3 const char *prefix_path(const char *prefix
, int len
, const char *path
)
5 const char *orig
= path
;
31 /* Remove last component of the prefix */
34 die("'%s' is outside repository", orig
);
36 } while (len
&& prefix
[len
-1] != '/');
40 int speclen
= strlen(path
);
41 char *n
= xmalloc(speclen
+ len
+ 1);
43 memcpy(n
, prefix
, len
);
44 memcpy(n
+ len
, path
, speclen
+1);
51 * Unlike prefix_path, this should be used if the named file does
52 * not have to interact with index entry; i.e. name of a random file
55 const char *prefix_filename(const char *pfx
, int pfx_len
, const char *arg
)
57 static char path
[PATH_MAX
];
58 if (!pfx
|| !*pfx
|| arg
[0] == '/')
60 memcpy(path
, pfx
, pfx_len
);
61 strcpy(path
+ pfx_len
, arg
);
66 * Verify a filename that we got as an argument for a pathspec
67 * entry. Note that a filename that begins with "-" never verifies
68 * as true, because even if such a filename were to exist, we want
69 * it to be preceded by the "--" marker (or we want the user to
70 * use a format like "./-filename")
72 void verify_filename(const char *prefix
, const char *arg
)
78 die("bad flag '%s' used after filename", arg
);
79 name
= prefix
? prefix_filename(prefix
, strlen(prefix
), arg
) : arg
;
80 if (!lstat(name
, &st
))
83 die("ambiguous argument '%s': unknown revision or path not in the working tree.\n"
84 "Use '--' to separate paths from revisions", arg
);
85 die("'%s': %s", arg
, strerror(errno
));
89 * Opposite of the above: the command line did not have -- marker
90 * and we parsed the arg as a refname. It should not be interpretable
93 void verify_non_filename(const char *prefix
, const char *arg
)
100 name
= prefix
? prefix_filename(prefix
, strlen(prefix
), arg
) : arg
;
101 if (!lstat(name
, &st
))
102 die("ambiguous argument '%s': both revision and filename\n"
103 "Use '--' to separate filenames from revisions", arg
);
105 die("'%s': %s", arg
, strerror(errno
));
108 const char **get_pathspec(const char *prefix
, const char **pathspec
)
110 const char *entry
= *pathspec
;
114 if (!prefix
&& !entry
)
118 static const char *spec
[2];
124 /* Otherwise we have to re-write the entries.. */
126 prefixlen
= prefix
? strlen(prefix
) : 0;
128 *p
= prefix_path(prefix
, prefixlen
, entry
);
129 } while ((entry
= *++p
) != NULL
);
130 return (const char **) pathspec
;
134 * Test if it looks like we're at the top level git directory.
137 * - either a .git/objects/ directory _or_ the proper
138 * GIT_OBJECT_DIRECTORY environment variable
139 * - a refs/ directory under ".git"
140 * - either a HEAD symlink or a HEAD file that is formatted as
143 static int is_toplevel_directory(void)
145 if (access(".git/refs/", X_OK
) ||
146 access(getenv(DB_ENVIRONMENT
) ?
147 getenv(DB_ENVIRONMENT
) : ".git/objects/", X_OK
) ||
148 validate_symref(".git/HEAD"))
153 const char *setup_git_directory_gently(int *nongit_ok
)
155 static char cwd
[PATH_MAX
+1];
159 * If GIT_DIR is set explicitly, we're not going
160 * to do any discovery, but we still do repository
163 if (getenv(GIT_DIR_ENVIRONMENT
)) {
165 int len
= strlen(getenv(GIT_DIR_ENVIRONMENT
));
166 if (sizeof(path
) - 40 < len
)
167 die("'$%s' too big", GIT_DIR_ENVIRONMENT
);
168 memcpy(path
, getenv(GIT_DIR_ENVIRONMENT
), len
);
170 strcpy(path
+ len
, "/refs");
171 if (access(path
, X_OK
))
172 goto bad_dir_environ
;
173 strcpy(path
+ len
, "/HEAD");
174 if (validate_symref(path
))
175 goto bad_dir_environ
;
176 if (getenv(DB_ENVIRONMENT
)) {
177 if (access(getenv(DB_ENVIRONMENT
), X_OK
))
178 goto bad_dir_environ
;
181 strcpy(path
+ len
, "/objects");
182 if (access(path
, X_OK
))
183 goto bad_dir_environ
;
192 die("Not a git repository: '%s'", path
);
195 if (!getcwd(cwd
, sizeof(cwd
)) || cwd
[0] != '/')
196 die("Unable to read current working directory");
198 offset
= len
= strlen(cwd
);
200 if (is_toplevel_directory())
207 die("Cannot come back to cwd");
211 die("Not a git repository");
213 } while (cwd
[--offset
] != '/');
219 /* Make "offset" point to past the '/', and add a '/' at the end */
226 int git_config_perm(const char *var
, const char *value
)
229 if (!strcmp(value
, "umask"))
231 if (!strcmp(value
, "group"))
233 if (!strcmp(value
, "all") ||
234 !strcmp(value
, "world") ||
235 !strcmp(value
, "everybody"))
236 return PERM_EVERYBODY
;
238 return git_config_bool(var
, value
);
241 int check_repository_format_version(const char *var
, const char *value
)
243 if (strcmp(var
, "core.repositoryformatversion") == 0)
244 repository_format_version
= git_config_int(var
, value
);
245 else if (strcmp(var
, "core.sharedrepository") == 0)
246 shared_repository
= git_config_perm(var
, value
);
247 else if (strcmp(var
, "receive.denynonfastforwards") == 0)
248 deny_non_fast_forwards
= git_config_bool(var
, value
);
252 int check_repository_format(void)
254 git_config(check_repository_format_version
);
255 if (GIT_REPO_VERSION
< repository_format_version
)
256 die ("Expected git repo version <= %d, found %d",
257 GIT_REPO_VERSION
, repository_format_version
);
261 const char *setup_git_directory(void)
263 const char *retval
= setup_git_directory_gently(NULL
);
264 check_repository_format();