blob: 8db7882aacb533ebf6635a0457c8b2ac7855c392 [file] [log] [blame]
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001#include "../cache.h"
Brandon Williamsb2141fc2017-06-14 11:07:36 -07002#include "../config.h"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003#include "../refs.h"
4#include "refs-internal.h"
Michael Haggerty958f9642017-04-16 08:41:31 +02005#include "ref-cache.h"
Michael Haggerty67be7c52017-06-23 09:01:37 +02006#include "packed-backend.h"
Michael Haggerty3bc581b2016-06-18 06:15:15 +02007#include "../iterator.h"
Michael Haggerty2880d162016-06-18 06:15:19 +02008#include "../dir-iterator.h"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01009#include "../lockfile.h"
10#include "../object.h"
11#include "../dir.h"
Jeff Kingfb9c2d22018-03-30 14:35:12 -040012#include "../chdir-notify.h"
Nguyễn Thái Ngọc Duy3a3b9d82018-10-21 10:08:54 +020013#include "worktree.h"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010014
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010015/*
16 * This backend uses the following flags in `ref_update::flags` for
17 * internal bookkeeping purposes. Their numerical values must not
Michael Haggerty91774af2017-11-05 09:42:06 +010018 * conflict with REF_NO_DEREF, REF_FORCE_CREATE_REFLOG, REF_HAVE_NEW,
Han-Wen Nienhuys0464d0a2021-12-07 13:38:16 +000019 * or REF_HAVE_OLD, which are also stored in `ref_update::flags`.
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010020 */
21
22/*
23 * Used as a flag in ref_update::flags when a loose ref is being
Michael Haggerty91774af2017-11-05 09:42:06 +010024 * pruned. This flag must only be used when REF_NO_DEREF is set.
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010025 */
Michael Haggertyacedcde2017-11-05 09:42:07 +010026#define REF_IS_PRUNING (1 << 4)
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010027
28/*
29 * Flag passed to lock_ref_sha1_basic() telling it to tolerate broken
30 * refs (i.e., because the reference is about to be deleted anyway).
31 */
32#define REF_DELETING (1 << 5)
33
34/*
35 * Used as a flag in ref_update::flags when the lockfile needs to be
36 * committed.
37 */
38#define REF_NEEDS_COMMIT (1 << 6)
39
40/*
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010041 * Used as a flag in ref_update::flags when the ref_update was via an
42 * update to HEAD.
43 */
44#define REF_UPDATE_VIA_HEAD (1 << 8)
45
46/*
Will Chandler5f03e512021-05-08 01:00:43 -040047 * Used as a flag in ref_update::flags when a reference has been
48 * deleted and the ref's parent directories may need cleanup.
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010049 */
Will Chandler5f03e512021-05-08 01:00:43 -040050#define REF_DELETED_RMDIR (1 << 9)
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010051
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010052struct ref_lock {
53 char *ref_name;
Jeff Kingee4d8e42017-09-05 08:15:15 -040054 struct lock_file lk;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010055 struct object_id old_oid;
56};
57
Michael Haggerty00eebe32016-09-04 18:08:11 +020058struct files_ref_store {
59 struct ref_store base;
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +070060 unsigned int store_flags;
Michael Haggerty32c597e2017-02-10 12:16:16 +010061
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +070062 char *gitcommondir;
Nguyễn Thái Ngọc Duy33dfb9f2017-03-26 09:42:18 +070063
Michael Haggerty7c22bc82017-04-16 08:41:32 +020064 struct ref_cache *loose;
Michael Haggerty55c6bc32017-05-22 16:17:40 +020065
Michael Haggertye0cc8ac2017-06-23 09:01:38 +020066 struct ref_store *packed_ref_store;
Michael Haggerty00eebe32016-09-04 18:08:11 +020067};
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010068
Michael Haggerty65a0a8e2016-09-04 18:08:09 +020069static void clear_loose_ref_cache(struct files_ref_store *refs)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010070{
71 if (refs->loose) {
Michael Haggerty7c22bc82017-04-16 08:41:32 +020072 free_ref_cache(refs->loose);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010073 refs->loose = NULL;
74 }
75}
76
Jeff Kinga2d51562016-01-22 17:29:30 -050077/*
78 * Create a new submodule ref cache and add it to the internal
79 * set of caches.
80 */
Jonathan Tan34224e12021-10-08 14:08:14 -070081static struct ref_store *files_ref_store_create(struct repository *repo,
82 const char *gitdir,
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +070083 unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010084{
Michael Haggerty00eebe32016-09-04 18:08:11 +020085 struct files_ref_store *refs = xcalloc(1, sizeof(*refs));
86 struct ref_store *ref_store = (struct ref_store *)refs;
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +070087 struct strbuf sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010088
Han-Wen Nienhuysf9f7fd32021-12-22 18:11:54 +000089 base_ref_store_init(ref_store, repo, gitdir, &refs_be_files);
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +070090 refs->store_flags = flags;
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +070091 get_common_dir_noenv(&sb, gitdir);
92 refs->gitcommondir = strbuf_detach(&sb, NULL);
Han-Wen Nienhuys99f0d972021-12-22 18:11:52 +000093 refs->packed_ref_store =
94 packed_ref_store_create(repo, refs->gitcommondir, flags);
Jeff Kinga2d51562016-01-22 17:29:30 -050095
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +000096 chdir_notify_reparent("files-backend $GIT_DIR", &refs->base.gitdir);
Jeff Kingfb9c2d22018-03-30 14:35:12 -040097 chdir_notify_reparent("files-backend $GIT_COMMONDIR",
98 &refs->gitcommondir);
99
Michael Haggerty00eebe32016-09-04 18:08:11 +0200100 return ref_store;
Jeff Kinga2d51562016-01-22 17:29:30 -0500101}
102
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100103/*
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700104 * Die if refs is not the main ref store. caller is used in any
105 * necessary error messages.
Michael Haggerty32c597e2017-02-10 12:16:16 +0100106 */
107static void files_assert_main_repository(struct files_ref_store *refs,
108 const char *caller)
109{
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700110 if (refs->store_flags & REF_STORE_MAIN)
111 return;
112
Johannes Schindelin033abf92018-05-02 11:38:39 +0200113 BUG("operation %s only allowed for main ref store", caller);
Michael Haggerty32c597e2017-02-10 12:16:16 +0100114}
115
116/*
Michael Haggerty00eebe32016-09-04 18:08:11 +0200117 * Downcast ref_store to files_ref_store. Die if ref_store is not a
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700118 * files_ref_store. required_flags is compared with ref_store's
119 * store_flags to ensure the ref_store has all required capabilities.
120 * "caller" is used in any necessary error messages.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100121 */
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700122static struct files_ref_store *files_downcast(struct ref_store *ref_store,
123 unsigned int required_flags,
124 const char *caller)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100125{
Michael Haggerty32c597e2017-02-10 12:16:16 +0100126 struct files_ref_store *refs;
127
Michael Haggerty00eebe32016-09-04 18:08:11 +0200128 if (ref_store->be != &refs_be_files)
Johannes Schindelin033abf92018-05-02 11:38:39 +0200129 BUG("ref_store is type \"%s\" not \"files\" in %s",
Michael Haggerty00eebe32016-09-04 18:08:11 +0200130 ref_store->be->name, caller);
Michael Haggerty2eed2782016-06-18 06:15:12 +0200131
Michael Haggerty32c597e2017-02-10 12:16:16 +0100132 refs = (struct files_ref_store *)ref_store;
Michael Haggerty2eed2782016-06-18 06:15:12 +0200133
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700134 if ((refs->store_flags & required_flags) != required_flags)
Johannes Schindelin033abf92018-05-02 11:38:39 +0200135 BUG("operation %s requires abilities 0x%x, but only have 0x%x",
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700136 caller, required_flags, refs->store_flags);
Michael Haggerty32c597e2017-02-10 12:16:16 +0100137
138 return refs;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100139}
140
Nguyễn Thái Ngọc Duy3a3b9d82018-10-21 10:08:54 +0200141static void files_reflog_path_other_worktrees(struct files_ref_store *refs,
142 struct strbuf *sb,
143 const char *refname)
144{
145 const char *real_ref;
146 const char *worktree_name;
147 int length;
148
149 if (parse_worktree_ref(refname, &worktree_name, &length, &real_ref))
150 BUG("refname %s is not a other-worktree ref", refname);
151
152 if (worktree_name)
153 strbuf_addf(sb, "%s/worktrees/%.*s/logs/%s", refs->gitcommondir,
154 length, worktree_name, real_ref);
155 else
156 strbuf_addf(sb, "%s/logs/%s", refs->gitcommondir,
157 real_ref);
158}
159
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +0700160static void files_reflog_path(struct files_ref_store *refs,
161 struct strbuf *sb,
162 const char *refname)
163{
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700164 switch (ref_type(refname)) {
165 case REF_TYPE_PER_WORKTREE:
166 case REF_TYPE_PSEUDOREF:
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +0000167 strbuf_addf(sb, "%s/logs/%s", refs->base.gitdir, refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700168 break;
Nguyễn Thái Ngọc Duy3a3b9d82018-10-21 10:08:54 +0200169 case REF_TYPE_OTHER_PSEUDOREF:
170 case REF_TYPE_MAIN_PSEUDOREF:
Nguyễn Thái Ngọc Duy46c0eb52018-11-25 05:58:16 +0100171 files_reflog_path_other_worktrees(refs, sb, refname);
172 break;
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700173 case REF_TYPE_NORMAL:
174 strbuf_addf(sb, "%s/logs/%s", refs->gitcommondir, refname);
175 break;
176 default:
Johannes Schindelin033abf92018-05-02 11:38:39 +0200177 BUG("unknown ref type %d of ref %s",
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700178 ref_type(refname), refname);
179 }
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +0700180}
181
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700182static void files_ref_path(struct files_ref_store *refs,
183 struct strbuf *sb,
184 const char *refname)
185{
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700186 switch (ref_type(refname)) {
187 case REF_TYPE_PER_WORKTREE:
188 case REF_TYPE_PSEUDOREF:
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +0000189 strbuf_addf(sb, "%s/%s", refs->base.gitdir, refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700190 break;
Nguyễn Thái Ngọc Duy3a3b9d82018-10-21 10:08:54 +0200191 case REF_TYPE_MAIN_PSEUDOREF:
192 if (!skip_prefix(refname, "main-worktree/", &refname))
193 BUG("ref %s is not a main pseudoref", refname);
194 /* fallthrough */
195 case REF_TYPE_OTHER_PSEUDOREF:
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700196 case REF_TYPE_NORMAL:
197 strbuf_addf(sb, "%s/%s", refs->gitcommondir, refname);
198 break;
199 default:
Johannes Schindelin033abf92018-05-02 11:38:39 +0200200 BUG("unknown ref type %d of ref %s",
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700201 ref_type(refname), refname);
202 }
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700203}
204
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100205/*
Nguyễn Thái Ngọc Duyb9317d52019-03-07 19:29:17 +0700206 * Manually add refs/bisect, refs/rewritten and refs/worktree, which, being
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700207 * per-worktree, might not appear in the directory listing for
208 * refs/ in the main repo.
209 */
210static void add_per_worktree_entries_to_dir(struct ref_dir *dir, const char *dirname)
211{
Nguyễn Thái Ngọc Duyb9317d52019-03-07 19:29:17 +0700212 const char *prefixes[] = { "refs/bisect/", "refs/worktree/", "refs/rewritten/" };
Nguyễn Thái Ngọc Duy90d31ff2019-03-07 19:29:16 +0700213 int ip;
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700214
215 if (strcmp(dirname, "refs/"))
216 return;
217
Nguyễn Thái Ngọc Duy90d31ff2019-03-07 19:29:16 +0700218 for (ip = 0; ip < ARRAY_SIZE(prefixes); ip++) {
219 const char *prefix = prefixes[ip];
220 int prefix_len = strlen(prefix);
221 struct ref_entry *child_entry;
222 int pos;
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700223
Nguyễn Thái Ngọc Duy90d31ff2019-03-07 19:29:16 +0700224 pos = search_ref_dir(dir, prefix, prefix_len);
225 if (pos >= 0)
226 continue;
Ævar Arnfjörð Bjarmason750036c2021-09-28 15:02:24 +0200227 child_entry = create_dir_entry(dir->cache, prefix, prefix_len);
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700228 add_entry_to_dir(dir, child_entry);
229 }
230}
231
232/*
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100233 * Read the loose references from the namespace dirname into dir
234 * (without recursing). dirname must end with '/'. dir must be the
235 * directory entry corresponding to dirname.
236 */
Michael Haggertydf308752017-04-16 08:41:34 +0200237static void loose_fill_ref_dir(struct ref_store *ref_store,
238 struct ref_dir *dir, const char *dirname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100239{
Michael Haggertydf308752017-04-16 08:41:34 +0200240 struct files_ref_store *refs =
241 files_downcast(ref_store, REF_STORE_READ, "fill_ref_dir");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100242 DIR *d;
243 struct dirent *de;
244 int dirnamelen = strlen(dirname);
245 struct strbuf refname;
246 struct strbuf path = STRBUF_INIT;
247 size_t path_baselen;
248
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700249 files_ref_path(refs, &path, dirname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100250 path_baselen = path.len;
251
252 d = opendir(path.buf);
253 if (!d) {
254 strbuf_release(&path);
255 return;
256 }
257
258 strbuf_init(&refname, dirnamelen + 257);
259 strbuf_add(&refname, dirname, dirnamelen);
260
261 while ((de = readdir(d)) != NULL) {
brian m. carlson4417df82017-05-06 22:10:24 +0000262 struct object_id oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100263 struct stat st;
264 int flag;
265
266 if (de->d_name[0] == '.')
267 continue;
268 if (ends_with(de->d_name, ".lock"))
269 continue;
270 strbuf_addstr(&refname, de->d_name);
271 strbuf_addstr(&path, de->d_name);
272 if (stat(path.buf, &st) < 0) {
273 ; /* silently ignore */
274 } else if (S_ISDIR(st.st_mode)) {
275 strbuf_addch(&refname, '/');
276 add_entry_to_dir(dir,
Michael Haggertye00d1a42017-04-16 08:41:33 +0200277 create_dir_entry(dir->cache, refname.buf,
Ævar Arnfjörð Bjarmason750036c2021-09-28 15:02:24 +0200278 refname.len));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100279 } else {
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +0700280 if (!refs_resolve_ref_unsafe(&refs->base,
Michael Haggerty3c0cb0c2017-02-09 21:53:52 +0100281 refname.buf,
282 RESOLVE_REF_READING,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +0100283 &oid, &flag)) {
brian m. carlson4417df82017-05-06 22:10:24 +0000284 oidclr(&oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100285 flag |= REF_ISBROKEN;
brian m. carlson4417df82017-05-06 22:10:24 +0000286 } else if (is_null_oid(&oid)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100287 /*
288 * It is so astronomically unlikely
Michael Haggerty78fb4572017-11-05 09:42:09 +0100289 * that null_oid is the OID of an
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100290 * actual object that we consider its
291 * appearance in a loose reference
292 * file to be repo corruption
293 * (probably due to a software bug).
294 */
295 flag |= REF_ISBROKEN;
296 }
297
298 if (check_refname_format(refname.buf,
299 REFNAME_ALLOW_ONELEVEL)) {
300 if (!refname_is_safe(refname.buf))
301 die("loose refname is dangerous: %s", refname.buf);
brian m. carlson4417df82017-05-06 22:10:24 +0000302 oidclr(&oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100303 flag |= REF_BAD_NAME | REF_ISBROKEN;
304 }
305 add_entry_to_dir(dir,
Michael Haggertyc1da06c2017-05-22 16:17:53 +0200306 create_ref_entry(refname.buf, &oid, flag));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100307 }
308 strbuf_setlen(&refname, dirnamelen);
309 strbuf_setlen(&path, path_baselen);
310 }
311 strbuf_release(&refname);
312 strbuf_release(&path);
313 closedir(d);
Michael Haggertye3bf2982017-04-16 08:41:35 +0200314
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700315 add_per_worktree_entries_to_dir(dir, dirname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100316}
317
Michael Haggertya714b192017-04-16 08:41:38 +0200318static struct ref_cache *get_loose_ref_cache(struct files_ref_store *refs)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100319{
320 if (!refs->loose) {
321 /*
322 * Mark the top-level directory complete because we
323 * are about to read the only subdirectory that can
324 * hold references:
325 */
Michael Haggertydf308752017-04-16 08:41:34 +0200326 refs->loose = create_ref_cache(&refs->base, loose_fill_ref_dir);
Michael Haggerty7c22bc82017-04-16 08:41:32 +0200327
328 /* We're going to fill the top level ourselves: */
329 refs->loose->root->flag &= ~REF_INCOMPLETE;
330
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100331 /*
Michael Haggerty7c22bc82017-04-16 08:41:32 +0200332 * Add an incomplete entry for "refs/" (to be filled
333 * lazily):
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100334 */
Michael Haggerty7c22bc82017-04-16 08:41:32 +0200335 add_entry_to_dir(get_ref_dir(refs->loose->root),
Ævar Arnfjörð Bjarmason750036c2021-09-28 15:02:24 +0200336 create_dir_entry(refs->loose, "refs/", 5));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100337 }
Michael Haggertya714b192017-04-16 08:41:38 +0200338 return refs->loose;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100339}
340
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100341static int read_ref_internal(struct ref_store *ref_store, const char *refname,
342 struct object_id *oid, struct strbuf *referent,
343 unsigned int *type, int *failure_errno, int skip_packed_refs)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100344{
Michael Haggerty43086512016-09-04 18:08:14 +0200345 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700346 files_downcast(ref_store, REF_STORE_READ, "read_raw_ref");
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400347 struct strbuf sb_contents = STRBUF_INIT;
348 struct strbuf sb_path = STRBUF_INIT;
David Turner70486532016-04-07 15:03:01 -0400349 const char *path;
350 const char *buf;
351 struct stat st;
352 int fd;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400353 int ret = -1;
Jeff Kinge8c42cb2016-10-06 12:48:42 -0400354 int remaining_retries = 3;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200355 int myerr = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100356
Michael Haggertyfa96ea12016-04-22 01:11:17 +0200357 *type = 0;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400358 strbuf_reset(&sb_path);
Michael Haggerty34c7ad82016-09-04 18:08:20 +0200359
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700360 files_ref_path(refs, &sb_path, refname);
Michael Haggerty34c7ad82016-09-04 18:08:20 +0200361
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400362 path = sb_path.buf;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100363
David Turner70486532016-04-07 15:03:01 -0400364stat_ref:
365 /*
366 * We might have to loop back here to avoid a race
367 * condition: first we lstat() the file, then we try
368 * to read it as a link or as a file. But if somebody
369 * changes the type of the file (file <-> directory
370 * <-> symlink) between the lstat() and reading, then
371 * we don't want to report that as an error but rather
372 * try again starting with the lstat().
Jeff Kinge8c42cb2016-10-06 12:48:42 -0400373 *
374 * We'll keep a count of the retries, though, just to avoid
375 * any confusing situation sending us into an infinite loop.
David Turner70486532016-04-07 15:03:01 -0400376 */
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100377
Jeff Kinge8c42cb2016-10-06 12:48:42 -0400378 if (remaining_retries-- <= 0)
379 goto out;
380
David Turner70486532016-04-07 15:03:01 -0400381 if (lstat(path, &st) < 0) {
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200382 int ignore_errno;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200383 myerr = errno;
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100384 if (myerr != ENOENT || skip_packed_refs)
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400385 goto out;
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200386 if (refs_read_raw_ref(refs->packed_ref_store, refname, oid,
387 referent, type, &ignore_errno)) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200388 myerr = ENOENT;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400389 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100390 }
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400391 ret = 0;
392 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100393 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100394
David Turner70486532016-04-07 15:03:01 -0400395 /* Follow "normalized" - ie "refs/.." symlinks by hand */
396 if (S_ISLNK(st.st_mode)) {
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400397 strbuf_reset(&sb_contents);
Jeff King765b4962018-07-24 06:51:39 -0400398 if (strbuf_readlink(&sb_contents, path, st.st_size) < 0) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200399 myerr = errno;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200400 if (myerr == ENOENT || myerr == EINVAL)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100401 /* inconsistent with lstat; retry */
402 goto stat_ref;
403 else
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400404 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100405 }
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400406 if (starts_with(sb_contents.buf, "refs/") &&
407 !check_refname_format(sb_contents.buf, 0)) {
Michael Haggerty92b38092016-04-22 01:11:17 +0200408 strbuf_swap(&sb_contents, referent);
Michael Haggerty3a0b6b92016-04-26 03:06:23 +0200409 *type |= REF_ISSYMREF;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400410 ret = 0;
411 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100412 }
Jeff King3f7bd762016-10-06 15:41:08 -0400413 /*
414 * It doesn't look like a refname; fall through to just
415 * treating it like a non-symlink, and reading whatever it
416 * points to.
417 */
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100418 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100419
David Turner70486532016-04-07 15:03:01 -0400420 /* Is it a directory? */
421 if (S_ISDIR(st.st_mode)) {
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200422 int ignore_errno;
Michael Haggertye167a562016-05-05 14:09:41 +0200423 /*
424 * Even though there is a directory where the loose
425 * ref is supposed to be, there could still be a
426 * packed ref:
427 */
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100428 if (skip_packed_refs ||
429 refs_read_raw_ref(refs->packed_ref_store, refname, oid,
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200430 referent, type, &ignore_errno)) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200431 myerr = EISDIR;
Michael Haggertye167a562016-05-05 14:09:41 +0200432 goto out;
433 }
434 ret = 0;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400435 goto out;
David Turner70486532016-04-07 15:03:01 -0400436 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100437
David Turner70486532016-04-07 15:03:01 -0400438 /*
439 * Anything else, just open it and try to use it as
440 * a ref
441 */
442 fd = open(path, O_RDONLY);
443 if (fd < 0) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200444 myerr = errno;
445 if (myerr == ENOENT && !S_ISLNK(st.st_mode))
David Turner70486532016-04-07 15:03:01 -0400446 /* inconsistent with lstat; retry */
447 goto stat_ref;
448 else
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400449 goto out;
David Turner70486532016-04-07 15:03:01 -0400450 }
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400451 strbuf_reset(&sb_contents);
452 if (strbuf_read(&sb_contents, fd, 256) < 0) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200453 myerr = errno;
David Turner70486532016-04-07 15:03:01 -0400454 close(fd);
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400455 goto out;
David Turner70486532016-04-07 15:03:01 -0400456 }
457 close(fd);
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400458 strbuf_rtrim(&sb_contents);
459 buf = sb_contents.buf;
David Turner70486532016-04-07 15:03:01 -0400460
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200461 ret = parse_loose_ref_contents(buf, oid, referent, type, &myerr);
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400462
463out:
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200464 if (ret && !myerr)
465 BUG("returning non-zero %d, should have set myerr!", ret);
466 *failure_errno = myerr;
467
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100468 strbuf_release(&sb_path);
469 strbuf_release(&sb_contents);
Ævar Arnfjörð Bjarmasoncac15b32022-01-12 13:36:46 +0100470 errno = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100471 return ret;
472}
473
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100474static int files_read_raw_ref(struct ref_store *ref_store, const char *refname,
475 struct object_id *oid, struct strbuf *referent,
476 unsigned int *type, int *failure_errno)
477{
478 return read_ref_internal(ref_store, refname, oid, referent, type, failure_errno, 0);
479}
480
481static int files_read_symbolic_ref(struct ref_store *ref_store, const char *refname,
482 struct strbuf *referent)
483{
484 struct object_id oid;
485 int failure_errno, ret;
486 unsigned int type;
487
488 ret = read_ref_internal(ref_store, refname, &oid, referent, &type, &failure_errno, 1);
489 if (ret)
490 return ret;
491
492 return !(type & REF_ISSYMREF);
493}
494
Han-Wen Nienhuyse39620f2020-08-19 14:27:55 +0000495int parse_loose_ref_contents(const char *buf, struct object_id *oid,
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200496 struct strbuf *referent, unsigned int *type,
497 int *failure_errno)
Han-Wen Nienhuyse39620f2020-08-19 14:27:55 +0000498{
499 const char *p;
500 if (skip_prefix(buf, "ref:", &buf)) {
501 while (isspace(*buf))
502 buf++;
503
504 strbuf_reset(referent);
505 strbuf_addstr(referent, buf);
506 *type |= REF_ISSYMREF;
507 return 0;
508 }
509
510 /*
511 * FETCH_HEAD has additional data after the sha.
512 */
513 if (parse_oid_hex(buf, oid, &p) ||
514 (*p != '\0' && !isspace(*p))) {
515 *type |= REF_ISBROKEN;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200516 *failure_errno = EINVAL;
Han-Wen Nienhuyse39620f2020-08-19 14:27:55 +0000517 return -1;
518 }
519 return 0;
520}
521
Michael Haggerty8415d242016-04-24 08:11:37 +0200522static void unlock_ref(struct ref_lock *lock)
523{
Jeff Kingee4d8e42017-09-05 08:15:15 -0400524 rollback_lock_file(&lock->lk);
Michael Haggerty8415d242016-04-24 08:11:37 +0200525 free(lock->ref_name);
Michael Haggerty8415d242016-04-24 08:11:37 +0200526 free(lock);
527}
528
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100529/*
Michael Haggerty92b15512016-04-25 15:56:07 +0200530 * Lock refname, without following symrefs, and set *lock_p to point
531 * at a newly-allocated lock object. Fill in lock->old_oid, referent,
532 * and type similarly to read_raw_ref().
533 *
534 * The caller must verify that refname is a "safe" reference name (in
535 * the sense of refname_is_safe()) before calling this function.
536 *
537 * If the reference doesn't already exist, verify that refname doesn't
538 * have a D/F conflict with any existing references. extras and skip
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200539 * are passed to refs_verify_refname_available() for this check.
Michael Haggerty92b15512016-04-25 15:56:07 +0200540 *
541 * If mustexist is not set and the reference is not found or is
Michael Haggerty78fb4572017-11-05 09:42:09 +0100542 * broken, lock the reference anyway but clear old_oid.
Michael Haggerty92b15512016-04-25 15:56:07 +0200543 *
544 * Return 0 on success. On failure, write an error message to err and
545 * return TRANSACTION_NAME_CONFLICT or TRANSACTION_GENERIC_ERROR.
546 *
547 * Implementation note: This function is basically
548 *
549 * lock reference
550 * read_raw_ref()
551 *
552 * but it includes a lot more code to
553 * - Deal with possible races with other processes
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200554 * - Avoid calling refs_verify_refname_available() when it can be
Michael Haggerty92b15512016-04-25 15:56:07 +0200555 * avoided, namely if we were successfully able to read the ref
556 * - Generate informative error messages in the case of failure
557 */
Michael Haggertyf7b0a982016-09-04 18:08:31 +0200558static int lock_raw_ref(struct files_ref_store *refs,
559 const char *refname, int mustexist,
Michael Haggerty92b15512016-04-25 15:56:07 +0200560 const struct string_list *extras,
Michael Haggerty92b15512016-04-25 15:56:07 +0200561 struct ref_lock **lock_p,
562 struct strbuf *referent,
563 unsigned int *type,
564 struct strbuf *err)
565{
566 struct ref_lock *lock;
567 struct strbuf ref_file = STRBUF_INIT;
568 int attempts_remaining = 3;
569 int ret = TRANSACTION_GENERIC_ERROR;
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200570 int failure_errno;
Michael Haggerty92b15512016-04-25 15:56:07 +0200571
572 assert(err);
Michael Haggerty32c597e2017-02-10 12:16:16 +0100573 files_assert_main_repository(refs, "lock_raw_ref");
Michael Haggertyf7b0a982016-09-04 18:08:31 +0200574
Michael Haggerty92b15512016-04-25 15:56:07 +0200575 *type = 0;
576
577 /* First lock the file so it can't change out from under us. */
578
René Scharfeca56dad2021-03-13 17:17:22 +0100579 *lock_p = CALLOC_ARRAY(lock, 1);
Michael Haggerty92b15512016-04-25 15:56:07 +0200580
581 lock->ref_name = xstrdup(refname);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700582 files_ref_path(refs, &ref_file, refname);
Michael Haggerty92b15512016-04-25 15:56:07 +0200583
584retry:
585 switch (safe_create_leading_directories(ref_file.buf)) {
586 case SCLD_OK:
587 break; /* success */
588 case SCLD_EXISTS:
589 /*
590 * Suppose refname is "refs/foo/bar". We just failed
591 * to create the containing directory, "refs/foo",
592 * because there was a non-directory in the way. This
593 * indicates a D/F conflict, probably because of
594 * another reference such as "refs/foo". There is no
595 * reason to expect this error to be transitory.
596 */
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +0700597 if (refs_verify_refname_available(&refs->base, refname,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +0200598 extras, NULL, err)) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200599 if (mustexist) {
600 /*
601 * To the user the relevant error is
602 * that the "mustexist" reference is
603 * missing:
604 */
605 strbuf_reset(err);
606 strbuf_addf(err, "unable to resolve reference '%s'",
607 refname);
608 } else {
609 /*
610 * The error message set by
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200611 * refs_verify_refname_available() is
612 * OK.
Michael Haggerty92b15512016-04-25 15:56:07 +0200613 */
614 ret = TRANSACTION_NAME_CONFLICT;
615 }
616 } else {
617 /*
618 * The file that is in the way isn't a loose
619 * reference. Report it as a low-level
620 * failure.
621 */
622 strbuf_addf(err, "unable to create lock file %s.lock; "
623 "non-directory in the way",
624 ref_file.buf);
625 }
626 goto error_return;
627 case SCLD_VANISHED:
628 /* Maybe another process was tidying up. Try again. */
629 if (--attempts_remaining > 0)
630 goto retry;
631 /* fall through */
632 default:
633 strbuf_addf(err, "unable to create directory for %s",
634 ref_file.buf);
635 goto error_return;
636 }
637
Michael Haggerty4ff0f012017-08-21 13:51:34 +0200638 if (hold_lock_file_for_update_timeout(
Jeff Kingee4d8e42017-09-05 08:15:15 -0400639 &lock->lk, ref_file.buf, LOCK_NO_DEREF,
Michael Haggerty4ff0f012017-08-21 13:51:34 +0200640 get_files_ref_lock_timeout_ms()) < 0) {
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200641 int myerr = errno;
642 errno = 0;
643 if (myerr == ENOENT && --attempts_remaining > 0) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200644 /*
645 * Maybe somebody just deleted one of the
646 * directories leading to ref_file. Try
647 * again:
648 */
649 goto retry;
650 } else {
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200651 unable_to_lock_message(ref_file.buf, myerr, err);
Michael Haggerty92b15512016-04-25 15:56:07 +0200652 goto error_return;
653 }
654 }
655
656 /*
657 * Now we hold the lock and can read the reference without
658 * fear that its value will change.
659 */
660
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200661 if (files_read_raw_ref(&refs->base, refname, &lock->old_oid, referent,
662 type, &failure_errno)) {
663 if (failure_errno == ENOENT) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200664 if (mustexist) {
665 /* Garden variety missing reference. */
666 strbuf_addf(err, "unable to resolve reference '%s'",
667 refname);
668 goto error_return;
669 } else {
670 /*
671 * Reference is missing, but that's OK. We
672 * know that there is not a conflict with
673 * another loose reference because
674 * (supposing that we are trying to lock
675 * reference "refs/foo/bar"):
676 *
677 * - We were successfully able to create
678 * the lockfile refs/foo/bar.lock, so we
679 * know there cannot be a loose reference
680 * named "refs/foo".
681 *
682 * - We got ENOENT and not EISDIR, so we
683 * know that there cannot be a loose
684 * reference named "refs/foo/bar/baz".
685 */
686 }
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200687 } else if (failure_errno == EISDIR) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200688 /*
689 * There is a directory in the way. It might have
690 * contained references that have been deleted. If
691 * we don't require that the reference already
692 * exists, try to remove the directory so that it
693 * doesn't cause trouble when we want to rename the
694 * lockfile into place later.
695 */
696 if (mustexist) {
697 /* Garden variety missing reference. */
698 strbuf_addf(err, "unable to resolve reference '%s'",
699 refname);
700 goto error_return;
701 } else if (remove_dir_recursively(&ref_file,
702 REMOVE_DIR_EMPTY_ONLY)) {
Michael Haggertyb05855b2017-04-16 08:41:26 +0200703 if (refs_verify_refname_available(
704 &refs->base, refname,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +0200705 extras, NULL, err)) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200706 /*
707 * The error message set by
708 * verify_refname_available() is OK.
709 */
710 ret = TRANSACTION_NAME_CONFLICT;
711 goto error_return;
712 } else {
713 /*
714 * We can't delete the directory,
715 * but we also don't know of any
716 * references that it should
717 * contain.
718 */
719 strbuf_addf(err, "there is a non-empty directory '%s' "
720 "blocking reference '%s'",
721 ref_file.buf, refname);
722 goto error_return;
723 }
724 }
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200725 } else if (failure_errno == EINVAL && (*type & REF_ISBROKEN)) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200726 strbuf_addf(err, "unable to resolve reference '%s': "
727 "reference broken", refname);
728 goto error_return;
729 } else {
730 strbuf_addf(err, "unable to resolve reference '%s': %s",
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200731 refname, strerror(failure_errno));
Michael Haggerty92b15512016-04-25 15:56:07 +0200732 goto error_return;
733 }
734
735 /*
736 * If the ref did not exist and we are creating it,
Michael Haggerty8ec617c2017-08-17 17:12:50 +0200737 * make sure there is no existing packed ref that
738 * conflicts with refname:
Michael Haggerty92b15512016-04-25 15:56:07 +0200739 */
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200740 if (refs_verify_refname_available(
Michael Haggerty8ec617c2017-08-17 17:12:50 +0200741 refs->packed_ref_store, refname,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +0200742 extras, NULL, err))
Michael Haggerty92b15512016-04-25 15:56:07 +0200743 goto error_return;
Michael Haggerty92b15512016-04-25 15:56:07 +0200744 }
745
746 ret = 0;
747 goto out;
748
749error_return:
750 unlock_ref(lock);
751 *lock_p = NULL;
752
753out:
754 strbuf_release(&ref_file);
755 return ret;
756}
757
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200758struct files_ref_iterator {
759 struct ref_iterator base;
760
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200761 struct ref_iterator *iter0;
Jonathan Tan9bc45a22021-10-08 14:08:15 -0700762 struct repository *repo;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200763 unsigned int flags;
764};
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100765
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200766static int files_ref_iterator_advance(struct ref_iterator *ref_iterator)
767{
768 struct files_ref_iterator *iter =
769 (struct files_ref_iterator *)ref_iterator;
770 int ok;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100771
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200772 while ((ok = ref_iterator_advance(iter->iter0)) == ITER_OK) {
David Turner0c09ec02016-09-04 18:08:44 +0200773 if (iter->flags & DO_FOR_EACH_PER_WORKTREE_ONLY &&
774 ref_type(iter->iter0->refname) != REF_TYPE_PER_WORKTREE)
775 continue;
776
Jeff King8dccb222021-09-24 14:41:32 -0400777 if ((iter->flags & DO_FOR_EACH_OMIT_DANGLING_SYMREFS) &&
778 (iter->iter0->flags & REF_ISSYMREF) &&
779 (iter->iter0->flags & REF_ISBROKEN))
780 continue;
781
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200782 if (!(iter->flags & DO_FOR_EACH_INCLUDE_BROKEN) &&
783 !ref_resolves_to_object(iter->iter0->refname,
Jonathan Tan9bc45a22021-10-08 14:08:15 -0700784 iter->repo,
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200785 iter->iter0->oid,
786 iter->iter0->flags))
787 continue;
788
789 iter->base.refname = iter->iter0->refname;
790 iter->base.oid = iter->iter0->oid;
791 iter->base.flags = iter->iter0->flags;
792 return ITER_OK;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100793 }
794
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200795 iter->iter0 = NULL;
796 if (ref_iterator_abort(ref_iterator) != ITER_DONE)
797 ok = ITER_ERROR;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100798
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200799 return ok;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100800}
801
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200802static int files_ref_iterator_peel(struct ref_iterator *ref_iterator,
803 struct object_id *peeled)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100804{
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200805 struct files_ref_iterator *iter =
806 (struct files_ref_iterator *)ref_iterator;
David Turner93770592016-04-07 15:02:49 -0400807
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200808 return ref_iterator_peel(iter->iter0, peeled);
809}
810
811static int files_ref_iterator_abort(struct ref_iterator *ref_iterator)
812{
813 struct files_ref_iterator *iter =
814 (struct files_ref_iterator *)ref_iterator;
815 int ok = ITER_DONE;
816
817 if (iter->iter0)
818 ok = ref_iterator_abort(iter->iter0);
819
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200820 base_ref_iterator_free(ref_iterator);
821 return ok;
822}
823
824static struct ref_iterator_vtable files_ref_iterator_vtable = {
Ævar Arnfjörð Bjarmasone2f8acb2022-03-17 18:27:16 +0100825 .advance = files_ref_iterator_advance,
826 .peel = files_ref_iterator_peel,
827 .abort = files_ref_iterator_abort,
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200828};
829
Michael Haggerty1a769002016-09-04 18:08:37 +0200830static struct ref_iterator *files_ref_iterator_begin(
Michael Haggerty37b6f6d2016-09-04 18:08:36 +0200831 struct ref_store *ref_store,
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200832 const char *prefix, unsigned int flags)
833{
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700834 struct files_ref_store *refs;
Michael Haggerty8738a8a2017-09-13 19:15:55 +0200835 struct ref_iterator *loose_iter, *packed_iter, *overlay_iter;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200836 struct files_ref_iterator *iter;
837 struct ref_iterator *ref_iterator;
Michael Haggerty0a0865b2017-05-22 16:17:52 +0200838 unsigned int required_flags = REF_STORE_READ;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200839
Michael Haggerty0a0865b2017-05-22 16:17:52 +0200840 if (!(flags & DO_FOR_EACH_INCLUDE_BROKEN))
841 required_flags |= REF_STORE_ODB;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100842
Michael Haggerty0a0865b2017-05-22 16:17:52 +0200843 refs = files_downcast(ref_store, required_flags, "ref_iterator_begin");
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700844
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200845 /*
846 * We must make sure that all loose refs are read before
847 * accessing the packed-refs file; this avoids a race
848 * condition if loose refs are migrated to the packed-refs
849 * file by a simultaneous process, but our in-memory view is
850 * from before the migration. We ensure this as follows:
Michael Haggerty059ae352017-04-16 08:41:39 +0200851 * First, we call start the loose refs iteration with its
852 * `prime_ref` argument set to true. This causes the loose
853 * references in the subtree to be pre-read into the cache.
854 * (If they've already been read, that's OK; we only need to
855 * guarantee that they're read before the packed refs, not
856 * *how much* before.) After that, we call
Michael Haggerty38b86e82017-06-23 09:01:35 +0200857 * packed_ref_iterator_begin(), which internally checks
858 * whether the packed-ref cache is up to date with what is on
859 * disk, and re-reads it if not.
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200860 */
861
Michael Haggerty059ae352017-04-16 08:41:39 +0200862 loose_iter = cache_ref_iterator_begin(get_loose_ref_cache(refs),
Jonathan Tan87881952021-10-08 14:08:16 -0700863 prefix, ref_store->repo, 1);
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200864
Michael Haggerty38b86e82017-06-23 09:01:35 +0200865 /*
866 * The packed-refs file might contain broken references, for
867 * example an old version of a reference that points at an
868 * object that has since been garbage-collected. This is OK as
869 * long as there is a corresponding loose reference that
870 * overrides it, and we don't want to emit an error message in
871 * this case. So ask the packed_ref_store for all of its
872 * references, and (if needed) do our own check for broken
873 * ones in files_ref_iterator_advance(), after we have merged
874 * the packed and loose references.
875 */
Michael Haggertye0cc8ac2017-06-23 09:01:38 +0200876 packed_iter = refs_ref_iterator_begin(
877 refs->packed_ref_store, prefix, 0,
Michael Haggerty38b86e82017-06-23 09:01:35 +0200878 DO_FOR_EACH_INCLUDE_BROKEN);
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200879
Michael Haggerty8738a8a2017-09-13 19:15:55 +0200880 overlay_iter = overlay_ref_iterator_begin(loose_iter, packed_iter);
881
René Scharfeca56dad2021-03-13 17:17:22 +0100882 CALLOC_ARRAY(iter, 1);
Michael Haggerty8738a8a2017-09-13 19:15:55 +0200883 ref_iterator = &iter->base;
884 base_ref_iterator_init(ref_iterator, &files_ref_iterator_vtable,
885 overlay_iter->ordered);
886 iter->iter0 = overlay_iter;
Jonathan Tan9bc45a22021-10-08 14:08:15 -0700887 iter->repo = ref_store->repo;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200888 iter->flags = flags;
889
890 return ref_iterator;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100891}
892
Ævar Arnfjörð Bjarmason3fa2e912021-08-23 13:52:37 +0200893/*
894 * Callback function for raceproof_create_file(). This function is
895 * expected to do something that makes dirname(path) permanent despite
896 * the fact that other processes might be cleaning up empty
897 * directories at the same time. Usually it will create a file named
898 * path, but alternatively it could create another file in that
899 * directory, or even chdir() into that directory. The function should
900 * return 0 if the action was completed successfully. On error, it
901 * should return a nonzero result and set errno.
902 * raceproof_create_file() treats two errno values specially:
903 *
904 * - ENOENT -- dirname(path) does not exist. In this case,
905 * raceproof_create_file() tries creating dirname(path)
906 * (and any parent directories, if necessary) and calls
907 * the function again.
908 *
909 * - EISDIR -- the file already exists and is a directory. In this
910 * case, raceproof_create_file() removes the directory if
911 * it is empty (and recursively any empty directories that
912 * it contains) and calls the function again.
913 *
914 * Any other errno causes raceproof_create_file() to fail with the
915 * callback's return value and errno.
916 *
917 * Obviously, this function should be OK with being called again if it
918 * fails with ENOENT or EISDIR. In other scenarios it will not be
919 * called again.
920 */
921typedef int create_file_fn(const char *path, void *cb);
922
923/*
924 * Create a file in dirname(path) by calling fn, creating leading
925 * directories if necessary. Retry a few times in case we are racing
926 * with another process that is trying to clean up the directory that
927 * contains path. See the documentation for create_file_fn for more
928 * details.
929 *
930 * Return the value and set the errno that resulted from the most
931 * recent call of fn. fn is always called at least once, and will be
932 * called more than once if it returns ENOENT or EISDIR.
933 */
934static int raceproof_create_file(const char *path, create_file_fn fn, void *cb)
935{
936 /*
937 * The number of times we will try to remove empty directories
938 * in the way of path. This is only 1 because if another
939 * process is racily creating directories that conflict with
940 * us, we don't want to fight against them.
941 */
942 int remove_directories_remaining = 1;
943
944 /*
945 * The number of times that we will try to create the
946 * directories containing path. We are willing to attempt this
947 * more than once, because another process could be trying to
948 * clean up empty directories at the same time as we are
949 * trying to create them.
950 */
951 int create_directories_remaining = 3;
952
953 /* A scratch copy of path, filled lazily if we need it: */
954 struct strbuf path_copy = STRBUF_INIT;
955
956 int ret, save_errno;
957
958 /* Sanity check: */
959 assert(*path);
960
961retry_fn:
962 ret = fn(path, cb);
963 save_errno = errno;
964 if (!ret)
965 goto out;
966
967 if (errno == EISDIR && remove_directories_remaining-- > 0) {
968 /*
969 * A directory is in the way. Maybe it is empty; try
970 * to remove it:
971 */
972 if (!path_copy.len)
973 strbuf_addstr(&path_copy, path);
974
975 if (!remove_dir_recursively(&path_copy, REMOVE_DIR_EMPTY_ONLY))
976 goto retry_fn;
977 } else if (errno == ENOENT && create_directories_remaining-- > 0) {
978 /*
979 * Maybe the containing directory didn't exist, or
980 * maybe it was just deleted by a process that is
981 * racing with us to clean up empty directories. Try
982 * to create it:
983 */
984 enum scld_error scld_result;
985
986 if (!path_copy.len)
987 strbuf_addstr(&path_copy, path);
988
989 do {
990 scld_result = safe_create_leading_directories(path_copy.buf);
991 if (scld_result == SCLD_OK)
992 goto retry_fn;
993 } while (scld_result == SCLD_VANISHED && create_directories_remaining-- > 0);
994 }
995
996out:
997 strbuf_release(&path_copy);
998 errno = save_errno;
999 return ret;
1000}
1001
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001002static int remove_empty_directories(struct strbuf *path)
1003{
1004 /*
1005 * we want to create a file but there is a directory there;
1006 * if that is an empty directory (or a directory that contains
1007 * only empty directories), remove them.
1008 */
1009 return remove_dir_recursively(path, REMOVE_DIR_EMPTY_ONLY);
1010}
1011
Michael Haggerty3b5d3c92017-01-06 17:22:28 +01001012static int create_reflock(const char *path, void *cb)
1013{
1014 struct lock_file *lk = cb;
1015
Michael Haggerty4ff0f012017-08-21 13:51:34 +02001016 return hold_lock_file_for_update_timeout(
1017 lk, path, LOCK_NO_DEREF,
1018 get_files_ref_lock_timeout_ms()) < 0 ? -1 : 0;
Michael Haggerty3b5d3c92017-01-06 17:22:28 +01001019}
1020
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001021/*
1022 * Locks a ref returning the lock on success and NULL on failure.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001023 */
brian m. carlson4f01e502017-10-15 22:07:12 +00001024static struct ref_lock *lock_ref_oid_basic(struct files_ref_store *refs,
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001025 const char *refname,
brian m. carlson4f01e502017-10-15 22:07:12 +00001026 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001027{
1028 struct strbuf ref_file = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001029 struct ref_lock *lock;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001030
brian m. carlson4f01e502017-10-15 22:07:12 +00001031 files_assert_main_repository(refs, "lock_ref_oid_basic");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001032 assert(err);
1033
René Scharfeca56dad2021-03-13 17:17:22 +01001034 CALLOC_ARRAY(lock, 1);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001035
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07001036 files_ref_path(refs, &ref_file, refname);
Jeff King2859dcd2016-01-12 16:45:09 -05001037
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001038 /*
1039 * If the ref did not exist and we are creating it, make sure
1040 * there is no existing packed ref whose name begins with our
1041 * refname, nor a packed ref whose name is a proper prefix of
1042 * our refname.
1043 */
1044 if (is_null_oid(&lock->old_oid) &&
Michael Haggerty8ec617c2017-08-17 17:12:50 +02001045 refs_verify_refname_available(refs->packed_ref_store, refname,
Han-Wen Nienhuys1ae6ed22021-08-23 13:52:39 +02001046 NULL, NULL, err))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001047 goto error_return;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001048
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001049 lock->ref_name = xstrdup(refname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001050
Jeff Kingee4d8e42017-09-05 08:15:15 -04001051 if (raceproof_create_file(ref_file.buf, create_reflock, &lock->lk)) {
Michael Haggerty3b5d3c92017-01-06 17:22:28 +01001052 unable_to_lock_message(ref_file.buf, errno, err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001053 goto error_return;
1054 }
1055
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02001056 if (!refs_resolve_ref_unsafe(&refs->base, lock->ref_name, 0,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001057 &lock->old_oid, NULL))
Ævar Arnfjörð Bjarmasonff7a2e42021-08-23 13:36:12 +02001058 oidclr(&lock->old_oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001059 goto out;
1060
1061 error_return:
1062 unlock_ref(lock);
1063 lock = NULL;
1064
1065 out:
1066 strbuf_release(&ref_file);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001067 return lock;
1068}
1069
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001070struct ref_to_prune {
1071 struct ref_to_prune *next;
brian m. carlson49e99582017-10-15 22:06:49 +00001072 struct object_id oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001073 char name[FLEX_ARRAY];
1074};
1075
Michael Haggertya8f0db22017-01-06 17:22:42 +01001076enum {
1077 REMOVE_EMPTY_PARENTS_REF = 0x01,
1078 REMOVE_EMPTY_PARENTS_REFLOG = 0x02
1079};
1080
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001081/*
Michael Haggertya8f0db22017-01-06 17:22:42 +01001082 * Remove empty parent directories associated with the specified
1083 * reference and/or its reflog, but spare [logs/]refs/ and immediate
1084 * subdirs. flags is a combination of REMOVE_EMPTY_PARENTS_REF and/or
1085 * REMOVE_EMPTY_PARENTS_REFLOG.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001086 */
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001087static void try_remove_empty_parents(struct files_ref_store *refs,
1088 const char *refname,
1089 unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001090{
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001091 struct strbuf buf = STRBUF_INIT;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001092 struct strbuf sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001093 char *p, *q;
1094 int i;
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001095
1096 strbuf_addstr(&buf, refname);
1097 p = buf.buf;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001098 for (i = 0; i < 2; i++) { /* refs/{heads,tags,...}/ */
1099 while (*p && *p != '/')
1100 p++;
1101 /* tolerate duplicate slashes; see check_refname_format() */
1102 while (*p == '/')
1103 p++;
1104 }
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001105 q = buf.buf + buf.len;
Michael Haggertya8f0db22017-01-06 17:22:42 +01001106 while (flags & (REMOVE_EMPTY_PARENTS_REF | REMOVE_EMPTY_PARENTS_REFLOG)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001107 while (q > p && *q != '/')
1108 q--;
1109 while (q > p && *(q-1) == '/')
1110 q--;
1111 if (q == p)
1112 break;
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001113 strbuf_setlen(&buf, q - buf.buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001114
1115 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07001116 files_ref_path(refs, &sb, buf.buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001117 if ((flags & REMOVE_EMPTY_PARENTS_REF) && rmdir(sb.buf))
Michael Haggertya8f0db22017-01-06 17:22:42 +01001118 flags &= ~REMOVE_EMPTY_PARENTS_REF;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001119
1120 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001121 files_reflog_path(refs, &sb, buf.buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001122 if ((flags & REMOVE_EMPTY_PARENTS_REFLOG) && rmdir(sb.buf))
Michael Haggertya8f0db22017-01-06 17:22:42 +01001123 flags &= ~REMOVE_EMPTY_PARENTS_REFLOG;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001124 }
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001125 strbuf_release(&buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001126 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001127}
1128
1129/* make sure nobody touched the ref, and unlink */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001130static void prune_ref(struct files_ref_store *refs, struct ref_to_prune *r)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001131{
1132 struct ref_transaction *transaction;
1133 struct strbuf err = STRBUF_INIT;
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001134 int ret = -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001135
1136 if (check_refname_format(r->name, 0))
1137 return;
1138
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001139 transaction = ref_store_transaction_begin(&refs->base, &err);
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001140 if (!transaction)
1141 goto cleanup;
1142 ref_transaction_add_update(
1143 transaction, r->name,
Michael Haggertyacedcde2017-11-05 09:42:07 +01001144 REF_NO_DEREF | REF_HAVE_NEW | REF_HAVE_OLD | REF_IS_PRUNING,
brian m. carlson14228442021-04-26 01:02:56 +00001145 null_oid(), &r->oid, NULL);
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001146 if (ref_transaction_commit(transaction, &err))
1147 goto cleanup;
1148
1149 ret = 0;
1150
1151cleanup:
1152 if (ret)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001153 error("%s", err.buf);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001154 strbuf_release(&err);
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001155 ref_transaction_free(transaction);
1156 return;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001157}
1158
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001159/*
1160 * Prune the loose versions of the references in the linked list
1161 * `*refs_to_prune`, freeing the entries in the list as we go.
1162 */
1163static void prune_refs(struct files_ref_store *refs, struct ref_to_prune **refs_to_prune)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001164{
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001165 while (*refs_to_prune) {
1166 struct ref_to_prune *r = *refs_to_prune;
1167 *refs_to_prune = r->next;
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001168 prune_ref(refs, r);
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001169 free(r);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001170 }
1171}
1172
Michael Haggerty531cc4a2017-05-22 16:17:48 +02001173/*
1174 * Return true if the specified reference should be packed.
1175 */
1176static int should_pack_ref(const char *refname,
1177 const struct object_id *oid, unsigned int ref_flags,
1178 unsigned int pack_flags)
1179{
1180 /* Do not pack per-worktree refs: */
1181 if (ref_type(refname) != REF_TYPE_NORMAL)
1182 return 0;
1183
1184 /* Do not pack non-tags unless PACK_REFS_ALL is set: */
1185 if (!(pack_flags & PACK_REFS_ALL) && !starts_with(refname, "refs/tags/"))
1186 return 0;
1187
1188 /* Do not pack symbolic refs: */
1189 if (ref_flags & REF_ISSYMREF)
1190 return 0;
1191
1192 /* Do not pack broken refs: */
Jonathan Tan9bc45a22021-10-08 14:08:15 -07001193 if (!ref_resolves_to_object(refname, the_repository, oid, ref_flags))
Michael Haggerty531cc4a2017-05-22 16:17:48 +02001194 return 0;
1195
1196 return 1;
1197}
1198
Michael Haggerty82315272016-09-04 18:08:27 +02001199static int files_pack_refs(struct ref_store *ref_store, unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001200{
Michael Haggerty00eebe32016-09-04 18:08:11 +02001201 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001202 files_downcast(ref_store, REF_STORE_WRITE | REF_STORE_ODB,
1203 "pack_refs");
Michael Haggerty50c2d852017-04-16 08:41:41 +02001204 struct ref_iterator *iter;
Michael Haggerty50c2d852017-04-16 08:41:41 +02001205 int ok;
1206 struct ref_to_prune *refs_to_prune = NULL;
Michael Haggerty34789832017-06-23 09:01:39 +02001207 struct strbuf err = STRBUF_INIT;
Michael Haggerty27d03d02017-09-08 15:51:47 +02001208 struct ref_transaction *transaction;
1209
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001210 transaction = ref_store_transaction_begin(refs->packed_ref_store, &err);
Michael Haggerty27d03d02017-09-08 15:51:47 +02001211 if (!transaction)
1212 return -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001213
Michael Haggertyc8bed832017-06-23 09:01:42 +02001214 packed_refs_lock(refs->packed_ref_store, LOCK_DIE_ON_ERROR, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001215
Jonathan Tan87881952021-10-08 14:08:16 -07001216 iter = cache_ref_iterator_begin(get_loose_ref_cache(refs), NULL,
1217 the_repository, 0);
Michael Haggerty50c2d852017-04-16 08:41:41 +02001218 while ((ok = ref_iterator_advance(iter)) == ITER_OK) {
1219 /*
1220 * If the loose reference can be packed, add an entry
1221 * in the packed ref cache. If the reference should be
1222 * pruned, also add it to refs_to_prune.
1223 */
Michael Haggerty531cc4a2017-05-22 16:17:48 +02001224 if (!should_pack_ref(iter->refname, iter->oid, iter->flags,
1225 flags))
Michael Haggerty50c2d852017-04-16 08:41:41 +02001226 continue;
1227
1228 /*
Michael Haggerty27d03d02017-09-08 15:51:47 +02001229 * Add a reference creation for this reference to the
1230 * packed-refs transaction:
Michael Haggerty50c2d852017-04-16 08:41:41 +02001231 */
Michael Haggerty27d03d02017-09-08 15:51:47 +02001232 if (ref_transaction_update(transaction, iter->refname,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00001233 iter->oid, NULL,
Michael Haggerty91774af2017-11-05 09:42:06 +01001234 REF_NO_DEREF, NULL, &err))
Michael Haggerty27d03d02017-09-08 15:51:47 +02001235 die("failure preparing to create packed reference %s: %s",
1236 iter->refname, err.buf);
Michael Haggerty50c2d852017-04-16 08:41:41 +02001237
1238 /* Schedule the loose reference for pruning if requested. */
1239 if ((flags & PACK_REFS_PRUNE)) {
1240 struct ref_to_prune *n;
1241 FLEX_ALLOC_STR(n, name, iter->refname);
brian m. carlson49e99582017-10-15 22:06:49 +00001242 oidcpy(&n->oid, iter->oid);
Michael Haggerty50c2d852017-04-16 08:41:41 +02001243 n->next = refs_to_prune;
1244 refs_to_prune = n;
1245 }
1246 }
1247 if (ok != ITER_DONE)
1248 die("error while iterating over references");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001249
Michael Haggerty27d03d02017-09-08 15:51:47 +02001250 if (ref_transaction_commit(transaction, &err))
1251 die("unable to write new packed-refs: %s", err.buf);
1252
1253 ref_transaction_free(transaction);
1254
Michael Haggerty42c7f7f2017-06-23 09:01:45 +02001255 packed_refs_unlock(refs->packed_ref_store);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001256
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001257 prune_refs(refs, &refs_to_prune);
Michael Haggerty34789832017-06-23 09:01:39 +02001258 strbuf_release(&err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001259 return 0;
1260}
1261
Michael Haggerty64da4192017-05-22 16:17:38 +02001262static int files_delete_refs(struct ref_store *ref_store, const char *msg,
David Turnera27dcf82016-09-04 18:08:40 +02001263 struct string_list *refnames, unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001264{
Michael Haggerty0a95ac52016-09-04 18:08:30 +02001265 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001266 files_downcast(ref_store, REF_STORE_WRITE, "delete_refs");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001267 struct strbuf err = STRBUF_INIT;
1268 int i, result = 0;
1269
1270 if (!refnames->nr)
1271 return 0;
1272
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001273 if (packed_refs_lock(refs->packed_ref_store, 0, &err))
1274 goto error;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001275
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001276 if (refs_delete_refs(refs->packed_ref_store, msg, refnames, flags)) {
1277 packed_refs_unlock(refs->packed_ref_store);
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001278 goto error;
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001279 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001280
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001281 packed_refs_unlock(refs->packed_ref_store);
1282
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001283 for (i = 0; i < refnames->nr; i++) {
1284 const char *refname = refnames->items[i].string;
1285
Michael Haggerty64da4192017-05-22 16:17:38 +02001286 if (refs_delete_ref(&refs->base, msg, refname, NULL, flags))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001287 result |= error(_("could not remove reference %s"), refname);
1288 }
1289
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001290 strbuf_release(&err);
1291 return result;
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001292
1293error:
1294 /*
1295 * If we failed to rewrite the packed-refs file, then it is
1296 * unsafe to try to remove loose refs, because doing so might
1297 * expose an obsolete packed value for a reference that might
1298 * even point at an object that has been garbage collected.
1299 */
1300 if (refnames->nr == 1)
1301 error(_("could not delete reference %s: %s"),
1302 refnames->items[0].string, err.buf);
1303 else
1304 error(_("could not delete references: %s"), err.buf);
1305
1306 strbuf_release(&err);
1307 return -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001308}
1309
1310/*
1311 * People using contrib's git-new-workdir have .git/logs/refs ->
1312 * /some/other/path/.git/logs/refs, and that may live on another device.
1313 *
1314 * IOW, to avoid cross device rename errors, the temporary renamed log must
1315 * live into logs/refs.
1316 */
Nguyễn Thái Ngọc Duya5c1efd2017-03-26 09:42:21 +07001317#define TMP_RENAMED_LOG "refs/.tmp-renamed-log"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001318
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001319struct rename_cb {
1320 const char *tmp_renamed_log;
1321 int true_errno;
1322};
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001323
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001324static int rename_tmp_log_callback(const char *path, void *cb_data)
1325{
1326 struct rename_cb *cb = cb_data;
1327
1328 if (rename(cb->tmp_renamed_log, path)) {
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001329 /*
1330 * rename(a, b) when b is an existing directory ought
1331 * to result in ISDIR, but Solaris 5.8 gives ENOTDIR.
1332 * Sheesh. Record the true errno for error reporting,
1333 * but report EISDIR to raceproof_create_file() so
1334 * that it knows to retry.
1335 */
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001336 cb->true_errno = errno;
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001337 if (errno == ENOTDIR)
1338 errno = EISDIR;
1339 return -1;
1340 } else {
1341 return 0;
1342 }
1343}
1344
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001345static int rename_tmp_log(struct files_ref_store *refs, const char *newrefname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001346{
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001347 struct strbuf path = STRBUF_INIT;
1348 struct strbuf tmp = STRBUF_INIT;
1349 struct rename_cb cb;
1350 int ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001351
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001352 files_reflog_path(refs, &path, newrefname);
1353 files_reflog_path(refs, &tmp, TMP_RENAMED_LOG);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001354 cb.tmp_renamed_log = tmp.buf;
1355 ret = raceproof_create_file(path.buf, rename_tmp_log_callback, &cb);
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001356 if (ret) {
1357 if (errno == EISDIR)
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001358 error("directory not empty: %s", path.buf);
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001359 else
Michael Haggerty990c98d2017-01-06 17:22:30 +01001360 error("unable to move logfile %s to %s: %s",
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001361 tmp.buf, path.buf,
1362 strerror(cb.true_errno));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001363 }
1364
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001365 strbuf_release(&path);
1366 strbuf_release(&tmp);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001367 return ret;
1368}
1369
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001370static int write_ref_to_lockfile(struct ref_lock *lock,
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001371 const struct object_id *oid,
1372 int skip_oid_verification, struct strbuf *err);
Michael Haggertyf18a7892016-09-04 18:08:32 +02001373static int commit_ref_update(struct files_ref_store *refs,
1374 struct ref_lock *lock,
brian m. carlson4417df82017-05-06 22:10:24 +00001375 const struct object_id *oid, const char *logmsg,
Michael Haggerty5d9b2de2016-04-22 14:38:56 +02001376 struct strbuf *err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001377
Ævar Arnfjörð Bjarmasonc339ff62021-10-16 11:39:11 +02001378/*
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001379 * Emit a better error message than lockfile.c's
1380 * unable_to_lock_message() would in case there is a D/F conflict with
1381 * another existing reference. If there would be a conflict, emit an error
Ævar Arnfjörð Bjarmasonc339ff62021-10-16 11:39:11 +02001382 * message and return false; otherwise, return true.
1383 *
1384 * Note that this function is not safe against all races with other
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001385 * processes, and that's not its job. We'll emit a more verbose error on D/f
1386 * conflicts if we get past it into lock_ref_oid_basic().
Ævar Arnfjörð Bjarmasonc339ff62021-10-16 11:39:11 +02001387 */
1388static int refs_rename_ref_available(struct ref_store *refs,
1389 const char *old_refname,
1390 const char *new_refname)
1391{
1392 struct string_list skip = STRING_LIST_INIT_NODUP;
1393 struct strbuf err = STRBUF_INIT;
1394 int ok;
1395
1396 string_list_insert(&skip, old_refname);
1397 ok = !refs_verify_refname_available(refs, new_refname,
1398 NULL, &skip, &err);
1399 if (!ok)
1400 error("%s", err.buf);
1401
1402 string_list_clear(&skip, 0);
1403 strbuf_release(&err);
1404 return ok;
1405}
1406
Sahil Dua52d59cc2017-06-18 23:19:16 +02001407static int files_copy_or_rename_ref(struct ref_store *ref_store,
David Turner9b6b40d2016-09-04 18:08:42 +02001408 const char *oldrefname, const char *newrefname,
Sahil Dua52d59cc2017-06-18 23:19:16 +02001409 const char *logmsg, int copy)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001410{
David Turner9b6b40d2016-09-04 18:08:42 +02001411 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001412 files_downcast(ref_store, REF_STORE_WRITE, "rename_ref");
René Scharfee0ae2442019-12-11 19:46:19 +01001413 struct object_id orig_oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001414 int flag = 0, logmoved = 0;
1415 struct ref_lock *lock;
1416 struct stat loginfo;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001417 struct strbuf sb_oldref = STRBUF_INIT;
1418 struct strbuf sb_newref = STRBUF_INIT;
1419 struct strbuf tmp_renamed_log = STRBUF_INIT;
1420 int log, ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001421 struct strbuf err = STRBUF_INIT;
1422
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001423 files_reflog_path(refs, &sb_oldref, oldrefname);
1424 files_reflog_path(refs, &sb_newref, newrefname);
1425 files_reflog_path(refs, &tmp_renamed_log, TMP_RENAMED_LOG);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001426
1427 log = !lstat(sb_oldref.buf, &loginfo);
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001428 if (log && S_ISLNK(loginfo.st_mode)) {
1429 ret = error("reflog for %s is a symlink", oldrefname);
1430 goto out;
1431 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001432
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001433 if (!refs_resolve_ref_unsafe(&refs->base, oldrefname,
1434 RESOLVE_REF_READING | RESOLVE_REF_NO_RECURSE,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001435 &orig_oid, &flag)) {
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001436 ret = error("refname %s not found", oldrefname);
1437 goto out;
1438 }
Michael Haggertye711b1a2016-04-21 23:42:19 +02001439
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001440 if (flag & REF_ISSYMREF) {
Sahil Dua52d59cc2017-06-18 23:19:16 +02001441 if (copy)
1442 ret = error("refname %s is a symbolic ref, copying it is not supported",
1443 oldrefname);
1444 else
1445 ret = error("refname %s is a symbolic ref, renaming it is not supported",
1446 oldrefname);
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001447 goto out;
1448 }
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +07001449 if (!refs_rename_ref_available(&refs->base, oldrefname, newrefname)) {
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001450 ret = 1;
1451 goto out;
1452 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001453
Sahil Dua52d59cc2017-06-18 23:19:16 +02001454 if (!copy && log && rename(sb_oldref.buf, tmp_renamed_log.buf)) {
Nguyễn Thái Ngọc Duya5c1efd2017-03-26 09:42:21 +07001455 ret = error("unable to move logfile logs/%s to logs/"TMP_RENAMED_LOG": %s",
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001456 oldrefname, strerror(errno));
1457 goto out;
1458 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001459
Sahil Dua52d59cc2017-06-18 23:19:16 +02001460 if (copy && log && copy_file(tmp_renamed_log.buf, sb_oldref.buf, 0644)) {
1461 ret = error("unable to copy logfile logs/%s to logs/"TMP_RENAMED_LOG": %s",
1462 oldrefname, strerror(errno));
1463 goto out;
1464 }
1465
1466 if (!copy && refs_delete_ref(&refs->base, logmsg, oldrefname,
Michael Haggerty91774af2017-11-05 09:42:06 +01001467 &orig_oid, REF_NO_DEREF)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001468 error("unable to delete old %s", oldrefname);
1469 goto rollback;
1470 }
1471
David Turner12fd3492016-02-24 17:58:51 -05001472 /*
brian m. carlson4417df82017-05-06 22:10:24 +00001473 * Since we are doing a shallow lookup, oid is not the
1474 * correct value to pass to delete_ref as old_oid. But that
1475 * doesn't matter, because an old_oid check wouldn't add to
David Turner12fd3492016-02-24 17:58:51 -05001476 * the safety anyway; we want to delete the reference whatever
1477 * its current value.
1478 */
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02001479 if (!copy && refs_resolve_ref_unsafe(&refs->base, newrefname,
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02001480 RESOLVE_REF_READING | RESOLVE_REF_NO_RECURSE,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001481 NULL, NULL) &&
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001482 refs_delete_ref(&refs->base, NULL, newrefname,
Michael Haggerty91774af2017-11-05 09:42:06 +01001483 NULL, REF_NO_DEREF)) {
Michael Haggerty58364322017-01-06 17:22:21 +01001484 if (errno == EISDIR) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001485 struct strbuf path = STRBUF_INIT;
1486 int result;
1487
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07001488 files_ref_path(refs, &path, newrefname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001489 result = remove_empty_directories(&path);
1490 strbuf_release(&path);
1491
1492 if (result) {
1493 error("Directory not empty: %s", newrefname);
1494 goto rollback;
1495 }
1496 } else {
1497 error("unable to delete existing %s", newrefname);
1498 goto rollback;
1499 }
1500 }
1501
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001502 if (log && rename_tmp_log(refs, newrefname))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001503 goto rollback;
1504
1505 logmoved = log;
1506
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001507 lock = lock_ref_oid_basic(refs, newrefname, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001508 if (!lock) {
Sahil Dua52d59cc2017-06-18 23:19:16 +02001509 if (copy)
1510 error("unable to copy '%s' to '%s': %s", oldrefname, newrefname, err.buf);
1511 else
1512 error("unable to rename '%s' to '%s': %s", oldrefname, newrefname, err.buf);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001513 strbuf_release(&err);
1514 goto rollback;
1515 }
brian m. carlson4417df82017-05-06 22:10:24 +00001516 oidcpy(&lock->old_oid, &orig_oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001517
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001518 if (write_ref_to_lockfile(lock, &orig_oid, 0, &err) ||
brian m. carlson4417df82017-05-06 22:10:24 +00001519 commit_ref_update(refs, lock, &orig_oid, logmsg, &err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001520 error("unable to write current sha1 into %s: %s", newrefname, err.buf);
1521 strbuf_release(&err);
1522 goto rollback;
1523 }
1524
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001525 ret = 0;
1526 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001527
1528 rollback:
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001529 lock = lock_ref_oid_basic(refs, oldrefname, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001530 if (!lock) {
1531 error("unable to lock %s for rollback: %s", oldrefname, err.buf);
1532 strbuf_release(&err);
1533 goto rollbacklog;
1534 }
1535
1536 flag = log_all_ref_updates;
Cornelius Weig341fb282017-01-27 11:09:47 +01001537 log_all_ref_updates = LOG_REFS_NONE;
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001538 if (write_ref_to_lockfile(lock, &orig_oid, 0, &err) ||
brian m. carlson4417df82017-05-06 22:10:24 +00001539 commit_ref_update(refs, lock, &orig_oid, NULL, &err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001540 error("unable to write current sha1 into %s: %s", oldrefname, err.buf);
1541 strbuf_release(&err);
1542 }
1543 log_all_ref_updates = flag;
1544
1545 rollbacklog:
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001546 if (logmoved && rename(sb_newref.buf, sb_oldref.buf))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001547 error("unable to restore logfile %s from %s: %s",
1548 oldrefname, newrefname, strerror(errno));
1549 if (!logmoved && log &&
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001550 rename(tmp_renamed_log.buf, sb_oldref.buf))
Nguyễn Thái Ngọc Duya5c1efd2017-03-26 09:42:21 +07001551 error("unable to restore logfile %s from logs/"TMP_RENAMED_LOG": %s",
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001552 oldrefname, strerror(errno));
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001553 ret = 1;
1554 out:
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001555 strbuf_release(&sb_newref);
1556 strbuf_release(&sb_oldref);
1557 strbuf_release(&tmp_renamed_log);
1558
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001559 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001560}
1561
Sahil Dua52d59cc2017-06-18 23:19:16 +02001562static int files_rename_ref(struct ref_store *ref_store,
1563 const char *oldrefname, const char *newrefname,
1564 const char *logmsg)
1565{
1566 return files_copy_or_rename_ref(ref_store, oldrefname,
1567 newrefname, logmsg, 0);
1568}
1569
1570static int files_copy_ref(struct ref_store *ref_store,
1571 const char *oldrefname, const char *newrefname,
1572 const char *logmsg)
1573{
1574 return files_copy_or_rename_ref(ref_store, oldrefname,
1575 newrefname, logmsg, 1);
1576}
1577
Jeff King83a30692017-09-05 08:14:33 -04001578static int close_ref_gently(struct ref_lock *lock)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001579{
Jeff Kingee4d8e42017-09-05 08:15:15 -04001580 if (close_lock_file_gently(&lock->lk))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001581 return -1;
1582 return 0;
1583}
1584
1585static int commit_ref(struct ref_lock *lock)
1586{
Jeff Kingee4d8e42017-09-05 08:15:15 -04001587 char *path = get_locked_file_path(&lock->lk);
Michael Haggerty5387c0d2016-05-05 15:33:03 +02001588 struct stat st;
1589
1590 if (!lstat(path, &st) && S_ISDIR(st.st_mode)) {
1591 /*
1592 * There is a directory at the path we want to rename
1593 * the lockfile to. Hopefully it is empty; try to
1594 * delete it.
1595 */
1596 size_t len = strlen(path);
1597 struct strbuf sb_path = STRBUF_INIT;
1598
1599 strbuf_attach(&sb_path, path, len, len);
1600
1601 /*
1602 * If this fails, commit_lock_file() will also fail
1603 * and will report the problem.
1604 */
1605 remove_empty_directories(&sb_path);
1606 strbuf_release(&sb_path);
1607 } else {
1608 free(path);
1609 }
1610
Jeff Kingee4d8e42017-09-05 08:15:15 -04001611 if (commit_lock_file(&lock->lk))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001612 return -1;
1613 return 0;
1614}
1615
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001616static int open_or_create_logfile(const char *path, void *cb)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001617{
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001618 int *fd = cb;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001619
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001620 *fd = open(path, O_APPEND | O_WRONLY | O_CREAT, 0666);
1621 return (*fd < 0) ? -1 : 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001622}
1623
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001624/*
Michael Haggerty4533e532017-01-06 17:22:36 +01001625 * Create a reflog for a ref. If force_create = 0, only create the
1626 * reflog for certain refs (those for which should_autocreate_reflog
1627 * returns non-zero). Otherwise, create it regardless of the reference
1628 * name. If the logfile already existed or was created, return 0 and
1629 * set *logfd to the file descriptor opened for appending to the file.
1630 * If no logfile exists and we decided not to create one, return 0 and
1631 * set *logfd to -1. On failure, fill in *err, set *logfd to -1, and
1632 * return -1.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001633 */
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001634static int log_ref_setup(struct files_ref_store *refs,
1635 const char *refname, int force_create,
Michael Haggerty4533e532017-01-06 17:22:36 +01001636 int *logfd, struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001637{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001638 struct strbuf logfile_sb = STRBUF_INIT;
1639 char *logfile;
1640
1641 files_reflog_path(refs, &logfile_sb, refname);
1642 logfile = strbuf_detach(&logfile_sb, NULL);
Michael Haggerty854bda62017-01-06 17:22:32 +01001643
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001644 if (force_create || should_autocreate_reflog(refname)) {
Michael Haggerty4533e532017-01-06 17:22:36 +01001645 if (raceproof_create_file(logfile, open_or_create_logfile, logfd)) {
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001646 if (errno == ENOENT)
1647 strbuf_addf(err, "unable to create directory for '%s': "
Michael Haggerty4533e532017-01-06 17:22:36 +01001648 "%s", logfile, strerror(errno));
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001649 else if (errno == EISDIR)
1650 strbuf_addf(err, "there are still logs under '%s'",
Michael Haggerty4533e532017-01-06 17:22:36 +01001651 logfile);
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001652 else
Michael Haggerty854bda62017-01-06 17:22:32 +01001653 strbuf_addf(err, "unable to append to '%s': %s",
Michael Haggerty4533e532017-01-06 17:22:36 +01001654 logfile, strerror(errno));
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001655
Michael Haggerty4533e532017-01-06 17:22:36 +01001656 goto error;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001657 }
Michael Haggerty854bda62017-01-06 17:22:32 +01001658 } else {
René Scharfe35cf94e2021-09-09 23:45:51 +02001659 *logfd = open(logfile, O_APPEND | O_WRONLY);
Michael Haggertye404f452017-01-06 17:22:34 +01001660 if (*logfd < 0) {
Michael Haggerty854bda62017-01-06 17:22:32 +01001661 if (errno == ENOENT || errno == EISDIR) {
1662 /*
1663 * The logfile doesn't already exist,
1664 * but that is not an error; it only
1665 * means that we won't write log
1666 * entries to it.
1667 */
1668 ;
1669 } else {
1670 strbuf_addf(err, "unable to append to '%s': %s",
Michael Haggerty4533e532017-01-06 17:22:36 +01001671 logfile, strerror(errno));
1672 goto error;
Michael Haggerty854bda62017-01-06 17:22:32 +01001673 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001674 }
1675 }
1676
Michael Haggertye404f452017-01-06 17:22:34 +01001677 if (*logfd >= 0)
Michael Haggerty4533e532017-01-06 17:22:36 +01001678 adjust_shared_perm(logfile);
Michael Haggerty854bda62017-01-06 17:22:32 +01001679
Michael Haggerty4533e532017-01-06 17:22:36 +01001680 free(logfile);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001681 return 0;
Michael Haggerty4533e532017-01-06 17:22:36 +01001682
1683error:
1684 free(logfile);
1685 return -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001686}
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001687
Han-Wen Nienhuys7b089122021-11-22 14:19:08 +00001688static int files_create_reflog(struct ref_store *ref_store, const char *refname,
David Turnere3688bd2016-09-04 18:08:38 +02001689 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001690{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001691 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001692 files_downcast(ref_store, REF_STORE_WRITE, "create_reflog");
Michael Haggertye404f452017-01-06 17:22:34 +01001693 int fd;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001694
Han-Wen Nienhuys7b089122021-11-22 14:19:08 +00001695 if (log_ref_setup(refs, refname, 1, &fd, err))
Michael Haggerty4533e532017-01-06 17:22:36 +01001696 return -1;
1697
Michael Haggertye404f452017-01-06 17:22:34 +01001698 if (fd >= 0)
1699 close(fd);
Michael Haggerty4533e532017-01-06 17:22:36 +01001700
1701 return 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001702}
1703
brian m. carlson4417df82017-05-06 22:10:24 +00001704static int log_ref_write_fd(int fd, const struct object_id *old_oid,
1705 const struct object_id *new_oid,
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001706 const char *committer, const char *msg)
1707{
Ben Peart80a6c202018-07-10 21:08:22 +00001708 struct strbuf sb = STRBUF_INIT;
1709 int ret = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001710
Ben Peart80a6c202018-07-10 21:08:22 +00001711 strbuf_addf(&sb, "%s %s %s", oid_to_hex(old_oid), oid_to_hex(new_oid), committer);
Han-Wen Nienhuys25429fe2020-07-31 11:36:10 +00001712 if (msg && *msg) {
1713 strbuf_addch(&sb, '\t');
Junio C Hamano523fa692020-07-10 17:19:53 +00001714 strbuf_addstr(&sb, msg);
Han-Wen Nienhuys25429fe2020-07-31 11:36:10 +00001715 }
Ben Peart80a6c202018-07-10 21:08:22 +00001716 strbuf_addch(&sb, '\n');
1717 if (write_in_full(fd, sb.buf, sb.len) < 0)
1718 ret = -1;
1719 strbuf_release(&sb);
1720 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001721}
1722
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001723static int files_log_ref_write(struct files_ref_store *refs,
brian m. carlson4417df82017-05-06 22:10:24 +00001724 const char *refname, const struct object_id *old_oid,
1725 const struct object_id *new_oid, const char *msg,
Nguyễn Thái Ngọc Duy11f84572017-03-26 09:42:15 +07001726 int flags, struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001727{
Michael Haggertye404f452017-01-06 17:22:34 +01001728 int logfd, result;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001729
Cornelius Weig341fb282017-01-27 11:09:47 +01001730 if (log_all_ref_updates == LOG_REFS_UNSET)
1731 log_all_ref_updates = is_bare_repository() ? LOG_REFS_NONE : LOG_REFS_NORMAL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001732
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001733 result = log_ref_setup(refs, refname,
1734 flags & REF_FORCE_CREATE_REFLOG,
Michael Haggerty4533e532017-01-06 17:22:36 +01001735 &logfd, err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001736
1737 if (result)
1738 return result;
1739
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001740 if (logfd < 0)
1741 return 0;
brian m. carlson4417df82017-05-06 22:10:24 +00001742 result = log_ref_write_fd(logfd, old_oid, new_oid,
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001743 git_committer_info(0), msg);
1744 if (result) {
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001745 struct strbuf sb = STRBUF_INIT;
Michael Haggerty87b21e02017-01-06 17:22:35 +01001746 int save_errno = errno;
1747
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001748 files_reflog_path(refs, &sb, refname);
Michael Haggerty87b21e02017-01-06 17:22:35 +01001749 strbuf_addf(err, "unable to append to '%s': %s",
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001750 sb.buf, strerror(save_errno));
1751 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001752 close(logfd);
1753 return -1;
1754 }
1755 if (close(logfd)) {
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001756 struct strbuf sb = STRBUF_INIT;
Michael Haggerty87b21e02017-01-06 17:22:35 +01001757 int save_errno = errno;
1758
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001759 files_reflog_path(refs, &sb, refname);
Michael Haggerty87b21e02017-01-06 17:22:35 +01001760 strbuf_addf(err, "unable to append to '%s': %s",
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001761 sb.buf, strerror(save_errno));
1762 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001763 return -1;
1764 }
1765 return 0;
1766}
1767
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001768/*
Michael Haggerty78fb4572017-11-05 09:42:09 +01001769 * Write oid into the open lockfile, then close the lockfile. On
1770 * errors, rollback the lockfile, fill in *err and return -1.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001771 */
1772static int write_ref_to_lockfile(struct ref_lock *lock,
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001773 const struct object_id *oid,
1774 int skip_oid_verification, struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001775{
1776 static char term = '\n';
1777 struct object *o;
1778 int fd;
1779
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001780 if (!skip_oid_verification) {
1781 o = parse_object(the_repository, oid);
1782 if (!o) {
1783 strbuf_addf(
1784 err,
1785 "trying to write ref '%s' with nonexistent object %s",
1786 lock->ref_name, oid_to_hex(oid));
1787 unlock_ref(lock);
1788 return -1;
1789 }
1790 if (o->type != OBJ_COMMIT && is_branch(lock->ref_name)) {
1791 strbuf_addf(
1792 err,
1793 "trying to write non-commit object %s to branch '%s'",
1794 oid_to_hex(oid), lock->ref_name);
1795 unlock_ref(lock);
1796 return -1;
1797 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001798 }
Jeff Kingee4d8e42017-09-05 08:15:15 -04001799 fd = get_lock_file_fd(&lock->lk);
brian m. carlson2ae2e2a2018-07-16 01:27:59 +00001800 if (write_in_full(fd, oid_to_hex(oid), the_hash_algo->hexsz) < 0 ||
Jeff King06f46f22017-09-13 13:16:03 -04001801 write_in_full(fd, &term, 1) < 0 ||
Patrick Steinhardtbc22d842022-03-11 10:58:59 +01001802 fsync_component(FSYNC_COMPONENT_REFERENCE, get_lock_file_fd(&lock->lk)) < 0 ||
Jeff King83a30692017-09-05 08:14:33 -04001803 close_ref_gently(lock) < 0) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001804 strbuf_addf(err,
Jeff Kingee4d8e42017-09-05 08:15:15 -04001805 "couldn't write '%s'", get_lock_file_path(&lock->lk));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001806 unlock_ref(lock);
1807 return -1;
1808 }
1809 return 0;
1810}
1811
1812/*
1813 * Commit a change to a loose reference that has already been written
1814 * to the loose reference lockfile. Also update the reflogs if
1815 * necessary, using the specified lockmsg (which can be NULL).
1816 */
Michael Haggertyf18a7892016-09-04 18:08:32 +02001817static int commit_ref_update(struct files_ref_store *refs,
1818 struct ref_lock *lock,
brian m. carlson4417df82017-05-06 22:10:24 +00001819 const struct object_id *oid, const char *logmsg,
Michael Haggerty5d9b2de2016-04-22 14:38:56 +02001820 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001821{
Michael Haggerty32c597e2017-02-10 12:16:16 +01001822 files_assert_main_repository(refs, "commit_ref_update");
Michael Haggerty00eebe32016-09-04 18:08:11 +02001823
1824 clear_loose_ref_cache(refs);
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001825 if (files_log_ref_write(refs, lock->ref_name,
brian m. carlson4417df82017-05-06 22:10:24 +00001826 &lock->old_oid, oid,
Michael Haggerty81b1b6d2017-01-06 17:22:31 +01001827 logmsg, 0, err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001828 char *old_msg = strbuf_detach(err, NULL);
Michael Haggerty0568c8e2016-04-27 15:21:36 +02001829 strbuf_addf(err, "cannot update the ref '%s': %s",
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001830 lock->ref_name, old_msg);
1831 free(old_msg);
1832 unlock_ref(lock);
1833 return -1;
1834 }
Michael Haggerty7a418f32016-04-22 15:25:25 +02001835
1836 if (strcmp(lock->ref_name, "HEAD") != 0) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001837 /*
1838 * Special hack: If a branch is updated directly and HEAD
1839 * points to it (may happen on the remote side of a push
1840 * for example) then logically the HEAD reflog should be
1841 * updated too.
1842 * A generic solution implies reverse symref information,
1843 * but finding all symrefs pointing to the given branch
1844 * would be rather costly for this rare event (the direct
1845 * update of a branch) to be worth it. So let's cheat and
1846 * check with HEAD only which should cover 99% of all usage
1847 * scenarios (even 100% of the default ones).
1848 */
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001849 int head_flag;
1850 const char *head_ref;
Michael Haggerty7a418f32016-04-22 15:25:25 +02001851
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001852 head_ref = refs_resolve_ref_unsafe(&refs->base, "HEAD",
1853 RESOLVE_REF_READING,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001854 NULL, &head_flag);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001855 if (head_ref && (head_flag & REF_ISSYMREF) &&
1856 !strcmp(head_ref, lock->ref_name)) {
1857 struct strbuf log_err = STRBUF_INIT;
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001858 if (files_log_ref_write(refs, "HEAD",
brian m. carlson4417df82017-05-06 22:10:24 +00001859 &lock->old_oid, oid,
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001860 logmsg, 0, &log_err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001861 error("%s", log_err.buf);
1862 strbuf_release(&log_err);
1863 }
1864 }
1865 }
Michael Haggerty7a418f32016-04-22 15:25:25 +02001866
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001867 if (commit_ref(lock)) {
Michael Haggerty0568c8e2016-04-27 15:21:36 +02001868 strbuf_addf(err, "couldn't set '%s'", lock->ref_name);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001869 unlock_ref(lock);
1870 return -1;
1871 }
1872
1873 unlock_ref(lock);
1874 return 0;
1875}
1876
Jeff King370e5ad2015-12-29 00:57:01 -05001877static int create_ref_symlink(struct ref_lock *lock, const char *target)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001878{
Jeff King370e5ad2015-12-29 00:57:01 -05001879 int ret = -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001880#ifndef NO_SYMLINK_HEAD
Jeff Kingee4d8e42017-09-05 08:15:15 -04001881 char *ref_path = get_locked_file_path(&lock->lk);
Jeff King370e5ad2015-12-29 00:57:01 -05001882 unlink(ref_path);
1883 ret = symlink(target, ref_path);
1884 free(ref_path);
1885
1886 if (ret)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001887 fprintf(stderr, "no symlink - falling back to symbolic ref\n");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001888#endif
Jeff King370e5ad2015-12-29 00:57:01 -05001889 return ret;
1890}
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001891
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001892static void update_symref_reflog(struct files_ref_store *refs,
1893 struct ref_lock *lock, const char *refname,
Jeff King370e5ad2015-12-29 00:57:01 -05001894 const char *target, const char *logmsg)
1895{
1896 struct strbuf err = STRBUF_INIT;
brian m. carlson4417df82017-05-06 22:10:24 +00001897 struct object_id new_oid;
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02001898
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001899 if (logmsg &&
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02001900 refs_resolve_ref_unsafe(&refs->base, target,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001901 RESOLVE_REF_READING, &new_oid, NULL) &&
brian m. carlson4417df82017-05-06 22:10:24 +00001902 files_log_ref_write(refs, refname, &lock->old_oid,
1903 &new_oid, logmsg, 0, &err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001904 error("%s", err.buf);
1905 strbuf_release(&err);
1906 }
Jeff King370e5ad2015-12-29 00:57:01 -05001907}
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001908
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001909static int create_symref_locked(struct files_ref_store *refs,
1910 struct ref_lock *lock, const char *refname,
Jeff King370e5ad2015-12-29 00:57:01 -05001911 const char *target, const char *logmsg)
1912{
1913 if (prefer_symlink_refs && !create_ref_symlink(lock, target)) {
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001914 update_symref_reflog(refs, lock, refname, target, logmsg);
Jeff King370e5ad2015-12-29 00:57:01 -05001915 return 0;
1916 }
1917
Jeff Kingee4d8e42017-09-05 08:15:15 -04001918 if (!fdopen_lock_file(&lock->lk, "w"))
Jeff King370e5ad2015-12-29 00:57:01 -05001919 return error("unable to fdopen %s: %s",
Martin Ågren7f0dc792021-01-05 20:23:49 +01001920 get_lock_file_path(&lock->lk), strerror(errno));
Jeff King370e5ad2015-12-29 00:57:01 -05001921
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001922 update_symref_reflog(refs, lock, refname, target, logmsg);
Jeff King396da8f2015-12-29 00:57:25 -05001923
Jeff King370e5ad2015-12-29 00:57:01 -05001924 /* no error check; commit_ref will check ferror */
Martin Ågren7f0dc792021-01-05 20:23:49 +01001925 fprintf(get_lock_file_fp(&lock->lk), "ref: %s\n", target);
Jeff King370e5ad2015-12-29 00:57:01 -05001926 if (commit_ref(lock) < 0)
1927 return error("unable to write symref for %s: %s", refname,
1928 strerror(errno));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001929 return 0;
1930}
1931
Michael Haggerty284689b2016-09-04 18:08:28 +02001932static int files_create_symref(struct ref_store *ref_store,
1933 const char *refname, const char *target,
1934 const char *logmsg)
Jeff King370e5ad2015-12-29 00:57:01 -05001935{
Michael Haggerty7eb27cd2016-09-04 18:08:34 +02001936 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001937 files_downcast(ref_store, REF_STORE_WRITE, "create_symref");
Jeff King370e5ad2015-12-29 00:57:01 -05001938 struct strbuf err = STRBUF_INIT;
1939 struct ref_lock *lock;
1940 int ret;
1941
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001942 lock = lock_ref_oid_basic(refs, refname, &err);
Jeff King370e5ad2015-12-29 00:57:01 -05001943 if (!lock) {
1944 error("%s", err.buf);
1945 strbuf_release(&err);
1946 return -1;
1947 }
1948
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001949 ret = create_symref_locked(refs, lock, refname, target, logmsg);
Jeff King370e5ad2015-12-29 00:57:01 -05001950 unlock_ref(lock);
1951 return ret;
1952}
1953
David Turnere3688bd2016-09-04 18:08:38 +02001954static int files_reflog_exists(struct ref_store *ref_store,
1955 const char *refname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001956{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001957 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001958 files_downcast(ref_store, REF_STORE_READ, "reflog_exists");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001959 struct strbuf sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001960 struct stat st;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001961 int ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001962
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001963 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001964 ret = !lstat(sb.buf, &st) && S_ISREG(st.st_mode);
1965 strbuf_release(&sb);
1966 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001967}
1968
David Turnere3688bd2016-09-04 18:08:38 +02001969static int files_delete_reflog(struct ref_store *ref_store,
1970 const char *refname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001971{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001972 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001973 files_downcast(ref_store, REF_STORE_WRITE, "delete_reflog");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001974 struct strbuf sb = STRBUF_INIT;
1975 int ret;
1976
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001977 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001978 ret = remove_path(sb.buf);
1979 strbuf_release(&sb);
1980 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001981}
1982
1983static int show_one_reflog_ent(struct strbuf *sb, each_reflog_ent_fn fn, void *cb_data)
1984{
brian m. carlson9461d272017-02-21 23:47:32 +00001985 struct object_id ooid, noid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001986 char *email_end, *message;
Johannes Schindelindddbad72017-04-26 21:29:31 +02001987 timestamp_t timestamp;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001988 int tz;
brian m. carlson43bc3b62017-02-21 23:47:33 +00001989 const char *p = sb->buf;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001990
1991 /* old SP new SP name <email> SP time TAB msg LF */
brian m. carlson43bc3b62017-02-21 23:47:33 +00001992 if (!sb->len || sb->buf[sb->len - 1] != '\n' ||
1993 parse_oid_hex(p, &ooid, &p) || *p++ != ' ' ||
1994 parse_oid_hex(p, &noid, &p) || *p++ != ' ' ||
1995 !(email_end = strchr(p, '>')) ||
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001996 email_end[1] != ' ' ||
Johannes Schindelin1aeb7e72017-04-21 12:45:44 +02001997 !(timestamp = parse_timestamp(email_end + 2, &message, 10)) ||
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001998 !message || message[0] != ' ' ||
1999 (message[1] != '+' && message[1] != '-') ||
2000 !isdigit(message[2]) || !isdigit(message[3]) ||
2001 !isdigit(message[4]) || !isdigit(message[5]))
2002 return 0; /* corrupt? */
2003 email_end[1] = '\0';
2004 tz = strtol(message + 1, NULL, 10);
2005 if (message[6] != '\t')
2006 message += 6;
2007 else
2008 message += 7;
brian m. carlson43bc3b62017-02-21 23:47:33 +00002009 return fn(&ooid, &noid, p, timestamp, tz, message, cb_data);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002010}
2011
2012static char *find_beginning_of_line(char *bob, char *scan)
2013{
2014 while (bob < scan && *(--scan) != '\n')
2015 ; /* keep scanning backwards */
2016 /*
2017 * Return either beginning of the buffer, or LF at the end of
2018 * the previous line.
2019 */
2020 return scan;
2021}
2022
David Turnere3688bd2016-09-04 18:08:38 +02002023static int files_for_each_reflog_ent_reverse(struct ref_store *ref_store,
2024 const char *refname,
2025 each_reflog_ent_fn fn,
2026 void *cb_data)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002027{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002028 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07002029 files_downcast(ref_store, REF_STORE_READ,
2030 "for_each_reflog_ent_reverse");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002031 struct strbuf sb = STRBUF_INIT;
2032 FILE *logfp;
2033 long pos;
2034 int ret = 0, at_tail = 1;
2035
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002036 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002037 logfp = fopen(sb.buf, "r");
2038 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002039 if (!logfp)
2040 return -1;
2041
2042 /* Jump to the end */
2043 if (fseek(logfp, 0, SEEK_END) < 0)
René Scharfebe686f02017-04-16 18:55:46 +02002044 ret = error("cannot seek back reflog for %s: %s",
2045 refname, strerror(errno));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002046 pos = ftell(logfp);
2047 while (!ret && 0 < pos) {
2048 int cnt;
2049 size_t nread;
2050 char buf[BUFSIZ];
2051 char *endp, *scanp;
2052
2053 /* Fill next block from the end */
2054 cnt = (sizeof(buf) < pos) ? sizeof(buf) : pos;
René Scharfebe686f02017-04-16 18:55:46 +02002055 if (fseek(logfp, pos - cnt, SEEK_SET)) {
2056 ret = error("cannot seek back reflog for %s: %s",
2057 refname, strerror(errno));
2058 break;
2059 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002060 nread = fread(buf, cnt, 1, logfp);
René Scharfebe686f02017-04-16 18:55:46 +02002061 if (nread != 1) {
2062 ret = error("cannot read %d bytes from reflog for %s: %s",
2063 cnt, refname, strerror(errno));
2064 break;
2065 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002066 pos -= cnt;
2067
2068 scanp = endp = buf + cnt;
2069 if (at_tail && scanp[-1] == '\n')
2070 /* Looking at the final LF at the end of the file */
2071 scanp--;
2072 at_tail = 0;
2073
2074 while (buf < scanp) {
2075 /*
2076 * terminating LF of the previous line, or the beginning
2077 * of the buffer.
2078 */
2079 char *bp;
2080
2081 bp = find_beginning_of_line(buf, scanp);
2082
2083 if (*bp == '\n') {
2084 /*
2085 * The newline is the end of the previous line,
2086 * so we know we have complete line starting
2087 * at (bp + 1). Prefix it onto any prior data
2088 * we collected for the line and process it.
2089 */
2090 strbuf_splice(&sb, 0, 0, bp + 1, endp - (bp + 1));
2091 scanp = bp;
2092 endp = bp + 1;
2093 ret = show_one_reflog_ent(&sb, fn, cb_data);
2094 strbuf_reset(&sb);
2095 if (ret)
2096 break;
2097 } else if (!pos) {
2098 /*
2099 * We are at the start of the buffer, and the
2100 * start of the file; there is no previous
2101 * line, and we have everything for this one.
2102 * Process it, and we can end the loop.
2103 */
2104 strbuf_splice(&sb, 0, 0, buf, endp - buf);
2105 ret = show_one_reflog_ent(&sb, fn, cb_data);
2106 strbuf_reset(&sb);
2107 break;
2108 }
2109
2110 if (bp == buf) {
2111 /*
2112 * We are at the start of the buffer, and there
2113 * is more file to read backwards. Which means
2114 * we are in the middle of a line. Note that we
2115 * may get here even if *bp was a newline; that
2116 * just means we are at the exact end of the
2117 * previous line, rather than some spot in the
2118 * middle.
2119 *
2120 * Save away what we have to be combined with
2121 * the data from the next read.
2122 */
2123 strbuf_splice(&sb, 0, 0, buf, endp - buf);
2124 break;
2125 }
2126 }
2127
2128 }
2129 if (!ret && sb.len)
Johannes Schindelin033abf92018-05-02 11:38:39 +02002130 BUG("reverse reflog parser had leftover data");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002131
2132 fclose(logfp);
2133 strbuf_release(&sb);
2134 return ret;
2135}
2136
David Turnere3688bd2016-09-04 18:08:38 +02002137static int files_for_each_reflog_ent(struct ref_store *ref_store,
2138 const char *refname,
2139 each_reflog_ent_fn fn, void *cb_data)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002140{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002141 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07002142 files_downcast(ref_store, REF_STORE_READ,
2143 "for_each_reflog_ent");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002144 FILE *logfp;
2145 struct strbuf sb = STRBUF_INIT;
2146 int ret = 0;
2147
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002148 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002149 logfp = fopen(sb.buf, "r");
2150 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002151 if (!logfp)
2152 return -1;
2153
2154 while (!ret && !strbuf_getwholeline(&sb, logfp, '\n'))
2155 ret = show_one_reflog_ent(&sb, fn, cb_data);
2156 fclose(logfp);
2157 strbuf_release(&sb);
2158 return ret;
2159}
Michael Haggerty2880d162016-06-18 06:15:19 +02002160
2161struct files_reflog_iterator {
2162 struct ref_iterator base;
2163
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07002164 struct ref_store *ref_store;
Michael Haggerty2880d162016-06-18 06:15:19 +02002165 struct dir_iterator *dir_iterator;
2166 struct object_id oid;
2167};
2168
2169static int files_reflog_iterator_advance(struct ref_iterator *ref_iterator)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002170{
Michael Haggerty2880d162016-06-18 06:15:19 +02002171 struct files_reflog_iterator *iter =
2172 (struct files_reflog_iterator *)ref_iterator;
2173 struct dir_iterator *diter = iter->dir_iterator;
2174 int ok;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002175
Michael Haggerty2880d162016-06-18 06:15:19 +02002176 while ((ok = dir_iterator_advance(diter)) == ITER_OK) {
2177 int flags;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002178
Michael Haggerty2880d162016-06-18 06:15:19 +02002179 if (!S_ISREG(diter->st.st_mode))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002180 continue;
Michael Haggerty2880d162016-06-18 06:15:19 +02002181 if (diter->basename[0] == '.')
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002182 continue;
Michael Haggerty2880d162016-06-18 06:15:19 +02002183 if (ends_with(diter->basename, ".lock"))
2184 continue;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002185
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02002186 if (!refs_resolve_ref_unsafe(iter->ref_store,
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02002187 diter->relative_path, 0,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01002188 &iter->oid, &flags)) {
Michael Haggerty2880d162016-06-18 06:15:19 +02002189 error("bad ref for %s", diter->path.buf);
2190 continue;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002191 }
Michael Haggerty2880d162016-06-18 06:15:19 +02002192
2193 iter->base.refname = diter->relative_path;
2194 iter->base.oid = &iter->oid;
2195 iter->base.flags = flags;
2196 return ITER_OK;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002197 }
Michael Haggerty2880d162016-06-18 06:15:19 +02002198
2199 iter->dir_iterator = NULL;
2200 if (ref_iterator_abort(ref_iterator) == ITER_ERROR)
2201 ok = ITER_ERROR;
2202 return ok;
2203}
2204
2205static int files_reflog_iterator_peel(struct ref_iterator *ref_iterator,
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00002206 struct object_id *peeled)
Michael Haggerty2880d162016-06-18 06:15:19 +02002207{
Johannes Schindelin033abf92018-05-02 11:38:39 +02002208 BUG("ref_iterator_peel() called for reflog_iterator");
Michael Haggerty2880d162016-06-18 06:15:19 +02002209}
2210
2211static int files_reflog_iterator_abort(struct ref_iterator *ref_iterator)
2212{
2213 struct files_reflog_iterator *iter =
2214 (struct files_reflog_iterator *)ref_iterator;
2215 int ok = ITER_DONE;
2216
2217 if (iter->dir_iterator)
2218 ok = dir_iterator_abort(iter->dir_iterator);
2219
2220 base_ref_iterator_free(ref_iterator);
2221 return ok;
2222}
2223
2224static struct ref_iterator_vtable files_reflog_iterator_vtable = {
Ævar Arnfjörð Bjarmasone2f8acb2022-03-17 18:27:16 +01002225 .advance = files_reflog_iterator_advance,
2226 .peel = files_reflog_iterator_peel,
2227 .abort = files_reflog_iterator_abort,
Michael Haggerty2880d162016-06-18 06:15:19 +02002228};
2229
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002230static struct ref_iterator *reflog_iterator_begin(struct ref_store *ref_store,
2231 const char *gitdir)
Michael Haggerty2880d162016-06-18 06:15:19 +02002232{
Matheus Tavares30123972019-07-10 20:58:59 -03002233 struct dir_iterator *diter;
2234 struct files_reflog_iterator *iter;
2235 struct ref_iterator *ref_iterator;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002236 struct strbuf sb = STRBUF_INIT;
Michael Haggerty2880d162016-06-18 06:15:19 +02002237
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002238 strbuf_addf(&sb, "%s/logs", gitdir);
Matheus Tavares30123972019-07-10 20:58:59 -03002239
Matheus Tavaresfa1da7d2019-07-10 20:59:00 -03002240 diter = dir_iterator_begin(sb.buf, 0);
René Scharfe9b7b0292019-08-07 13:15:14 +02002241 if (!diter) {
2242 strbuf_release(&sb);
Matheus Tavares30123972019-07-10 20:58:59 -03002243 return empty_ref_iterator_begin();
René Scharfe9b7b0292019-08-07 13:15:14 +02002244 }
Matheus Tavares30123972019-07-10 20:58:59 -03002245
René Scharfeca56dad2021-03-13 17:17:22 +01002246 CALLOC_ARRAY(iter, 1);
Matheus Tavares30123972019-07-10 20:58:59 -03002247 ref_iterator = &iter->base;
2248
2249 base_ref_iterator_init(ref_iterator, &files_reflog_iterator_vtable, 0);
2250 iter->dir_iterator = diter;
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07002251 iter->ref_store = ref_store;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002252 strbuf_release(&sb);
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002253
Michael Haggerty2880d162016-06-18 06:15:19 +02002254 return ref_iterator;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002255}
2256
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002257static enum iterator_selection reflog_iterator_select(
2258 struct ref_iterator *iter_worktree,
2259 struct ref_iterator *iter_common,
2260 void *cb_data)
2261{
2262 if (iter_worktree) {
2263 /*
2264 * We're a bit loose here. We probably should ignore
2265 * common refs if they are accidentally added as
2266 * per-worktree refs.
2267 */
2268 return ITER_SELECT_0;
2269 } else if (iter_common) {
2270 if (ref_type(iter_common->refname) == REF_TYPE_NORMAL)
2271 return ITER_SELECT_1;
2272
2273 /*
2274 * The main ref store may contain main worktree's
2275 * per-worktree refs, which should be ignored
2276 */
2277 return ITER_SKIP_1;
2278 } else
2279 return ITER_DONE;
2280}
2281
2282static struct ref_iterator *files_reflog_iterator_begin(struct ref_store *ref_store)
2283{
2284 struct files_ref_store *refs =
2285 files_downcast(ref_store, REF_STORE_READ,
2286 "reflog_iterator_begin");
2287
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +00002288 if (!strcmp(refs->base.gitdir, refs->gitcommondir)) {
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002289 return reflog_iterator_begin(ref_store, refs->gitcommondir);
2290 } else {
2291 return merge_ref_iterator_begin(
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +00002292 0, reflog_iterator_begin(ref_store, refs->base.gitdir),
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002293 reflog_iterator_begin(ref_store, refs->gitcommondir),
2294 reflog_iterator_select, refs);
2295 }
2296}
2297
Michael Haggerty165056b2016-04-24 08:58:41 +02002298/*
Michael Haggerty92b15512016-04-25 15:56:07 +02002299 * If update is a direct update of head_ref (the reference pointed to
2300 * by HEAD), then add an extra REF_LOG_ONLY update for HEAD.
Michael Haggerty165056b2016-04-24 08:58:41 +02002301 */
Michael Haggerty92b15512016-04-25 15:56:07 +02002302static int split_head_update(struct ref_update *update,
2303 struct ref_transaction *transaction,
2304 const char *head_ref,
2305 struct string_list *affected_refnames,
2306 struct strbuf *err)
2307{
2308 struct string_list_item *item;
2309 struct ref_update *new_update;
2310
2311 if ((update->flags & REF_LOG_ONLY) ||
Michael Haggertyacedcde2017-11-05 09:42:07 +01002312 (update->flags & REF_IS_PRUNING) ||
Michael Haggerty92b15512016-04-25 15:56:07 +02002313 (update->flags & REF_UPDATE_VIA_HEAD))
2314 return 0;
2315
2316 if (strcmp(update->refname, head_ref))
2317 return 0;
2318
2319 /*
2320 * First make sure that HEAD is not already in the
Martin Ågren276d0e32017-09-09 08:57:18 +02002321 * transaction. This check is O(lg N) in the transaction
Michael Haggerty92b15512016-04-25 15:56:07 +02002322 * size, but it happens at most once per transaction.
2323 */
Martin Ågren276d0e32017-09-09 08:57:18 +02002324 if (string_list_has_string(affected_refnames, "HEAD")) {
Michael Haggerty92b15512016-04-25 15:56:07 +02002325 /* An entry already existed */
2326 strbuf_addf(err,
2327 "multiple updates for 'HEAD' (including one "
2328 "via its referent '%s') are not allowed",
2329 update->refname);
2330 return TRANSACTION_NAME_CONFLICT;
2331 }
2332
2333 new_update = ref_transaction_add_update(
2334 transaction, "HEAD",
Michael Haggerty91774af2017-11-05 09:42:06 +01002335 update->flags | REF_LOG_ONLY | REF_NO_DEREF,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00002336 &update->new_oid, &update->old_oid,
Michael Haggerty92b15512016-04-25 15:56:07 +02002337 update->msg);
2338
Martin Ågren276d0e32017-09-09 08:57:18 +02002339 /*
2340 * Add "HEAD". This insertion is O(N) in the transaction
2341 * size, but it happens at most once per transaction.
2342 * Add new_update->refname instead of a literal "HEAD".
2343 */
2344 if (strcmp(new_update->refname, "HEAD"))
2345 BUG("%s unexpectedly not 'HEAD'", new_update->refname);
2346 item = string_list_insert(affected_refnames, new_update->refname);
Michael Haggerty92b15512016-04-25 15:56:07 +02002347 item->util = new_update;
2348
2349 return 0;
2350}
2351
2352/*
2353 * update is for a symref that points at referent and doesn't have
Michael Haggerty91774af2017-11-05 09:42:06 +01002354 * REF_NO_DEREF set. Split it into two updates:
2355 * - The original update, but with REF_LOG_ONLY and REF_NO_DEREF set
Michael Haggerty92b15512016-04-25 15:56:07 +02002356 * - A new, separate update for the referent reference
2357 * Note that the new update will itself be subject to splitting when
2358 * the iteration gets to it.
2359 */
Jeff King10dee402019-02-14 00:50:46 -05002360static int split_symref_update(struct ref_update *update,
Michael Haggerty92b15512016-04-25 15:56:07 +02002361 const char *referent,
Michael Haggerty165056b2016-04-24 08:58:41 +02002362 struct ref_transaction *transaction,
2363 struct string_list *affected_refnames,
2364 struct strbuf *err)
2365{
Michael Haggerty92b15512016-04-25 15:56:07 +02002366 struct string_list_item *item;
2367 struct ref_update *new_update;
2368 unsigned int new_flags;
Michael Haggerty165056b2016-04-24 08:58:41 +02002369
Michael Haggerty92b15512016-04-25 15:56:07 +02002370 /*
2371 * First make sure that referent is not already in the
Martin Ågrenc2994682017-09-09 08:57:15 +02002372 * transaction. This check is O(lg N) in the transaction
Michael Haggerty92b15512016-04-25 15:56:07 +02002373 * size, but it happens at most once per symref in a
2374 * transaction.
2375 */
Martin Ågrenc2994682017-09-09 08:57:15 +02002376 if (string_list_has_string(affected_refnames, referent)) {
2377 /* An entry already exists */
Michael Haggerty92b15512016-04-25 15:56:07 +02002378 strbuf_addf(err,
2379 "multiple updates for '%s' (including one "
2380 "via symref '%s') are not allowed",
2381 referent, update->refname);
2382 return TRANSACTION_NAME_CONFLICT;
2383 }
2384
2385 new_flags = update->flags;
2386 if (!strcmp(update->refname, "HEAD")) {
2387 /*
2388 * Record that the new update came via HEAD, so that
2389 * when we process it, split_head_update() doesn't try
2390 * to add another reflog update for HEAD. Note that
2391 * this bit will be propagated if the new_update
2392 * itself needs to be split.
2393 */
2394 new_flags |= REF_UPDATE_VIA_HEAD;
2395 }
2396
2397 new_update = ref_transaction_add_update(
2398 transaction, referent, new_flags,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00002399 &update->new_oid, &update->old_oid,
Michael Haggerty92b15512016-04-25 15:56:07 +02002400 update->msg);
2401
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002402 new_update->parent_update = update;
2403
2404 /*
2405 * Change the symbolic ref update to log only. Also, it
Michael Haggerty78fb4572017-11-05 09:42:09 +01002406 * doesn't need to check its old OID value, as that will be
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002407 * done when new_update is processed.
2408 */
Michael Haggerty91774af2017-11-05 09:42:06 +01002409 update->flags |= REF_LOG_ONLY | REF_NO_DEREF;
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002410 update->flags &= ~REF_HAVE_OLD;
Michael Haggerty92b15512016-04-25 15:56:07 +02002411
Martin Ågrenc2994682017-09-09 08:57:15 +02002412 /*
2413 * Add the referent. This insertion is O(N) in the transaction
2414 * size, but it happens at most once per symref in a
2415 * transaction. Make sure to add new_update->refname, which will
2416 * be valid as long as affected_refnames is in use, and NOT
2417 * referent, which might soon be freed by our caller.
2418 */
2419 item = string_list_insert(affected_refnames, new_update->refname);
2420 if (item->util)
2421 BUG("%s unexpectedly found in affected_refnames",
2422 new_update->refname);
Michael Haggerty92b15512016-04-25 15:56:07 +02002423 item->util = new_update;
2424
2425 return 0;
2426}
2427
2428/*
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002429 * Return the refname under which update was originally requested.
2430 */
2431static const char *original_update_refname(struct ref_update *update)
2432{
2433 while (update->parent_update)
2434 update = update->parent_update;
2435
2436 return update->refname;
2437}
2438
2439/*
Michael Haggertye3f51032016-06-07 09:29:23 +02002440 * Check whether the REF_HAVE_OLD and old_oid values stored in update
2441 * are consistent with oid, which is the reference's current value. If
2442 * everything is OK, return 0; otherwise, write an error message to
2443 * err and return -1.
2444 */
2445static int check_old_oid(struct ref_update *update, struct object_id *oid,
2446 struct strbuf *err)
2447{
2448 if (!(update->flags & REF_HAVE_OLD) ||
Jeff King4a7e27e2018-08-28 17:22:40 -04002449 oideq(oid, &update->old_oid))
Michael Haggertye3f51032016-06-07 09:29:23 +02002450 return 0;
2451
brian m. carlson98491292017-05-06 22:10:23 +00002452 if (is_null_oid(&update->old_oid))
Michael Haggertye3f51032016-06-07 09:29:23 +02002453 strbuf_addf(err, "cannot lock ref '%s': "
2454 "reference already exists",
2455 original_update_refname(update));
2456 else if (is_null_oid(oid))
2457 strbuf_addf(err, "cannot lock ref '%s': "
2458 "reference is missing but expected %s",
2459 original_update_refname(update),
brian m. carlson98491292017-05-06 22:10:23 +00002460 oid_to_hex(&update->old_oid));
Michael Haggertye3f51032016-06-07 09:29:23 +02002461 else
2462 strbuf_addf(err, "cannot lock ref '%s': "
2463 "is at %s but expected %s",
2464 original_update_refname(update),
2465 oid_to_hex(oid),
brian m. carlson98491292017-05-06 22:10:23 +00002466 oid_to_hex(&update->old_oid));
Michael Haggertye3f51032016-06-07 09:29:23 +02002467
2468 return -1;
2469}
2470
2471/*
Michael Haggerty92b15512016-04-25 15:56:07 +02002472 * Prepare for carrying out update:
2473 * - Lock the reference referred to by update.
2474 * - Read the reference under lock.
Michael Haggerty78fb4572017-11-05 09:42:09 +01002475 * - Check that its old OID value (if specified) is correct, and in
Michael Haggerty92b15512016-04-25 15:56:07 +02002476 * any case record it in update->lock->old_oid for later use when
2477 * writing the reflog.
Michael Haggerty91774af2017-11-05 09:42:06 +01002478 * - If it is a symref update without REF_NO_DEREF, split it up into a
Michael Haggerty92b15512016-04-25 15:56:07 +02002479 * REF_LOG_ONLY update of the symref and add a separate update for
2480 * the referent to transaction.
2481 * - If it is an update of head_ref, add a corresponding REF_LOG_ONLY
2482 * update of HEAD.
2483 */
Michael Haggertyb3bbbc52016-09-04 18:08:33 +02002484static int lock_ref_for_update(struct files_ref_store *refs,
2485 struct ref_update *update,
Michael Haggerty92b15512016-04-25 15:56:07 +02002486 struct ref_transaction *transaction,
2487 const char *head_ref,
2488 struct string_list *affected_refnames,
2489 struct strbuf *err)
2490{
2491 struct strbuf referent = STRBUF_INIT;
2492 int mustexist = (update->flags & REF_HAVE_OLD) &&
brian m. carlson98491292017-05-06 22:10:23 +00002493 !is_null_oid(&update->old_oid);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002494 int ret = 0;
Michael Haggerty92b15512016-04-25 15:56:07 +02002495 struct ref_lock *lock;
2496
Michael Haggerty32c597e2017-02-10 12:16:16 +01002497 files_assert_main_repository(refs, "lock_ref_for_update");
Michael Haggertyb3bbbc52016-09-04 18:08:33 +02002498
brian m. carlson98491292017-05-06 22:10:23 +00002499 if ((update->flags & REF_HAVE_NEW) && is_null_oid(&update->new_oid))
Michael Haggerty165056b2016-04-24 08:58:41 +02002500 update->flags |= REF_DELETING;
Michael Haggerty92b15512016-04-25 15:56:07 +02002501
2502 if (head_ref) {
2503 ret = split_head_update(update, transaction, head_ref,
2504 affected_refnames, err);
2505 if (ret)
Martin Ågren851e1fb2017-09-09 08:57:16 +02002506 goto out;
Michael Haggerty92b15512016-04-25 15:56:07 +02002507 }
2508
Michael Haggertyf7b0a982016-09-04 18:08:31 +02002509 ret = lock_raw_ref(refs, update->refname, mustexist,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +02002510 affected_refnames,
David Turner7d618262016-09-04 18:08:43 +02002511 &lock, &referent,
Michael Haggerty92b15512016-04-25 15:56:07 +02002512 &update->type, err);
Michael Haggerty92b15512016-04-25 15:56:07 +02002513 if (ret) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002514 char *reason;
2515
Michael Haggerty165056b2016-04-24 08:58:41 +02002516 reason = strbuf_detach(err, NULL);
2517 strbuf_addf(err, "cannot lock ref '%s': %s",
Michael Haggertye3f51032016-06-07 09:29:23 +02002518 original_update_refname(update), reason);
Michael Haggerty165056b2016-04-24 08:58:41 +02002519 free(reason);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002520 goto out;
Michael Haggerty165056b2016-04-24 08:58:41 +02002521 }
Michael Haggerty92b15512016-04-25 15:56:07 +02002522
David Turner7d618262016-09-04 18:08:43 +02002523 update->backend_data = lock;
Michael Haggerty92b15512016-04-25 15:56:07 +02002524
Michael Haggerty92b15512016-04-25 15:56:07 +02002525 if (update->type & REF_ISSYMREF) {
Michael Haggerty91774af2017-11-05 09:42:06 +01002526 if (update->flags & REF_NO_DEREF) {
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002527 /*
2528 * We won't be reading the referent as part of
2529 * the transaction, so we have to read it here
Michael Haggerty78fb4572017-11-05 09:42:09 +01002530 * to record and possibly check old_oid:
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002531 */
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02002532 if (!refs_resolve_ref_unsafe(&refs->base,
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02002533 referent.buf, 0,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01002534 &lock->old_oid, NULL)) {
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002535 if (update->flags & REF_HAVE_OLD) {
2536 strbuf_addf(err, "cannot lock ref '%s': "
Michael Haggertye3f51032016-06-07 09:29:23 +02002537 "error reading reference",
2538 original_update_refname(update));
Martin Ågren3f5ef952017-09-09 08:57:17 +02002539 ret = TRANSACTION_GENERIC_ERROR;
Martin Ågren851e1fb2017-09-09 08:57:16 +02002540 goto out;
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002541 }
Michael Haggertye3f51032016-06-07 09:29:23 +02002542 } else if (check_old_oid(update, &lock->old_oid, err)) {
Martin Ågren851e1fb2017-09-09 08:57:16 +02002543 ret = TRANSACTION_GENERIC_ERROR;
2544 goto out;
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002545 }
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002546 } else {
2547 /*
2548 * Create a new update for the reference this
2549 * symref is pointing at. Also, we will record
Michael Haggerty78fb4572017-11-05 09:42:09 +01002550 * and verify old_oid for this update as part
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002551 * of processing the split-off update, so we
2552 * don't have to do it here.
2553 */
Jeff King10dee402019-02-14 00:50:46 -05002554 ret = split_symref_update(update,
Michael Haggertyfcc42ea2016-09-04 18:08:35 +02002555 referent.buf, transaction,
Michael Haggerty92b15512016-04-25 15:56:07 +02002556 affected_refnames, err);
2557 if (ret)
Martin Ågren851e1fb2017-09-09 08:57:16 +02002558 goto out;
Michael Haggerty92b15512016-04-25 15:56:07 +02002559 }
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002560 } else {
2561 struct ref_update *parent_update;
Michael Haggerty8169d0d2016-04-25 17:38:35 +02002562
Martin Ågren851e1fb2017-09-09 08:57:16 +02002563 if (check_old_oid(update, &lock->old_oid, err)) {
2564 ret = TRANSACTION_GENERIC_ERROR;
2565 goto out;
2566 }
Michael Haggertye3f51032016-06-07 09:29:23 +02002567
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002568 /*
2569 * If this update is happening indirectly because of a
Michael Haggerty78fb4572017-11-05 09:42:09 +01002570 * symref update, record the old OID in the parent
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002571 * update:
2572 */
2573 for (parent_update = update->parent_update;
2574 parent_update;
2575 parent_update = parent_update->parent_update) {
David Turner7d618262016-09-04 18:08:43 +02002576 struct ref_lock *parent_lock = parent_update->backend_data;
2577 oidcpy(&parent_lock->old_oid, &lock->old_oid);
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002578 }
Michael Haggerty92b15512016-04-25 15:56:07 +02002579 }
2580
Michael Haggerty165056b2016-04-24 08:58:41 +02002581 if ((update->flags & REF_HAVE_NEW) &&
2582 !(update->flags & REF_DELETING) &&
2583 !(update->flags & REF_LOG_ONLY)) {
Michael Haggerty92b15512016-04-25 15:56:07 +02002584 if (!(update->type & REF_ISSYMREF) &&
Jeff King4a7e27e2018-08-28 17:22:40 -04002585 oideq(&lock->old_oid, &update->new_oid)) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002586 /*
2587 * The reference already has the desired
2588 * value, so we don't need to write it.
2589 */
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00002590 } else if (write_ref_to_lockfile(
2591 lock, &update->new_oid,
2592 update->flags & REF_SKIP_OID_VERIFICATION,
2593 err)) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002594 char *write_err = strbuf_detach(err, NULL);
2595
2596 /*
2597 * The lock was freed upon failure of
2598 * write_ref_to_lockfile():
2599 */
David Turner7d618262016-09-04 18:08:43 +02002600 update->backend_data = NULL;
Michael Haggerty165056b2016-04-24 08:58:41 +02002601 strbuf_addf(err,
Michael Haggertye3f51032016-06-07 09:29:23 +02002602 "cannot update ref '%s': %s",
Michael Haggerty165056b2016-04-24 08:58:41 +02002603 update->refname, write_err);
2604 free(write_err);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002605 ret = TRANSACTION_GENERIC_ERROR;
2606 goto out;
Michael Haggerty165056b2016-04-24 08:58:41 +02002607 } else {
2608 update->flags |= REF_NEEDS_COMMIT;
2609 }
2610 }
2611 if (!(update->flags & REF_NEEDS_COMMIT)) {
2612 /*
2613 * We didn't call write_ref_to_lockfile(), so
2614 * the lockfile is still open. Close it to
2615 * free up the file descriptor:
2616 */
Jeff King83a30692017-09-05 08:14:33 -04002617 if (close_ref_gently(lock)) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002618 strbuf_addf(err, "couldn't close '%s.lock'",
2619 update->refname);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002620 ret = TRANSACTION_GENERIC_ERROR;
2621 goto out;
Michael Haggerty165056b2016-04-24 08:58:41 +02002622 }
2623 }
Martin Ågren851e1fb2017-09-09 08:57:16 +02002624
2625out:
2626 strbuf_release(&referent);
2627 return ret;
Michael Haggerty165056b2016-04-24 08:58:41 +02002628}
2629
Michael Haggertydc39e092017-09-08 15:51:51 +02002630struct files_transaction_backend_data {
2631 struct ref_transaction *packed_transaction;
2632 int packed_refs_locked;
2633};
2634
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002635/*
2636 * Unlock any references in `transaction` that are still locked, and
2637 * mark the transaction closed.
2638 */
Michael Haggertydc39e092017-09-08 15:51:51 +02002639static void files_transaction_cleanup(struct files_ref_store *refs,
2640 struct ref_transaction *transaction)
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002641{
2642 size_t i;
Michael Haggertydc39e092017-09-08 15:51:51 +02002643 struct files_transaction_backend_data *backend_data =
2644 transaction->backend_data;
2645 struct strbuf err = STRBUF_INIT;
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002646
2647 for (i = 0; i < transaction->nr; i++) {
2648 struct ref_update *update = transaction->updates[i];
2649 struct ref_lock *lock = update->backend_data;
2650
2651 if (lock) {
2652 unlock_ref(lock);
2653 update->backend_data = NULL;
2654 }
2655 }
2656
Patrick Steinhardtedc30692020-03-30 15:46:13 +02002657 if (backend_data) {
2658 if (backend_data->packed_transaction &&
2659 ref_transaction_abort(backend_data->packed_transaction, &err)) {
2660 error("error aborting transaction: %s", err.buf);
2661 strbuf_release(&err);
2662 }
2663
2664 if (backend_data->packed_refs_locked)
2665 packed_refs_unlock(refs->packed_ref_store);
2666
2667 free(backend_data);
Michael Haggertydc39e092017-09-08 15:51:51 +02002668 }
2669
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002670 transaction->state = REF_TRANSACTION_CLOSED;
2671}
2672
Michael Haggerty30173b82017-05-22 16:17:44 +02002673static int files_transaction_prepare(struct ref_store *ref_store,
2674 struct ref_transaction *transaction,
2675 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002676{
Michael Haggerty00eebe32016-09-04 18:08:11 +02002677 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07002678 files_downcast(ref_store, REF_STORE_WRITE,
Michael Haggerty30173b82017-05-22 16:17:44 +02002679 "ref_transaction_prepare");
Michael Haggerty43a2dfd2017-05-22 16:17:37 +02002680 size_t i;
2681 int ret = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002682 struct string_list affected_refnames = STRING_LIST_INIT_NODUP;
Michael Haggerty92b15512016-04-25 15:56:07 +02002683 char *head_ref = NULL;
2684 int head_type;
Michael Haggertydc39e092017-09-08 15:51:51 +02002685 struct files_transaction_backend_data *backend_data;
2686 struct ref_transaction *packed_transaction = NULL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002687
2688 assert(err);
2689
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002690 if (!transaction->nr)
2691 goto cleanup;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002692
René Scharfeca56dad2021-03-13 17:17:22 +01002693 CALLOC_ARRAY(backend_data, 1);
Michael Haggertydc39e092017-09-08 15:51:51 +02002694 transaction->backend_data = backend_data;
2695
Michael Haggerty92b15512016-04-25 15:56:07 +02002696 /*
2697 * Fail if a refname appears more than once in the
2698 * transaction. (If we end up splitting up any updates using
2699 * split_symref_update() or split_head_update(), those
2700 * functions will check that the new updates don't have the
Michael Haggerty62c72d12017-11-05 09:42:04 +01002701 * same refname as any existing ones.) Also fail if any of the
Michael Haggertyacedcde2017-11-05 09:42:07 +01002702 * updates use REF_IS_PRUNING without REF_NO_DEREF.
Michael Haggerty92b15512016-04-25 15:56:07 +02002703 */
2704 for (i = 0; i < transaction->nr; i++) {
2705 struct ref_update *update = transaction->updates[i];
2706 struct string_list_item *item =
2707 string_list_append(&affected_refnames, update->refname);
2708
Michael Haggertyacedcde2017-11-05 09:42:07 +01002709 if ((update->flags & REF_IS_PRUNING) &&
Michael Haggerty91774af2017-11-05 09:42:06 +01002710 !(update->flags & REF_NO_DEREF))
Michael Haggertyacedcde2017-11-05 09:42:07 +01002711 BUG("REF_IS_PRUNING set without REF_NO_DEREF");
Michael Haggerty62c72d12017-11-05 09:42:04 +01002712
Michael Haggerty92b15512016-04-25 15:56:07 +02002713 /*
2714 * We store a pointer to update in item->util, but at
2715 * the moment we never use the value of this field
2716 * except to check whether it is non-NULL.
2717 */
2718 item->util = update;
2719 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002720 string_list_sort(&affected_refnames);
2721 if (ref_update_reject_duplicates(&affected_refnames, err)) {
2722 ret = TRANSACTION_GENERIC_ERROR;
2723 goto cleanup;
2724 }
2725
2726 /*
Michael Haggerty92b15512016-04-25 15:56:07 +02002727 * Special hack: If a branch is updated directly and HEAD
2728 * points to it (may happen on the remote side of a push
2729 * for example) then logically the HEAD reflog should be
2730 * updated too.
2731 *
2732 * A generic solution would require reverse symref lookups,
2733 * but finding all symrefs pointing to a given branch would be
2734 * rather costly for this rare event (the direct update of a
2735 * branch) to be worth it. So let's cheat and check with HEAD
2736 * only, which should cover 99% of all usage scenarios (even
2737 * 100% of the default ones).
2738 *
2739 * So if HEAD is a symbolic reference, then record the name of
2740 * the reference that it points to. If we see an update of
2741 * head_ref within the transaction, then split_head_update()
2742 * arranges for the reflog of HEAD to be updated, too.
2743 */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07002744 head_ref = refs_resolve_refdup(ref_store, "HEAD",
2745 RESOLVE_REF_NO_RECURSE,
René Scharfe872ccb22017-10-01 09:28:50 +02002746 NULL, &head_type);
Michael Haggerty92b15512016-04-25 15:56:07 +02002747
2748 if (head_ref && !(head_type & REF_ISSYMREF)) {
Ævar Arnfjörð Bjarmason6a83d902017-06-15 23:15:46 +00002749 FREE_AND_NULL(head_ref);
Michael Haggerty92b15512016-04-25 15:56:07 +02002750 }
2751
2752 /*
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002753 * Acquire all locks, verify old values if provided, check
2754 * that new values are valid, and write new values to the
2755 * lockfiles, ready to be activated. Only keep one lockfile
2756 * open at a time to avoid running out of file descriptors.
Michael Haggerty30173b82017-05-22 16:17:44 +02002757 * Note that lock_ref_for_update() might append more updates
2758 * to the transaction.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002759 */
Michael Haggertyefe47282016-04-22 00:02:50 +02002760 for (i = 0; i < transaction->nr; i++) {
2761 struct ref_update *update = transaction->updates[i];
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002762
Michael Haggertyb3bbbc52016-09-04 18:08:33 +02002763 ret = lock_ref_for_update(refs, update, transaction,
2764 head_ref, &affected_refnames, err);
Michael Haggerty165056b2016-04-24 08:58:41 +02002765 if (ret)
Michael Haggertyda5267f2017-10-24 17:16:25 +02002766 goto cleanup;
Michael Haggertydc39e092017-09-08 15:51:51 +02002767
2768 if (update->flags & REF_DELETING &&
2769 !(update->flags & REF_LOG_ONLY) &&
Michael Haggertyacedcde2017-11-05 09:42:07 +01002770 !(update->flags & REF_IS_PRUNING)) {
Michael Haggertydc39e092017-09-08 15:51:51 +02002771 /*
2772 * This reference has to be deleted from
2773 * packed-refs if it exists there.
2774 */
2775 if (!packed_transaction) {
2776 packed_transaction = ref_store_transaction_begin(
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07002777 refs->packed_ref_store, err);
Michael Haggertydc39e092017-09-08 15:51:51 +02002778 if (!packed_transaction) {
2779 ret = TRANSACTION_GENERIC_ERROR;
2780 goto cleanup;
2781 }
2782
2783 backend_data->packed_transaction =
2784 packed_transaction;
2785 }
2786
2787 ref_transaction_add_update(
2788 packed_transaction, update->refname,
Michael Haggerty91774af2017-11-05 09:42:06 +01002789 REF_HAVE_NEW | REF_NO_DEREF,
Michael Haggertyb0ca4112017-11-05 09:42:01 +01002790 &update->new_oid, NULL,
Michael Haggertydc39e092017-09-08 15:51:51 +02002791 NULL);
2792 }
2793 }
2794
2795 if (packed_transaction) {
2796 if (packed_refs_lock(refs->packed_ref_store, 0, err)) {
2797 ret = TRANSACTION_GENERIC_ERROR;
2798 goto cleanup;
2799 }
2800 backend_data->packed_refs_locked = 1;
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002801
2802 if (is_packed_transaction_needed(refs->packed_ref_store,
2803 packed_transaction)) {
2804 ret = ref_transaction_prepare(packed_transaction, err);
Jeff King249e8dc2019-03-21 05:28:44 -04002805 /*
2806 * A failure during the prepare step will abort
2807 * itself, but not free. Do that now, and disconnect
2808 * from the files_transaction so it does not try to
2809 * abort us when we hit the cleanup code below.
2810 */
2811 if (ret) {
2812 ref_transaction_free(packed_transaction);
2813 backend_data->packed_transaction = NULL;
2814 }
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002815 } else {
2816 /*
2817 * We can skip rewriting the `packed-refs`
2818 * file. But we do need to leave it locked, so
2819 * that somebody else doesn't pack a reference
2820 * that we are trying to delete.
Jeff Kingd3322eb2019-03-21 05:28:54 -04002821 *
2822 * We need to disconnect our transaction from
2823 * backend_data, since the abort (whether successful or
2824 * not) will free it.
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002825 */
Jeff Kingd3322eb2019-03-21 05:28:54 -04002826 backend_data->packed_transaction = NULL;
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002827 if (ref_transaction_abort(packed_transaction, err)) {
2828 ret = TRANSACTION_GENERIC_ERROR;
2829 goto cleanup;
2830 }
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002831 }
Michael Haggerty30173b82017-05-22 16:17:44 +02002832 }
2833
2834cleanup:
2835 free(head_ref);
2836 string_list_clear(&affected_refnames, 0);
2837
2838 if (ret)
Michael Haggertydc39e092017-09-08 15:51:51 +02002839 files_transaction_cleanup(refs, transaction);
Michael Haggerty30173b82017-05-22 16:17:44 +02002840 else
2841 transaction->state = REF_TRANSACTION_PREPARED;
2842
2843 return ret;
2844}
2845
2846static int files_transaction_finish(struct ref_store *ref_store,
2847 struct ref_transaction *transaction,
2848 struct strbuf *err)
2849{
2850 struct files_ref_store *refs =
2851 files_downcast(ref_store, 0, "ref_transaction_finish");
2852 size_t i;
2853 int ret = 0;
Michael Haggerty30173b82017-05-22 16:17:44 +02002854 struct strbuf sb = STRBUF_INIT;
Michael Haggertydc39e092017-09-08 15:51:51 +02002855 struct files_transaction_backend_data *backend_data;
2856 struct ref_transaction *packed_transaction;
2857
Michael Haggerty30173b82017-05-22 16:17:44 +02002858
2859 assert(err);
2860
2861 if (!transaction->nr) {
2862 transaction->state = REF_TRANSACTION_CLOSED;
2863 return 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002864 }
2865
Michael Haggertydc39e092017-09-08 15:51:51 +02002866 backend_data = transaction->backend_data;
2867 packed_transaction = backend_data->packed_transaction;
2868
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002869 /* Perform updates first so live commits remain referenced */
Michael Haggertyefe47282016-04-22 00:02:50 +02002870 for (i = 0; i < transaction->nr; i++) {
2871 struct ref_update *update = transaction->updates[i];
David Turner7d618262016-09-04 18:08:43 +02002872 struct ref_lock *lock = update->backend_data;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002873
David Turnerd99aa882016-02-24 17:58:50 -05002874 if (update->flags & REF_NEEDS_COMMIT ||
2875 update->flags & REF_LOG_ONLY) {
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002876 if (files_log_ref_write(refs,
2877 lock->ref_name,
brian m. carlson4417df82017-05-06 22:10:24 +00002878 &lock->old_oid,
2879 &update->new_oid,
Michael Haggerty81b1b6d2017-01-06 17:22:31 +01002880 update->msg, update->flags,
2881 err)) {
Michael Haggerty92b15512016-04-25 15:56:07 +02002882 char *old_msg = strbuf_detach(err, NULL);
2883
2884 strbuf_addf(err, "cannot update the ref '%s': %s",
2885 lock->ref_name, old_msg);
2886 free(old_msg);
2887 unlock_ref(lock);
David Turner7d618262016-09-04 18:08:43 +02002888 update->backend_data = NULL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002889 ret = TRANSACTION_GENERIC_ERROR;
2890 goto cleanup;
Michael Haggerty92b15512016-04-25 15:56:07 +02002891 }
2892 }
2893 if (update->flags & REF_NEEDS_COMMIT) {
Michael Haggerty00eebe32016-09-04 18:08:11 +02002894 clear_loose_ref_cache(refs);
Michael Haggerty92b15512016-04-25 15:56:07 +02002895 if (commit_ref(lock)) {
2896 strbuf_addf(err, "couldn't set '%s'", lock->ref_name);
2897 unlock_ref(lock);
David Turner7d618262016-09-04 18:08:43 +02002898 update->backend_data = NULL;
Michael Haggerty92b15512016-04-25 15:56:07 +02002899 ret = TRANSACTION_GENERIC_ERROR;
2900 goto cleanup;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002901 }
2902 }
2903 }
Michael Haggertydc39e092017-09-08 15:51:51 +02002904
2905 /*
Michael Haggerty5e00a6c2017-09-08 15:51:53 +02002906 * Now that updates are safely completed, we can perform
2907 * deletes. First delete the reflogs of any references that
2908 * will be deleted, since (in the unexpected event of an
2909 * error) leaving a reference without a reflog is less bad
2910 * than leaving a reflog without a reference (the latter is a
2911 * mildly invalid repository state):
2912 */
2913 for (i = 0; i < transaction->nr; i++) {
2914 struct ref_update *update = transaction->updates[i];
2915 if (update->flags & REF_DELETING &&
2916 !(update->flags & REF_LOG_ONLY) &&
Michael Haggertyacedcde2017-11-05 09:42:07 +01002917 !(update->flags & REF_IS_PRUNING)) {
Michael Haggerty5e00a6c2017-09-08 15:51:53 +02002918 strbuf_reset(&sb);
2919 files_reflog_path(refs, &sb, update->refname);
2920 if (!unlink_or_warn(sb.buf))
2921 try_remove_empty_parents(refs, update->refname,
2922 REMOVE_EMPTY_PARENTS_REFLOG);
2923 }
2924 }
2925
2926 /*
Michael Haggertydc39e092017-09-08 15:51:51 +02002927 * Perform deletes now that updates are safely completed.
2928 *
2929 * First delete any packed versions of the references, while
2930 * retaining the packed-refs lock:
2931 */
2932 if (packed_transaction) {
2933 ret = ref_transaction_commit(packed_transaction, err);
2934 ref_transaction_free(packed_transaction);
2935 packed_transaction = NULL;
2936 backend_data->packed_transaction = NULL;
2937 if (ret)
2938 goto cleanup;
2939 }
2940
2941 /* Now delete the loose versions of the references: */
Michael Haggertyefe47282016-04-22 00:02:50 +02002942 for (i = 0; i < transaction->nr; i++) {
2943 struct ref_update *update = transaction->updates[i];
David Turner7d618262016-09-04 18:08:43 +02002944 struct ref_lock *lock = update->backend_data;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002945
David Turnerd99aa882016-02-24 17:58:50 -05002946 if (update->flags & REF_DELETING &&
2947 !(update->flags & REF_LOG_ONLY)) {
Will Chandler5f03e512021-05-08 01:00:43 -04002948 update->flags |= REF_DELETED_RMDIR;
Michael Haggertyce0af242017-01-06 17:22:39 +01002949 if (!(update->type & REF_ISPACKED) ||
2950 update->type & REF_ISSYMREF) {
2951 /* It is a loose reference. */
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002952 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07002953 files_ref_path(refs, &sb, lock->ref_name);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002954 if (unlink_or_msg(sb.buf, err)) {
Michael Haggertyce0af242017-01-06 17:22:39 +01002955 ret = TRANSACTION_GENERIC_ERROR;
2956 goto cleanup;
2957 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002958 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002959 }
2960 }
2961
Michael Haggerty00eebe32016-09-04 18:08:11 +02002962 clear_loose_ref_cache(refs);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002963
2964cleanup:
Michael Haggertydc39e092017-09-08 15:51:51 +02002965 files_transaction_cleanup(refs, transaction);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002966
Michael Haggerty44639772017-01-06 17:22:43 +01002967 for (i = 0; i < transaction->nr; i++) {
2968 struct ref_update *update = transaction->updates[i];
Michael Haggerty44639772017-01-06 17:22:43 +01002969
Will Chandler5f03e512021-05-08 01:00:43 -04002970 if (update->flags & REF_DELETED_RMDIR) {
Michael Haggerty44639772017-01-06 17:22:43 +01002971 /*
Will Chandler5f03e512021-05-08 01:00:43 -04002972 * The reference was deleted. Delete any
Michael Haggerty44639772017-01-06 17:22:43 +01002973 * empty parent directories. (Note that this
2974 * can only work because we have already
2975 * removed the lockfile.)
2976 */
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002977 try_remove_empty_parents(refs, update->refname,
Michael Haggerty44639772017-01-06 17:22:43 +01002978 REMOVE_EMPTY_PARENTS_REF);
2979 }
2980 }
2981
Michael Haggerty30173b82017-05-22 16:17:44 +02002982 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002983 return ret;
2984}
2985
Michael Haggerty30173b82017-05-22 16:17:44 +02002986static int files_transaction_abort(struct ref_store *ref_store,
2987 struct ref_transaction *transaction,
2988 struct strbuf *err)
2989{
Michael Haggertydc39e092017-09-08 15:51:51 +02002990 struct files_ref_store *refs =
2991 files_downcast(ref_store, 0, "ref_transaction_abort");
2992
2993 files_transaction_cleanup(refs, transaction);
Michael Haggerty30173b82017-05-22 16:17:44 +02002994 return 0;
2995}
2996
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002997static int ref_present(const char *refname,
2998 const struct object_id *oid, int flags, void *cb_data)
2999{
3000 struct string_list *affected_refnames = cb_data;
3001
3002 return string_list_has_string(affected_refnames, refname);
3003}
3004
David Turnerfc681462016-09-04 18:08:39 +02003005static int files_initial_transaction_commit(struct ref_store *ref_store,
3006 struct ref_transaction *transaction,
3007 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003008{
Michael Haggertyd99825a2016-09-04 18:08:12 +02003009 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07003010 files_downcast(ref_store, REF_STORE_WRITE,
3011 "initial_ref_transaction_commit");
Michael Haggerty43a2dfd2017-05-22 16:17:37 +02003012 size_t i;
3013 int ret = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003014 struct string_list affected_refnames = STRING_LIST_INIT_NODUP;
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003015 struct ref_transaction *packed_transaction = NULL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003016
3017 assert(err);
3018
3019 if (transaction->state != REF_TRANSACTION_OPEN)
Johannes Schindelin033abf92018-05-02 11:38:39 +02003020 BUG("commit called for transaction that is not open");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003021
3022 /* Fail if a refname appears more than once in the transaction: */
Michael Haggertyefe47282016-04-22 00:02:50 +02003023 for (i = 0; i < transaction->nr; i++)
3024 string_list_append(&affected_refnames,
3025 transaction->updates[i]->refname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003026 string_list_sort(&affected_refnames);
3027 if (ref_update_reject_duplicates(&affected_refnames, err)) {
3028 ret = TRANSACTION_GENERIC_ERROR;
3029 goto cleanup;
3030 }
3031
3032 /*
3033 * It's really undefined to call this function in an active
3034 * repository or when there are existing references: we are
3035 * only locking and changing packed-refs, so (1) any
3036 * simultaneous processes might try to change a reference at
3037 * the same time we do, and (2) any existing loose versions of
3038 * the references that we are setting would have precedence
3039 * over our values. But some remote helpers create the remote
3040 * "HEAD" and "master" branches before calling this function,
3041 * so here we really only check that none of the references
3042 * that we are creating already exists.
3043 */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07003044 if (refs_for_each_rawref(&refs->base, ref_present,
3045 &affected_refnames))
Johannes Schindelin033abf92018-05-02 11:38:39 +02003046 BUG("initial ref transaction called with existing refs");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003047
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07003048 packed_transaction = ref_store_transaction_begin(refs->packed_ref_store, err);
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003049 if (!packed_transaction) {
3050 ret = TRANSACTION_GENERIC_ERROR;
3051 goto cleanup;
3052 }
3053
Michael Haggertyefe47282016-04-22 00:02:50 +02003054 for (i = 0; i < transaction->nr; i++) {
3055 struct ref_update *update = transaction->updates[i];
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003056
3057 if ((update->flags & REF_HAVE_OLD) &&
brian m. carlson98491292017-05-06 22:10:23 +00003058 !is_null_oid(&update->old_oid))
Johannes Schindelin033abf92018-05-02 11:38:39 +02003059 BUG("initial ref transaction with old_sha1 set");
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +07003060 if (refs_verify_refname_available(&refs->base, update->refname,
3061 &affected_refnames, NULL,
3062 err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003063 ret = TRANSACTION_NAME_CONFLICT;
3064 goto cleanup;
3065 }
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003066
3067 /*
3068 * Add a reference creation for this reference to the
3069 * packed-refs transaction:
3070 */
3071 ref_transaction_add_update(packed_transaction, update->refname,
3072 update->flags & ~REF_HAVE_OLD,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00003073 &update->new_oid, &update->old_oid,
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003074 NULL);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003075 }
3076
Michael Haggertyc8bed832017-06-23 09:01:42 +02003077 if (packed_refs_lock(refs->packed_ref_store, 0, err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003078 ret = TRANSACTION_GENERIC_ERROR;
3079 goto cleanup;
3080 }
3081
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003082 if (initial_ref_transaction_commit(packed_transaction, err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003083 ret = TRANSACTION_GENERIC_ERROR;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003084 }
3085
Mathias Rav81fcb692018-01-18 14:38:41 +01003086 packed_refs_unlock(refs->packed_ref_store);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003087cleanup:
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003088 if (packed_transaction)
3089 ref_transaction_free(packed_transaction);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003090 transaction->state = REF_TRANSACTION_CLOSED;
3091 string_list_clear(&affected_refnames, 0);
3092 return ret;
3093}
3094
3095struct expire_reflog_cb {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003096 reflog_expiry_should_prune_fn *should_prune_fn;
3097 void *policy_cb;
3098 FILE *newlog;
brian m. carlson9461d272017-02-21 23:47:32 +00003099 struct object_id last_kept_oid;
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003100 unsigned int rewrite:1,
3101 dry_run:1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003102};
3103
brian m. carlson9461d272017-02-21 23:47:32 +00003104static int expire_reflog_ent(struct object_id *ooid, struct object_id *noid,
Johannes Schindelindddbad72017-04-26 21:29:31 +02003105 const char *email, timestamp_t timestamp, int tz,
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003106 const char *message, void *cb_data)
3107{
3108 struct expire_reflog_cb *cb = cb_data;
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003109 reflog_expiry_should_prune_fn *fn = cb->should_prune_fn;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003110
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003111 if (cb->rewrite)
brian m. carlson9461d272017-02-21 23:47:32 +00003112 ooid = &cb->last_kept_oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003113
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003114 if (fn(ooid, noid, email, timestamp, tz, message, cb->policy_cb))
3115 return 0;
3116
3117 if (cb->dry_run)
3118 return 0; /* --dry-run */
3119
3120 fprintf(cb->newlog, "%s %s %s %"PRItime" %+05d\t%s", oid_to_hex(ooid),
3121 oid_to_hex(noid), email, timestamp, tz, message);
3122 oidcpy(&cb->last_kept_oid, noid);
3123
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003124 return 0;
3125}
3126
David Turnere3688bd2016-09-04 18:08:38 +02003127static int files_reflog_expire(struct ref_store *ref_store,
Ævar Arnfjörð Bjarmasoncc40b5c2021-08-23 13:36:11 +02003128 const char *refname,
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003129 unsigned int expire_flags,
David Turnere3688bd2016-09-04 18:08:38 +02003130 reflog_expiry_prepare_fn prepare_fn,
3131 reflog_expiry_should_prune_fn should_prune_fn,
3132 reflog_expiry_cleanup_fn cleanup_fn,
3133 void *policy_cb_data)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003134{
Michael Haggerty7eb27cd2016-09-04 18:08:34 +02003135 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07003136 files_downcast(ref_store, REF_STORE_WRITE, "reflog_expire");
Martin Ågrenb2275862018-05-09 22:55:38 +02003137 struct lock_file reflog_lock = LOCK_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003138 struct expire_reflog_cb cb;
3139 struct ref_lock *lock;
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07003140 struct strbuf log_file_sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003141 char *log_file;
3142 int status = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003143 struct strbuf err = STRBUF_INIT;
Ævar Arnfjörð Bjarmasonae35e162021-08-23 13:36:10 +02003144 const struct object_id *oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003145
3146 memset(&cb, 0, sizeof(cb));
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003147 cb.rewrite = !!(expire_flags & EXPIRE_REFLOGS_REWRITE);
3148 cb.dry_run = !!(expire_flags & EXPIRE_REFLOGS_DRY_RUN);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003149 cb.policy_cb = policy_cb_data;
3150 cb.should_prune_fn = should_prune_fn;
3151
3152 /*
3153 * The reflog file is locked by holding the lock on the
3154 * reference itself, plus we might need to update the
3155 * reference if --updateref was specified:
3156 */
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003157 lock = lock_ref_oid_basic(refs, refname, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003158 if (!lock) {
3159 error("cannot lock ref '%s': %s", refname, err.buf);
3160 strbuf_release(&err);
3161 return -1;
3162 }
Ævar Arnfjörð Bjarmasonae35e162021-08-23 13:36:10 +02003163 oid = &lock->old_oid;
Ævar Arnfjörð Bjarmason7aa78292021-08-23 13:36:09 +02003164
3165 /*
3166 * When refs are deleted, their reflog is deleted before the
3167 * ref itself is deleted. This is because there is no separate
3168 * lock for reflog; instead we take a lock on the ref with
3169 * lock_ref_oid_basic().
3170 *
3171 * If a race happens and the reflog doesn't exist after we've
3172 * acquired the lock that's OK. We've got nothing more to do;
3173 * We were asked to delete the reflog, but someone else
3174 * deleted it! The caller doesn't care that we deleted it,
3175 * just that it is deleted. So we can return successfully.
3176 */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07003177 if (!refs_reflog_exists(ref_store, refname)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003178 unlock_ref(lock);
3179 return 0;
3180 }
3181
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07003182 files_reflog_path(refs, &log_file_sb, refname);
3183 log_file = strbuf_detach(&log_file_sb, NULL);
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003184 if (!cb.dry_run) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003185 /*
3186 * Even though holding $GIT_DIR/logs/$reflog.lock has
3187 * no locking implications, we use the lock_file
3188 * machinery here anyway because it does a lot of the
3189 * work we need, including cleaning up if the program
3190 * exits unexpectedly.
3191 */
3192 if (hold_lock_file_for_update(&reflog_lock, log_file, 0) < 0) {
3193 struct strbuf err = STRBUF_INIT;
3194 unable_to_lock_message(log_file, errno, &err);
3195 error("%s", err.buf);
3196 strbuf_release(&err);
3197 goto failure;
3198 }
3199 cb.newlog = fdopen_lock_file(&reflog_lock, "w");
3200 if (!cb.newlog) {
3201 error("cannot fdopen %s (%s)",
3202 get_lock_file_path(&reflog_lock), strerror(errno));
3203 goto failure;
3204 }
3205 }
3206
brian m. carlson0155f712017-10-15 22:07:04 +00003207 (*prepare_fn)(refname, oid, cb.policy_cb);
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07003208 refs_for_each_reflog_ent(ref_store, refname, expire_reflog_ent, &cb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003209 (*cleanup_fn)(cb.policy_cb);
3210
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003211 if (!cb.dry_run) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003212 /*
3213 * It doesn't make sense to adjust a reference pointed
3214 * to by a symbolic ref based on expiring entries in
3215 * the symbolic reference's reflog. Nor can we update
3216 * a reference if there are no remaining reflog
3217 * entries.
3218 */
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003219 int update = 0;
3220
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003221 if ((expire_flags & EXPIRE_REFLOGS_UPDATE_REF) &&
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003222 !is_null_oid(&cb.last_kept_oid)) {
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003223 int type;
3224 const char *ref;
3225
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02003226 ref = refs_resolve_ref_unsafe(&refs->base, refname,
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003227 RESOLVE_REF_NO_RECURSE,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01003228 NULL, &type);
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003229 update = !!(ref && !(type & REF_ISSYMREF));
3230 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003231
Jeff King83a30692017-09-05 08:14:33 -04003232 if (close_lock_file_gently(&reflog_lock)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003233 status |= error("couldn't write %s: %s", log_file,
3234 strerror(errno));
Jeff King83a30692017-09-05 08:14:33 -04003235 rollback_lock_file(&reflog_lock);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003236 } else if (update &&
Jeff Kingee4d8e42017-09-05 08:15:15 -04003237 (write_in_full(get_lock_file_fd(&lock->lk),
brian m. carlson2ae2e2a2018-07-16 01:27:59 +00003238 oid_to_hex(&cb.last_kept_oid), the_hash_algo->hexsz) < 0 ||
Jeff King88780c32017-09-25 16:27:17 -04003239 write_str_in_full(get_lock_file_fd(&lock->lk), "\n") < 0 ||
Jeff King83a30692017-09-05 08:14:33 -04003240 close_ref_gently(lock) < 0)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003241 status |= error("couldn't write %s",
Jeff Kingee4d8e42017-09-05 08:15:15 -04003242 get_lock_file_path(&lock->lk));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003243 rollback_lock_file(&reflog_lock);
3244 } else if (commit_lock_file(&reflog_lock)) {
Junio C Hamanoe0048d32015-12-11 10:40:54 -08003245 status |= error("unable to write reflog '%s' (%s)",
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003246 log_file, strerror(errno));
3247 } else if (update && commit_ref(lock)) {
3248 status |= error("couldn't set %s", lock->ref_name);
3249 }
3250 }
3251 free(log_file);
3252 unlock_ref(lock);
3253 return status;
3254
3255 failure:
3256 rollback_lock_file(&reflog_lock);
3257 free(log_file);
3258 unlock_ref(lock);
3259 return -1;
3260}
Ronnie Sahlberg3dce4442016-09-04 18:08:10 +02003261
David Turner6fb5acf2016-09-04 18:08:41 +02003262static int files_init_db(struct ref_store *ref_store, struct strbuf *err)
3263{
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07003264 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07003265 files_downcast(ref_store, REF_STORE_WRITE, "init_db");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07003266 struct strbuf sb = STRBUF_INIT;
3267
David Turner6fb5acf2016-09-04 18:08:41 +02003268 /*
3269 * Create .git/refs/{heads,tags}
3270 */
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07003271 files_ref_path(refs, &sb, "refs/heads");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07003272 safe_create_dir(sb.buf, 1);
3273
3274 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07003275 files_ref_path(refs, &sb, "refs/tags");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07003276 safe_create_dir(sb.buf, 1);
3277
3278 strbuf_release(&sb);
David Turner6fb5acf2016-09-04 18:08:41 +02003279 return 0;
3280}
3281
Ronnie Sahlberg3dce4442016-09-04 18:08:10 +02003282struct ref_storage_be refs_be_files = {
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003283 .next = NULL,
3284 .name = "files",
3285 .init = files_ref_store_create,
3286 .init_db = files_init_db,
3287 .transaction_prepare = files_transaction_prepare,
3288 .transaction_finish = files_transaction_finish,
3289 .transaction_abort = files_transaction_abort,
3290 .initial_transaction_commit = files_initial_transaction_commit,
Michael Haggertye1e33b72016-09-04 18:08:25 +02003291
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003292 .pack_refs = files_pack_refs,
3293 .create_symref = files_create_symref,
3294 .delete_refs = files_delete_refs,
3295 .rename_ref = files_rename_ref,
3296 .copy_ref = files_copy_ref,
Michael Haggerty82315272016-09-04 18:08:27 +02003297
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003298 .iterator_begin = files_ref_iterator_begin,
3299 .read_raw_ref = files_read_raw_ref,
3300 .read_symbolic_ref = files_read_symbolic_ref,
David Turnere3688bd2016-09-04 18:08:38 +02003301
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003302 .reflog_iterator_begin = files_reflog_iterator_begin,
3303 .for_each_reflog_ent = files_for_each_reflog_ent,
3304 .for_each_reflog_ent_reverse = files_for_each_reflog_ent_reverse,
3305 .reflog_exists = files_reflog_exists,
3306 .create_reflog = files_create_reflog,
3307 .delete_reflog = files_delete_reflog,
3308 .reflog_expire = files_reflog_expire
Ronnie Sahlberg3dce4442016-09-04 18:08:10 +02003309};