2 * I'm tired of doing "vsnprintf()" etc just to open a
3 * file, so here's a "return static buffer with printf"
6 * It's obviously not thread-safe. Sue me. But it's quite
7 * useful for doing things like
9 * f = open(mkpath("%s/%s.git", base, name), O_RDONLY);
11 * which is what it's designed for.
15 static char bad_path
[] = "/bad-path/";
17 static char *get_pathname(void)
19 static char pathname_array
[4][PATH_MAX
];
21 return pathname_array
[3 & ++index
];
24 static char *cleanup_path(char *path
)
27 if (!memcmp(path
, "./", 2)) {
35 char *mkpath(const char *fmt
, ...)
39 char *pathname
= get_pathname();
42 len
= vsnprintf(pathname
, PATH_MAX
, fmt
, args
);
46 return cleanup_path(pathname
);
49 char *git_path(const char *fmt
, ...)
51 const char *git_dir
= get_git_dir();
52 char *pathname
= get_pathname();
56 len
= strlen(git_dir
);
57 if (len
> PATH_MAX
-100)
59 memcpy(pathname
, git_dir
, len
);
60 if (len
&& git_dir
[len
-1] != '/')
61 pathname
[len
++] = '/';
63 len
+= vsnprintf(pathname
+ len
, PATH_MAX
- len
, fmt
, args
);
67 return cleanup_path(pathname
);
71 /* git_mkstemp() - create tmp file honoring TMPDIR variable */
72 int git_mkstemp(char *path
, size_t len
, const char *template)
77 tmp
= getenv("TMPDIR");
86 n
= snprintf(path
, len
, "%s/%s", tmp
, template);
95 int validate_headref(const char *path
)
98 char *buf
, buffer
[256];
99 unsigned char sha1
[20];
102 if (lstat(path
, &st
) < 0)
105 /* Make sure it is a "refs/.." symlink */
106 if (S_ISLNK(st
.st_mode
)) {
107 len
= readlink(path
, buffer
, sizeof(buffer
)-1);
108 if (len
>= 5 && !memcmp("refs/", buffer
, 5))
114 * Anything else, just open it and try to see if it is a symbolic ref.
116 fd
= open(path
, O_RDONLY
);
119 len
= read_in_full(fd
, buffer
, sizeof(buffer
)-1);
123 * Is it a symbolic ref?
127 if (!memcmp("ref:", buffer
, 4)) {
130 while (len
&& isspace(*buf
))
132 if (len
>= 5 && !memcmp("refs/", buf
, 5))
137 * Is this a detached HEAD?
139 if (!get_sha1_hex(buffer
, sha1
))
145 #ifndef NO_ETC_PASSWD
147 static char *user_path(char *buf
, char *path
, int sz
)
153 if (!path
|| path
[0] != '~')
156 slash
= strchr(path
, '/');
157 if (path
[0] == '/' || !path
[0]) {
158 pw
= getpwuid(getuid());
169 if (!pw
|| !pw
->pw_dir
|| sz
<= strlen(pw
->pw_dir
))
171 baselen
= strlen(pw
->pw_dir
);
172 memcpy(buf
, pw
->pw_dir
, baselen
);
173 while ((1 < baselen
) && (buf
[baselen
-1] == '/')) {
177 if (slash
&& slash
[1]) {
179 if (sz
<= baselen
+ len
)
181 memcpy(buf
+ baselen
, slash
, len
+ 1);
188 static char *user_path(char *buf
, char *path
, int sz
)
190 return getenv("HOME");
196 * First, one directory to try is determined by the following algorithm.
198 * (0) If "strict" is given, the path is used as given and no DWIM is
200 * (1) "~/path" to mean path under the running user's home directory;
201 * (2) "~user/path" to mean path under named user's home directory;
202 * (3) "relative/path" to mean cwd relative directory; or
203 * (4) "/absolute/path" to mean absolute directory.
205 * Unless "strict" is given, we try access() for existence of "%s.git/.git",
206 * "%s/.git", "%s.git", "%s" in this order. The first one that exists is
209 * Second, we try chdir() to that. Upon failure, we return NULL.
211 * Then, we try if the current directory is a valid git repository.
212 * Upon failure, we return NULL.
214 * If all goes well, we return the directory we used to chdir() (but
215 * before ~user is expanded), avoiding getcwd() resolving symbolic
216 * links. User relative paths are also returned as they are given,
217 * except DWIM suffixing.
219 char *enter_repo(char *path
, int strict
)
221 static char used_path
[PATH_MAX
];
222 static char validated_path
[PATH_MAX
];
228 static const char *suffix
[] = {
229 ".git/.git", "/.git", ".git", "", NULL
,
231 int len
= strlen(path
);
233 while ((1 < len
) && (path
[len
-1] == '/')) {
239 if (path
[0] == '~') {
240 if (!user_path(used_path
, path
, PATH_MAX
))
242 strcpy(validated_path
, path
);
245 else if (PATH_MAX
- 10 < len
)
248 path
= strcpy(used_path
, path
);
249 strcpy(validated_path
, path
);
252 for (i
= 0; suffix
[i
]; i
++) {
253 strcpy(path
+ len
, suffix
[i
]);
254 if (!access(path
, F_OK
)) {
255 strcat(validated_path
, suffix
[i
]);
259 if (!suffix
[i
] || chdir(path
))
261 path
= validated_path
;
263 else if (chdir(path
))
266 if (access("objects", X_OK
) == 0 && access("refs", X_OK
) == 0 &&
267 validate_headref("HEAD") == 0) {
269 check_repository_format();
276 int adjust_shared_perm(const char *path
)
281 if (!shared_repository
)
283 if (lstat(path
, &st
) < 0)
287 mode
|= (shared_repository
== PERM_GROUP
289 : (shared_repository
== PERM_EVERYBODY
297 mode
|= (shared_repository
== PERM_GROUP
299 : (shared_repository
== PERM_EVERYBODY
304 if ((mode
& st
.st_mode
) != mode
&& chmod(path
, mode
) < 0)
309 /* We allow "recursive" symbolic links. Only within reason, though. */
312 const char *make_absolute_path(const char *path
)
314 static char bufs
[2][PATH_MAX
+ 1], *buf
= bufs
[0], *next_buf
= bufs
[1];
316 int buf_index
= 1, len
;
318 int depth
= MAXDEPTH
;
319 char *last_elem
= NULL
;
322 if (strlcpy(buf
, path
, PATH_MAX
) >= PATH_MAX
)
323 die ("Too long path: %.*s", 60, path
);
326 if (stat(buf
, &st
) || !S_ISDIR(st
.st_mode
)) {
327 char *last_slash
= strrchr(buf
, '/');
330 last_elem
= xstrdup(last_slash
+ 1);
332 last_elem
= xstrdup(buf
);
336 if (!*cwd
&& !getcwd(cwd
, sizeof(cwd
)))
337 die ("Could not get current working directory");
340 die ("Could not switch to '%s'", buf
);
342 if (!getcwd(buf
, PATH_MAX
))
343 die ("Could not get current working directory");
346 int len
= strlen(buf
);
347 if (len
+ strlen(last_elem
) + 2 > PATH_MAX
)
348 die ("Too long path name: '%s/%s'",
351 strcpy(buf
+ len
+ 1, last_elem
);
356 if (!lstat(buf
, &st
) && S_ISLNK(st
.st_mode
)) {
357 len
= readlink(buf
, next_buf
, PATH_MAX
);
359 die ("Invalid symlink: %s", buf
);
360 next_buf
[len
] = '\0';
362 buf_index
= 1 - buf_index
;
363 next_buf
= bufs
[buf_index
];
368 if (*cwd
&& chdir(cwd
))
369 die ("Could not change back to '%s'", cwd
);