2 * I'm tired of doing "vsnprintf()" etc just to open a
3 * file, so here's a "return static buffer with printf"
6 * It's obviously not thread-safe. Sue me. But it's quite
7 * useful for doing things like
9 * f = open(mkpath("%s/%s.git", base, name), O_RDONLY);
11 * which is what it's designed for.
15 static char bad_path
[] = "/bad-path/";
17 static char *get_pathname(void)
19 static char pathname_array
[4][PATH_MAX
];
21 return pathname_array
[3 & ++index
];
24 static char *cleanup_path(char *path
)
27 if (!memcmp(path
, "./", 2)) {
35 char *mkpath(const char *fmt
, ...)
39 char *pathname
= get_pathname();
42 len
= vsnprintf(pathname
, PATH_MAX
, fmt
, args
);
46 return cleanup_path(pathname
);
49 char *git_path(const char *fmt
, ...)
51 const char *git_dir
= get_git_dir();
52 char *pathname
= get_pathname();
56 len
= strlen(git_dir
);
57 if (len
> PATH_MAX
-100)
59 memcpy(pathname
, git_dir
, len
);
60 if (len
&& git_dir
[len
-1] != '/')
61 pathname
[len
++] = '/';
63 len
+= vsnprintf(pathname
+ len
, PATH_MAX
- len
, fmt
, args
);
67 return cleanup_path(pathname
);
71 /* git_mkstemp() - create tmp file honoring TMPDIR variable */
72 int git_mkstemp(char *path
, size_t len
, const char *template)
77 tmp
= getenv("TMPDIR");
80 n
= snprintf(path
, len
, "%s/%s", tmp
, template);
89 int validate_headref(const char *path
)
92 char *buf
, buffer
[256];
93 unsigned char sha1
[20];
96 if (lstat(path
, &st
) < 0)
99 /* Make sure it is a "refs/.." symlink */
100 if (S_ISLNK(st
.st_mode
)) {
101 len
= readlink(path
, buffer
, sizeof(buffer
)-1);
102 if (len
>= 5 && !memcmp("refs/", buffer
, 5))
108 * Anything else, just open it and try to see if it is a symbolic ref.
110 fd
= open(path
, O_RDONLY
);
113 len
= read_in_full(fd
, buffer
, sizeof(buffer
)-1);
117 * Is it a symbolic ref?
121 if (!memcmp("ref:", buffer
, 4)) {
124 while (len
&& isspace(*buf
))
126 if (len
>= 5 && !memcmp("refs/", buf
, 5))
131 * Is this a detached HEAD?
133 if (!get_sha1_hex(buffer
, sha1
))
139 static char *user_path(char *buf
, char *path
, int sz
)
145 if (!path
|| path
[0] != '~')
148 slash
= strchr(path
, '/');
149 if (path
[0] == '/' || !path
[0]) {
150 pw
= getpwuid(getuid());
161 if (!pw
|| !pw
->pw_dir
|| sz
<= strlen(pw
->pw_dir
))
163 baselen
= strlen(pw
->pw_dir
);
164 memcpy(buf
, pw
->pw_dir
, baselen
);
165 while ((1 < baselen
) && (buf
[baselen
-1] == '/')) {
169 if (slash
&& slash
[1]) {
171 if (sz
<= baselen
+ len
)
173 memcpy(buf
+ baselen
, slash
, len
+ 1);
179 * First, one directory to try is determined by the following algorithm.
181 * (0) If "strict" is given, the path is used as given and no DWIM is
183 * (1) "~/path" to mean path under the running user's home directory;
184 * (2) "~user/path" to mean path under named user's home directory;
185 * (3) "relative/path" to mean cwd relative directory; or
186 * (4) "/absolute/path" to mean absolute directory.
188 * Unless "strict" is given, we try access() for existence of "%s.git/.git",
189 * "%s/.git", "%s.git", "%s" in this order. The first one that exists is
192 * Second, we try chdir() to that. Upon failure, we return NULL.
194 * Then, we try if the current directory is a valid git repository.
195 * Upon failure, we return NULL.
197 * If all goes well, we return the directory we used to chdir() (but
198 * before ~user is expanded), avoiding getcwd() resolving symbolic
199 * links. User relative paths are also returned as they are given,
200 * except DWIM suffixing.
202 char *enter_repo(char *path
, int strict
)
204 static char used_path
[PATH_MAX
];
205 static char validated_path
[PATH_MAX
];
211 static const char *suffix
[] = {
212 ".git/.git", "/.git", ".git", "", NULL
,
214 int len
= strlen(path
);
216 while ((1 < len
) && (path
[len
-1] == '/')) {
222 if (path
[0] == '~') {
223 if (!user_path(used_path
, path
, PATH_MAX
))
225 strcpy(validated_path
, path
);
228 else if (PATH_MAX
- 10 < len
)
231 path
= strcpy(used_path
, path
);
232 strcpy(validated_path
, path
);
235 for (i
= 0; suffix
[i
]; i
++) {
236 strcpy(path
+ len
, suffix
[i
]);
237 if (!access(path
, F_OK
)) {
238 strcat(validated_path
, suffix
[i
]);
242 if (!suffix
[i
] || chdir(path
))
244 path
= validated_path
;
246 else if (chdir(path
))
249 if (access("objects", X_OK
) == 0 && access("refs", X_OK
) == 0 &&
250 validate_headref("HEAD") == 0) {
251 setenv(GIT_DIR_ENVIRONMENT
, ".", 1);
252 check_repository_format();
259 int adjust_shared_perm(const char *path
)
264 if (!shared_repository
)
266 if (lstat(path
, &st
) < 0)
270 if (shared_repository
) {
271 int tweak
= shared_repository
;
272 if (!(mode
& S_IWUSR
))
274 mode
= (mode
& ~0777) | tweak
;
276 /* Preserve old PERM_UMASK behaviour */
282 mode
|= FORCE_DIR_SET_GID
;
284 /* Copy read bits to execute bits */
285 mode
|= (shared_repository
& 0444) >> 2;
288 if ((mode
& st
.st_mode
) != mode
&& chmod(path
, mode
) < 0)
293 /* We allow "recursive" symbolic links. Only within reason, though. */
296 const char *make_absolute_path(const char *path
)
298 static char bufs
[2][PATH_MAX
+ 1], *buf
= bufs
[0], *next_buf
= bufs
[1];
300 int buf_index
= 1, len
;
302 int depth
= MAXDEPTH
;
303 char *last_elem
= NULL
;
306 if (strlcpy(buf
, path
, PATH_MAX
) >= PATH_MAX
)
307 die ("Too long path: %.*s", 60, path
);
310 if (stat(buf
, &st
) || !S_ISDIR(st
.st_mode
)) {
311 char *last_slash
= strrchr(buf
, '/');
314 last_elem
= xstrdup(last_slash
+ 1);
316 last_elem
= xstrdup(buf
);
322 if (!*cwd
&& !getcwd(cwd
, sizeof(cwd
)))
323 die ("Could not get current working directory");
326 die ("Could not switch to '%s'", buf
);
328 if (!getcwd(buf
, PATH_MAX
))
329 die ("Could not get current working directory");
332 int len
= strlen(buf
);
333 if (len
+ strlen(last_elem
) + 2 > PATH_MAX
)
334 die ("Too long path name: '%s/%s'",
337 strcpy(buf
+ len
+ 1, last_elem
);
342 if (!lstat(buf
, &st
) && S_ISLNK(st
.st_mode
)) {
343 len
= readlink(buf
, next_buf
, PATH_MAX
);
345 die ("Invalid symlink: %s", buf
);
346 next_buf
[len
] = '\0';
348 buf_index
= 1 - buf_index
;
349 next_buf
= bufs
[buf_index
];
354 if (*cwd
&& chdir(cwd
))
355 die ("Could not change back to '%s'", cwd
);