5 * A signature file has a very simple fixed format: four lines
6 * of "object <sha1>" + "type <typename>" + "tag <tagname>" +
7 * "tagger <committer>", followed by a blank line, a free-form tag
8 * message and a signature block that git itself doesn't care about,
9 * but that can be verified with gpg or similar.
11 * The first three lines are guaranteed to be at least 63 bytes:
12 * "object <sha1>\n" is 48 bytes, "type tag\n" at 9 bytes is the
13 * shortest possible type-line, and "tag .\n" at 6 bytes is the
14 * shortest single-character-tag line.
16 * We also artificially limit the size of the full object to 8kB.
17 * Just because I'm a lazy bastard, and if you can't fit a signature
18 * in that size, you're doing something wrong.
21 /* Some random size */
22 #define MAXSIZE (8192)
25 * We refuse to tag something we can't verify. Just because.
27 static int verify_object(unsigned char *sha1
, const char *expected_type
)
32 void *buffer
= read_sha1_file(sha1
, type
, &size
);
35 if (!strcmp(type
, expected_type
))
36 ret
= check_sha1_signature(sha1
, buffer
, size
, type
);
48 static int verify_tag(char *buffer
, unsigned long size
)
52 unsigned char sha1
[20];
53 const char *object
, *type_line
, *tag_line
, *tagger_line
;
56 return error("wanna fool me ? you obviously got the size wrong !");
60 /* Verify object line */
62 if (memcmp(object
, "object ", 7))
63 return error("char%d: does not start with \"object \"", 0);
65 if (get_sha1_hex(object
+ 7, sha1
))
66 return error("char%d: could not get SHA1 hash", 7);
68 /* Verify type line */
69 type_line
= object
+ 48;
70 if (memcmp(type_line
- 1, "\ntype ", 6))
71 return error("char%d: could not find \"\\ntype \"", 47);
74 tag_line
= strchr(type_line
, '\n');
76 return error("char" PD_FMT
": could not find next \"\\n\"", type_line
- buffer
);
78 if (memcmp(tag_line
, "tag ", 4) || tag_line
[4] == '\n')
79 return error("char" PD_FMT
": no \"tag \" found", tag_line
- buffer
);
81 /* Get the actual type */
82 typelen
= tag_line
- type_line
- strlen("type \n");
83 if (typelen
>= sizeof(type
))
84 return error("char" PD_FMT
": type too long", type_line
+5 - buffer
);
86 memcpy(type
, type_line
+5, typelen
);
89 /* Verify that the object matches */
90 if (verify_object(sha1
, type
))
91 return error("char%d: could not verify object %s", 7, sha1_to_hex(sha1
));
93 /* Verify the tag-name: we don't allow control characters or spaces in it */
96 unsigned char c
= *tag_line
++;
101 return error("char" PD_FMT
": could not verify tag name", tag_line
- buffer
);
104 /* Verify the tagger line */
105 tagger_line
= tag_line
;
107 if (memcmp(tagger_line
, "tagger", 6) || (tagger_line
[6] == '\n'))
108 return error("char" PD_FMT
": could not find \"tagger\"", tagger_line
- buffer
);
110 /* TODO: check for committer info + blank line? */
111 /* Also, the minimum length is probably + "tagger .", or 63+8=71 */
113 /* The actual stuff afterwards we don't care about.. */
119 int main(int argc
, char **argv
)
121 unsigned long size
= 4096;
122 char *buffer
= malloc(size
);
123 unsigned char result_sha1
[20];
126 usage("git-mktag < signaturefile");
128 setup_git_directory();
130 if (read_pipe(0, &buffer
, &size
)) {
132 die("could not read from stdin");
135 /* Verify it for some basic sanity: it needs to start with
136 "object <sha1>\ntype\ntagger " */
137 if (verify_tag(buffer
, size
) < 0)
138 die("invalid tag signature file");
140 if (write_sha1_file(buffer
, size
, tag_type
, result_sha1
) < 0)
141 die("unable to write tag file");
145 printf("%s\n", sha1_to_hex(result_sha1
));