2 * I'm tired of doing "vsnprintf()" etc just to open a
3 * file, so here's a "return static buffer with printf"
6 * It's obviously not thread-safe. Sue me. But it's quite
7 * useful for doing things like
9 * f = open(mkpath("%s/%s.git", base, name), O_RDONLY);
11 * which is what it's designed for.
15 static char bad_path
[] = "/bad-path/";
17 static char *get_pathname(void)
19 static char pathname_array
[4][PATH_MAX
];
21 return pathname_array
[3 & ++index
];
24 static char *cleanup_path(char *path
)
27 if (!memcmp(path
, "./", 2)) {
35 char *mkpath(const char *fmt
, ...)
39 char *pathname
= get_pathname();
42 len
= vsnprintf(pathname
, PATH_MAX
, fmt
, args
);
46 return cleanup_path(pathname
);
49 char *git_path(const char *fmt
, ...)
51 const char *git_dir
= get_git_dir();
52 char *pathname
= get_pathname();
56 len
= strlen(git_dir
);
57 if (len
> PATH_MAX
-100)
59 memcpy(pathname
, git_dir
, len
);
60 if (len
&& git_dir
[len
-1] != '/')
61 pathname
[len
++] = '/';
63 len
+= vsnprintf(pathname
+ len
, PATH_MAX
- len
, fmt
, args
);
67 return cleanup_path(pathname
);
71 /* git_mkstemp() - create tmp file honoring TMPDIR variable */
72 int git_mkstemp(char *path
, size_t len
, const char *template)
77 tmp
= getenv("TMPDIR");
78 /* on Windows it is TMP and TEMP */
85 n
= snprintf(path
, len
, "%s/%s", tmp
, template);
94 int validate_headref(const char *path
)
97 char *buf
, buffer
[256];
98 unsigned char sha1
[20];
101 if (lstat(path
, &st
) < 0)
104 /* Make sure it is a "refs/.." symlink */
105 if (S_ISLNK(st
.st_mode
)) {
106 len
= readlink(path
, buffer
, sizeof(buffer
)-1);
107 if (len
>= 5 && !memcmp("refs/", buffer
, 5))
113 * Anything else, just open it and try to see if it is a symbolic ref.
115 fd
= open(path
, O_RDONLY
);
118 len
= read_in_full(fd
, buffer
, sizeof(buffer
)-1);
122 * Is it a symbolic ref?
126 if (!memcmp("ref:", buffer
, 4)) {
129 while (len
&& isspace(*buf
))
131 if (len
>= 5 && !memcmp("refs/", buf
, 5))
136 * Is this a detached HEAD?
138 if (!get_sha1_hex(buffer
, sha1
))
144 static char *user_path(char *buf
, char *path
, int sz
)
150 if (!path
|| path
[0] != '~')
153 slash
= strchr(path
, '/');
154 if (path
[0] == '/' || !path
[0]) {
155 pw
= getpwuid(getuid());
166 if (!pw
|| !pw
->pw_dir
|| sz
<= strlen(pw
->pw_dir
))
168 baselen
= strlen(pw
->pw_dir
);
169 memcpy(buf
, pw
->pw_dir
, baselen
);
170 while ((1 < baselen
) && (buf
[baselen
-1] == '/')) {
174 if (slash
&& slash
[1]) {
176 if (sz
<= baselen
+ len
)
178 memcpy(buf
+ baselen
, slash
, len
+ 1);
184 * First, one directory to try is determined by the following algorithm.
186 * (0) If "strict" is given, the path is used as given and no DWIM is
188 * (1) "~/path" to mean path under the running user's home directory;
189 * (2) "~user/path" to mean path under named user's home directory;
190 * (3) "relative/path" to mean cwd relative directory; or
191 * (4) "/absolute/path" to mean absolute directory.
193 * Unless "strict" is given, we try access() for existence of "%s.git/.git",
194 * "%s/.git", "%s.git", "%s" in this order. The first one that exists is
197 * Second, we try chdir() to that. Upon failure, we return NULL.
199 * Then, we try if the current directory is a valid git repository.
200 * Upon failure, we return NULL.
202 * If all goes well, we return the directory we used to chdir() (but
203 * before ~user is expanded), avoiding getcwd() resolving symbolic
204 * links. User relative paths are also returned as they are given,
205 * except DWIM suffixing.
207 char *enter_repo(char *path
, int strict
)
209 static char used_path
[PATH_MAX
];
210 static char validated_path
[PATH_MAX
];
216 static const char *suffix
[] = {
217 ".git/.git", "/.git", ".git", "", NULL
,
219 int len
= strlen(path
);
221 while ((1 < len
) && (path
[len
-1] == '/')) {
227 if (path
[0] == '~') {
228 if (!user_path(used_path
, path
, PATH_MAX
))
230 strcpy(validated_path
, path
);
233 else if (PATH_MAX
- 10 < len
)
236 path
= strcpy(used_path
, path
);
237 strcpy(validated_path
, path
);
240 for (i
= 0; suffix
[i
]; i
++) {
241 strcpy(path
+ len
, suffix
[i
]);
242 if (!access(path
, F_OK
)) {
243 strcat(validated_path
, suffix
[i
]);
247 if (!suffix
[i
] || chdir(path
))
249 path
= validated_path
;
251 else if (chdir(path
))
254 if (access("objects", X_OK
) == 0 && access("refs", X_OK
) == 0 &&
255 validate_headref("HEAD") == 0) {
256 setenv(GIT_DIR_ENVIRONMENT
, ".", 1);
257 check_repository_format();
264 int adjust_shared_perm(const char *path
)
269 if (!shared_repository
)
271 if (lstat(path
, &st
) < 0)
275 mode
|= (shared_repository
== PERM_GROUP
277 : (shared_repository
== PERM_EVERYBODY
285 mode
|= (shared_repository
== PERM_GROUP
287 : (shared_repository
== PERM_EVERYBODY
292 if ((mode
& st
.st_mode
) != mode
&& chmod(path
, mode
) < 0)
297 /* We allow "recursive" symbolic links. Only within reason, though. */
300 const char *make_absolute_path(const char *path
)
302 static char bufs
[2][PATH_MAX
+ 1], *buf
= bufs
[0], *next_buf
= bufs
[1];
304 int buf_index
= 1, len
;
306 int depth
= MAXDEPTH
;
307 char *last_elem
= NULL
;
310 if (strlcpy(buf
, path
, PATH_MAX
) >= PATH_MAX
)
311 die ("Too long path: %.*s", 60, path
);
314 if (stat(buf
, &st
) || !S_ISDIR(st
.st_mode
)) {
315 char *last_slash
= strrchr(buf
, '/');
318 last_elem
= xstrdup(last_slash
+ 1);
320 last_elem
= xstrdup(buf
);
324 if (!*cwd
&& !getcwd(cwd
, sizeof(cwd
)))
325 die ("Could not get current working directory");
328 die ("Could not switch to '%s'", buf
);
330 if (!getcwd(buf
, PATH_MAX
))
331 die ("Could not get current working directory");
334 int len
= strlen(buf
);
335 if (len
+ strlen(last_elem
) + 2 > PATH_MAX
)
336 die ("Too long path name: '%s/%s'",
339 strcpy(buf
+ len
+ 1, last_elem
);
344 if (!lstat(buf
, &st
) && S_ISLNK(st
.st_mode
)) {
345 len
= readlink(buf
, next_buf
, PATH_MAX
);
347 die ("Invalid symlink: %s", buf
);
348 next_buf
[len
] = '\0';
350 buf_index
= 1 - buf_index
;
351 next_buf
= bufs
[buf_index
];
356 if (*cwd
&& chdir(cwd
))
357 die ("Could not change back to '%s'", cwd
);