2 * I'm tired of doing "vsnprintf()" etc just to open a
3 * file, so here's a "return static buffer with printf"
6 * It's obviously not thread-safe. Sue me. But it's quite
7 * useful for doing things like
9 * f = open(mkpath("%s/%s.git", base, name), O_RDONLY);
11 * which is what it's designed for.
15 static char bad_path[] = "/bad-path/";
17 static char *get_pathname(void)
19 static char pathname_array[4][PATH_MAX];
21 return pathname_array[3 & ++index];
24 static char *cleanup_path(char *path)
27 if (!memcmp(path, "./", 2)) {
35 char *mkpath(const char *fmt, ...)
39 char *pathname = get_pathname();
42 len = vsnprintf(pathname, PATH_MAX, fmt, args);
46 return cleanup_path(pathname);
49 char *git_path(const char *fmt, ...)
51 const char *git_dir = get_git_dir();
52 char *pathname = get_pathname();
56 len = strlen(git_dir);
57 if (len > PATH_MAX-100)
59 memcpy(pathname, git_dir, len);
60 if (len && git_dir[len-1] != '/')
61 pathname[len++] = '/';
63 len += vsnprintf(pathname + len, PATH_MAX - len, fmt, args);
67 return cleanup_path(pathname);
71 /* git_mkstemp() - create tmp file honoring TMPDIR variable */
72 int git_mkstemp(char *path, size_t len, const char *template)
77 tmp = getenv("TMPDIR");
80 n = snprintf(path, len, "%s/%s", tmp, template);
89 int validate_headref(const char *path)
92 char *buf, buffer[256];
93 unsigned char sha1[20];
96 if (lstat(path, &st) < 0)
99 /* Make sure it is a "refs/.." symlink */
100 if (S_ISLNK(st.st_mode)) {
101 len = readlink(path, buffer, sizeof(buffer)-1);
102 if (len >= 5 && !memcmp("refs/", buffer, 5))
108 * Anything else, just open it and try to see if it is a symbolic ref.
110 fd = open(path, O_RDONLY);
113 len = read_in_full(fd, buffer, sizeof(buffer)-1);
117 * Is it a symbolic ref?
121 if (!memcmp("ref:", buffer, 4)) {
124 while (len && isspace(*buf))
126 if (len >= 5 && !memcmp("refs/", buf, 5))
131 * Is this a detached HEAD?
133 if (!get_sha1_hex(buffer, sha1))
139 static char *user_path(char *buf, char *path, int sz)
145 if (!path || path[0] != '~')
148 slash = strchr(path, '/');
149 if (path[0] == '/' || !path[0]) {
150 pw = getpwuid(getuid());
161 if (!pw || !pw->pw_dir || sz <= strlen(pw->pw_dir))
163 baselen = strlen(pw->pw_dir);
164 memcpy(buf, pw->pw_dir, baselen);
165 while ((1 < baselen) && (buf[baselen-1] == '/')) {
169 if (slash && slash[1]) {
171 if (sz <= baselen + len)
173 memcpy(buf + baselen, slash, len + 1);
179 * First, one directory to try is determined by the following algorithm.
181 * (0) If "strict" is given, the path is used as given and no DWIM is
183 * (1) "~/path" to mean path under the running user's home directory;
184 * (2) "~user/path" to mean path under named user's home directory;
185 * (3) "relative/path" to mean cwd relative directory; or
186 * (4) "/absolute/path" to mean absolute directory.
188 * Unless "strict" is given, we try access() for existence of "%s.git/.git",
189 * "%s/.git", "%s.git", "%s" in this order. The first one that exists is
192 * Second, we try chdir() to that. Upon failure, we return NULL.
194 * Then, we try if the current directory is a valid git repository.
195 * Upon failure, we return NULL.
197 * If all goes well, we return the directory we used to chdir() (but
198 * before ~user is expanded), avoiding getcwd() resolving symbolic
199 * links. User relative paths are also returned as they are given,
200 * except DWIM suffixing.
202 char *enter_repo(char *path, int strict)
204 static char used_path[PATH_MAX];
205 static char validated_path[PATH_MAX];
211 static const char *suffix[] = {
212 ".git/.git", "/.git", ".git", "", NULL,
214 int len = strlen(path);
216 while ((1 < len) && (path[len-1] == '/')) {
222 if (path[0] == '~') {
223 if (!user_path(used_path, path, PATH_MAX))
225 strcpy(validated_path, path);
228 else if (PATH_MAX - 10 < len)
231 path = strcpy(used_path, path);
232 strcpy(validated_path, path);
235 for (i = 0; suffix[i]; i++) {
236 strcpy(path + len, suffix[i]);
237 if (!access(path, F_OK)) {
238 strcat(validated_path, suffix[i]);
242 if (!suffix[i] || chdir(path))
244 path = validated_path;
246 else if (chdir(path))
249 if (access("objects", X_OK) == 0 && access("refs", X_OK) == 0 &&
250 validate_headref("HEAD") == 0) {
251 setenv(GIT_DIR_ENVIRONMENT, ".", 1);
252 check_repository_format();
259 int adjust_shared_perm(const char *path)
264 if (!shared_repository)
266 if (lstat(path, &st) < 0)
270 mode |= (shared_repository == PERM_GROUP
272 : (shared_repository == PERM_EVERYBODY
280 mode |= (shared_repository == PERM_GROUP
282 : (shared_repository == PERM_EVERYBODY
287 if ((mode & st.st_mode) != mode && chmod(path, mode) < 0)
292 /* We allow "recursive" symbolic links. Only within reason, though. */
295 const char *make_absolute_path(const char *path)
297 static char bufs[2][PATH_MAX + 1], *buf = bufs[0], *next_buf = bufs[1];
299 int buf_index = 1, len;
301 int depth = MAXDEPTH;
302 char *last_elem = NULL;
305 if (strlcpy(buf, path, PATH_MAX) >= PATH_MAX)
306 die ("Too long path: %.*s", 60, path);
309 if (stat(buf, &st) || !S_ISDIR(st.st_mode)) {
310 char *last_slash = strrchr(buf, '/');
313 last_elem = xstrdup(last_slash + 1);
315 last_elem = xstrdup(buf);
319 if (!*cwd && !getcwd(cwd, sizeof(cwd)))
320 die ("Could not get current working directory");
323 die ("Could not switch to '%s'", buf);
325 if (!getcwd(buf, PATH_MAX))
326 die ("Could not get current working directory");
329 int len = strlen(buf);
330 if (len + strlen(last_elem) + 2 > PATH_MAX)
331 die ("Too long path name: '%s/%s'",
334 strcpy(buf + len + 1, last_elem);
339 if (!lstat(buf, &st) && S_ISLNK(st.st_mode)) {
340 len = readlink(buf, next_buf, PATH_MAX);
342 die ("Invalid symlink: %s", buf);
343 next_buf[len] = '\0';
345 buf_index = 1 - buf_index;
346 next_buf = bufs[buf_index];
351 if (*cwd && chdir(cwd))
352 die ("Could not change back to '%s'", cwd);