invalidRedirectLocation, baseUrl, currentUri), e);
                        }
                        continue;

                    case HttpConnection.HTTP_UNAUTHORIZED:
                        HttpAuthMethod nextMethod = HttpAuthMethod.scanResponse(conn, ignoreTypes);
                        switch (nextMethod.getType()) {
                        case NONE:
                            throw new TransportException(uri,
                                    MessageFormat.format(JGitText.get().authenticationNotSupported, conn.getURL()));
                        case NEGOTIATE:
                            // RFC 4559 states "When using the SPNEGO [...] with
                            // [...] POST, the authentication should be complete
                            // [...] before sending the user data." So in theory
                            // the initial GET should have been authenticated
                            // already. (Unless there was a redirect?)
                            //
                            // We try this only once:
                            ignoreTypes.add(HttpAuthMethod.Type.NEGOTIATE);
                            if (authenticator != null) {
                                ignoreTypes.add(authenticator.getType());
                            }
                            authAttempts = 1;
                            // We only do the Kerberos part of SPNEGO, which
                            // requires only one round.
                            break;
                        default:
                            // DIGEST or BASIC. Let's be sure we ignore
                            // NEGOTIATE; if it was available, we have tried it
                            // before.
                            ignoreTypes.add(HttpAuthMethod.Type.NEGOTIATE);
                            if (authenticator == null || authenticator.getType() != nextMethod.getType()) {
                                if (authenticator != null) {
                                    ignoreTypes.add(authenticator.getType());
                                }
                                authAttempts = 1;
                            }
                            break;
                        }
                        authMethod = nextMethod;
                        authenticator = nextMethod;
                        CredentialsProvider credentialsProvider = getCredentialsProvider();
                        if (credentialsProvider == null) {
                            throw new TransportException(uri, JGitText.get().noCredentialsProvider);
                        }
                        if (authAttempts > 1) {
                            credentialsProvider.reset(currentUri);
                        }
                        if (3 < authAttempts || !authMethod.authorize(currentUri, credentialsProvider)) {
                            throw new TransportException(uri, JGitText.get().notAuthorized);
                        }
                        authAttempts++;
                        continue;

                    default:
                        // Just return here; openResponse() will report an
                        // appropriate error.
                        return;
                    }
                } catch (SSLHandshakeException e) {
                    handleSslFailure(e);
                    continue; // Re-try
                } catch (IOException e) {
                    if (authenticator == null || authMethod.getType() != HttpAuthMethod.Type.NONE) {
                        // Can happen for instance if the server advertises
                        // Negotiate, but the client isn't configured for
                        // Kerberos. The first time (authenticator == null) we
                        // must re-try even if the authMethod was NONE: this may
                        // occur if the server advertised NTLM on the GET
                        // and the HttpConnection managed to successfully
                        // authenticate under the hood with NTLM. We might not
                        // have picked this up on the GET's 200 response.
                        if (authMethod.getType() != HttpAuthMethod.Type.NONE) {
                            ignoreTypes.add(authMethod.getType());
                        }
                        // Start over with the remaining available methods.
                        authMethod = HttpAuthMethod.Type.NONE.method(null);
                        authenticator = authMethod;
                        authAttempts = 1;
                        continue;
                    }
                    throw e;
                }
            }
        }

        void openResponse() throws IOException {
            final int status = HttpSupport.response(conn);
            if (status != HttpConnection.HTTP_OK) {
                throw new TransportException(uri, status + " " //$NON-NLS-1$
                        + conn.getResponseMessage());
            }

            final String contentType = conn.getContentType();
            if (!responseType.equals(contentType)) {
                conn.getInputStream().close();
                throw wrongContentType(responseType, contentType);
            }
        }

        HttpOutputStream getOutputStream() {
            return out;
        }

        InputStream getInputStream() {
            return in;
        }

        abstract void execute() throws IOException;

        class HttpExecuteStream extends InputStream {
            @Override
            public int read() throws IOException {
                execute();
                return -1;
            }

            @Override
            public int read(byte[] b, int off, int len) throws IOException {
                execute();
                return -1;
            }

            @Override
            public long skip(long n) throws IOException {
                execute();
                return 0;
            }
        }

        class HttpOutputStream extends TemporaryBuffer {
            HttpOutputStream() {
                super(http.getPostBuffer());
            }

            @Override
            protected OutputStream overflow() throws IOException {
                openStream();
                conn.setChunkedStreamingMode(0);
                return conn.getOutputStream();
            }
        }
    }

    /**
     * State required to speak multiple HTTP requests with the remote.
     * <p>
     * A service wrapper provides a normal looking InputStream and OutputStream
     * pair which are connected via HTTP to the named remote service. Writing to
     * the OutputStream is buffered until either the buffer overflows, or
     * reading from the InputStream occurs. If overflow occurs HTTP/1.1 and its
     * chunked transfer encoding is used to stream the request data to the
     * remote service. If the entire request fits in the memory buffer, the
     * older HTTP/1.0 standard and a fixed content length is used instead.
     * <p>
     * It is an error to attempt to read without there being outstanding data
     * ready for transmission on the OutputStream.
     * <p>
     * No state is preserved between write-read request pairs. The caller is
     * responsible for replaying state vector information as part of the request
     * data written to the OutputStream. Any session HTTP cookies may or may not
     * be preserved between requests, it is left up to the JVM's implementation
     * of the HTTP client.
     */
    class MultiRequestService extends Service {
        boolean finalRequest;

        MultiRequestService(String serviceName) {
            super(serviceName);
        }

        /** Keep opening send-receive pairs to the given URI. */
        @Override
        void execute() throws IOException {
            out.close();

            if (conn == null) {
                if (out.length() == 0) {
                    // Request output hasn't started yet, but more data is being
                    // requested. If there is no request data buffered and the
                    // final request was already sent, do nothing to ensure the
                    // caller is shown EOF on the InputStream; otherwise an
                    // programming error has occurred within this module.
                    if (finalRequest)
                        return;
                    throw new TransportException(uri,
                            JGitText.get().startingReadStageWithoutWrittenRequestDataPendingIsNotSupported);
                }

                sendRequest();
            }

            out.reset();

            openResponse();

            in.add(openInputStream(conn));
            if (!finalRequest)
                in.add(execute);
            conn = null;
        }
    }

    /** Service for maintaining a single long-poll connection. */
    class LongPollService extends Service {
        /**
         * @param serviceName
         */
        LongPollService(String serviceName) {
            super(serviceName);
        }

        /** Only open one send-receive request. */
        @Override
        void execute() throws IOException {
            out.close();
            if (conn == null)
                sendRequest();
            openResponse();
            in.add(openInputStream(conn));
        }
    }
}