blob: 6f257c700540063f5565202c5a69f676fcad33af [file] [log] [blame]
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001#include "../cache.h"
Brandon Williamsb2141fc2017-06-14 11:07:36 -07002#include "../config.h"
Elijah Newren41771fa2023-02-24 00:09:27 +00003#include "../hex.h"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01004#include "../refs.h"
5#include "refs-internal.h"
Michael Haggerty958f9642017-04-16 08:41:31 +02006#include "ref-cache.h"
Michael Haggerty67be7c52017-06-23 09:01:37 +02007#include "packed-backend.h"
Michael Haggerty3bc581b2016-06-18 06:15:15 +02008#include "../iterator.h"
Michael Haggerty2880d162016-06-18 06:15:19 +02009#include "../dir-iterator.h"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010010#include "../lockfile.h"
11#include "../object.h"
12#include "../dir.h"
Jeff Kingfb9c2d22018-03-30 14:35:12 -040013#include "../chdir-notify.h"
Nguyễn Thái Ngọc Duy3a3b9d82018-10-21 10:08:54 +020014#include "worktree.h"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010015
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010016/*
17 * This backend uses the following flags in `ref_update::flags` for
18 * internal bookkeeping purposes. Their numerical values must not
Michael Haggerty91774af2017-11-05 09:42:06 +010019 * conflict with REF_NO_DEREF, REF_FORCE_CREATE_REFLOG, REF_HAVE_NEW,
Han-Wen Nienhuys0464d0a2021-12-07 13:38:16 +000020 * or REF_HAVE_OLD, which are also stored in `ref_update::flags`.
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010021 */
22
23/*
24 * Used as a flag in ref_update::flags when a loose ref is being
Michael Haggerty91774af2017-11-05 09:42:06 +010025 * pruned. This flag must only be used when REF_NO_DEREF is set.
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010026 */
Michael Haggertyacedcde2017-11-05 09:42:07 +010027#define REF_IS_PRUNING (1 << 4)
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010028
29/*
30 * Flag passed to lock_ref_sha1_basic() telling it to tolerate broken
31 * refs (i.e., because the reference is about to be deleted anyway).
32 */
33#define REF_DELETING (1 << 5)
34
35/*
36 * Used as a flag in ref_update::flags when the lockfile needs to be
37 * committed.
38 */
39#define REF_NEEDS_COMMIT (1 << 6)
40
41/*
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010042 * Used as a flag in ref_update::flags when the ref_update was via an
43 * update to HEAD.
44 */
45#define REF_UPDATE_VIA_HEAD (1 << 8)
46
47/*
Will Chandler5f03e512021-05-08 01:00:43 -040048 * Used as a flag in ref_update::flags when a reference has been
49 * deleted and the ref's parent directories may need cleanup.
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010050 */
Will Chandler5f03e512021-05-08 01:00:43 -040051#define REF_DELETED_RMDIR (1 << 9)
Michael Haggerty5ac95fe2017-11-05 09:42:05 +010052
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010053struct ref_lock {
54 char *ref_name;
Jeff Kingee4d8e42017-09-05 08:15:15 -040055 struct lock_file lk;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010056 struct object_id old_oid;
57};
58
Michael Haggerty00eebe32016-09-04 18:08:11 +020059struct files_ref_store {
60 struct ref_store base;
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +070061 unsigned int store_flags;
Michael Haggerty32c597e2017-02-10 12:16:16 +010062
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +070063 char *gitcommondir;
Nguyễn Thái Ngọc Duy33dfb9f2017-03-26 09:42:18 +070064
Michael Haggerty7c22bc82017-04-16 08:41:32 +020065 struct ref_cache *loose;
Michael Haggerty55c6bc32017-05-22 16:17:40 +020066
Michael Haggertye0cc8ac2017-06-23 09:01:38 +020067 struct ref_store *packed_ref_store;
Michael Haggerty00eebe32016-09-04 18:08:11 +020068};
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010069
Michael Haggerty65a0a8e2016-09-04 18:08:09 +020070static void clear_loose_ref_cache(struct files_ref_store *refs)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010071{
72 if (refs->loose) {
Michael Haggerty7c22bc82017-04-16 08:41:32 +020073 free_ref_cache(refs->loose);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010074 refs->loose = NULL;
75 }
76}
77
Jeff Kinga2d51562016-01-22 17:29:30 -050078/*
79 * Create a new submodule ref cache and add it to the internal
80 * set of caches.
81 */
Jonathan Tan34224e12021-10-08 14:08:14 -070082static struct ref_store *files_ref_store_create(struct repository *repo,
83 const char *gitdir,
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +070084 unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010085{
Michael Haggerty00eebe32016-09-04 18:08:11 +020086 struct files_ref_store *refs = xcalloc(1, sizeof(*refs));
87 struct ref_store *ref_store = (struct ref_store *)refs;
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +070088 struct strbuf sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +010089
Han-Wen Nienhuysf9f7fd32021-12-22 18:11:54 +000090 base_ref_store_init(ref_store, repo, gitdir, &refs_be_files);
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +070091 refs->store_flags = flags;
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +070092 get_common_dir_noenv(&sb, gitdir);
93 refs->gitcommondir = strbuf_detach(&sb, NULL);
Han-Wen Nienhuys99f0d972021-12-22 18:11:52 +000094 refs->packed_ref_store =
95 packed_ref_store_create(repo, refs->gitcommondir, flags);
Jeff Kinga2d51562016-01-22 17:29:30 -050096
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +000097 chdir_notify_reparent("files-backend $GIT_DIR", &refs->base.gitdir);
Jeff Kingfb9c2d22018-03-30 14:35:12 -040098 chdir_notify_reparent("files-backend $GIT_COMMONDIR",
99 &refs->gitcommondir);
100
Michael Haggerty00eebe32016-09-04 18:08:11 +0200101 return ref_store;
Jeff Kinga2d51562016-01-22 17:29:30 -0500102}
103
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100104/*
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700105 * Die if refs is not the main ref store. caller is used in any
106 * necessary error messages.
Michael Haggerty32c597e2017-02-10 12:16:16 +0100107 */
108static void files_assert_main_repository(struct files_ref_store *refs,
109 const char *caller)
110{
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700111 if (refs->store_flags & REF_STORE_MAIN)
112 return;
113
Johannes Schindelin033abf92018-05-02 11:38:39 +0200114 BUG("operation %s only allowed for main ref store", caller);
Michael Haggerty32c597e2017-02-10 12:16:16 +0100115}
116
117/*
Michael Haggerty00eebe32016-09-04 18:08:11 +0200118 * Downcast ref_store to files_ref_store. Die if ref_store is not a
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700119 * files_ref_store. required_flags is compared with ref_store's
120 * store_flags to ensure the ref_store has all required capabilities.
121 * "caller" is used in any necessary error messages.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100122 */
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700123static struct files_ref_store *files_downcast(struct ref_store *ref_store,
124 unsigned int required_flags,
125 const char *caller)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100126{
Michael Haggerty32c597e2017-02-10 12:16:16 +0100127 struct files_ref_store *refs;
128
Michael Haggerty00eebe32016-09-04 18:08:11 +0200129 if (ref_store->be != &refs_be_files)
Johannes Schindelin033abf92018-05-02 11:38:39 +0200130 BUG("ref_store is type \"%s\" not \"files\" in %s",
Michael Haggerty00eebe32016-09-04 18:08:11 +0200131 ref_store->be->name, caller);
Michael Haggerty2eed2782016-06-18 06:15:12 +0200132
Michael Haggerty32c597e2017-02-10 12:16:16 +0100133 refs = (struct files_ref_store *)ref_store;
Michael Haggerty2eed2782016-06-18 06:15:12 +0200134
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700135 if ((refs->store_flags & required_flags) != required_flags)
Johannes Schindelin033abf92018-05-02 11:38:39 +0200136 BUG("operation %s requires abilities 0x%x, but only have 0x%x",
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700137 caller, required_flags, refs->store_flags);
Michael Haggerty32c597e2017-02-10 12:16:16 +0100138
139 return refs;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100140}
141
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +0700142static void files_reflog_path(struct files_ref_store *refs,
143 struct strbuf *sb,
144 const char *refname)
145{
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000146 const char *bare_refname;
147 const char *wtname;
148 int wtname_len;
149 enum ref_worktree_type wt_type = parse_worktree_ref(
150 refname, &wtname, &wtname_len, &bare_refname);
151
152 switch (wt_type) {
153 case REF_WORKTREE_CURRENT:
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +0000154 strbuf_addf(sb, "%s/logs/%s", refs->base.gitdir, refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700155 break;
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000156 case REF_WORKTREE_SHARED:
157 case REF_WORKTREE_MAIN:
158 strbuf_addf(sb, "%s/logs/%s", refs->gitcommondir, bare_refname);
Nguyễn Thái Ngọc Duy46c0eb52018-11-25 05:58:16 +0100159 break;
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000160 case REF_WORKTREE_OTHER:
161 strbuf_addf(sb, "%s/worktrees/%.*s/logs/%s", refs->gitcommondir,
162 wtname_len, wtname, bare_refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700163 break;
164 default:
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000165 BUG("unknown ref type %d of ref %s", wt_type, refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700166 }
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +0700167}
168
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700169static void files_ref_path(struct files_ref_store *refs,
170 struct strbuf *sb,
171 const char *refname)
172{
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000173 const char *bare_refname;
174 const char *wtname;
175 int wtname_len;
176 enum ref_worktree_type wt_type = parse_worktree_ref(
177 refname, &wtname, &wtname_len, &bare_refname);
178 switch (wt_type) {
179 case REF_WORKTREE_CURRENT:
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +0000180 strbuf_addf(sb, "%s/%s", refs->base.gitdir, refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700181 break;
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000182 case REF_WORKTREE_OTHER:
183 strbuf_addf(sb, "%s/worktrees/%.*s/%s", refs->gitcommondir,
184 wtname_len, wtname, bare_refname);
185 break;
186 case REF_WORKTREE_SHARED:
187 case REF_WORKTREE_MAIN:
188 strbuf_addf(sb, "%s/%s", refs->gitcommondir, bare_refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700189 break;
190 default:
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000191 BUG("unknown ref type %d of ref %s", wt_type, refname);
Nguyễn Thái Ngọc Duyf57f37e2017-03-26 09:42:24 +0700192 }
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700193}
194
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100195/*
Nguyễn Thái Ngọc Duyb9317d52019-03-07 19:29:17 +0700196 * Manually add refs/bisect, refs/rewritten and refs/worktree, which, being
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700197 * per-worktree, might not appear in the directory listing for
198 * refs/ in the main repo.
199 */
200static void add_per_worktree_entries_to_dir(struct ref_dir *dir, const char *dirname)
201{
Nguyễn Thái Ngọc Duyb9317d52019-03-07 19:29:17 +0700202 const char *prefixes[] = { "refs/bisect/", "refs/worktree/", "refs/rewritten/" };
Nguyễn Thái Ngọc Duy90d31ff2019-03-07 19:29:16 +0700203 int ip;
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700204
205 if (strcmp(dirname, "refs/"))
206 return;
207
Nguyễn Thái Ngọc Duy90d31ff2019-03-07 19:29:16 +0700208 for (ip = 0; ip < ARRAY_SIZE(prefixes); ip++) {
209 const char *prefix = prefixes[ip];
210 int prefix_len = strlen(prefix);
211 struct ref_entry *child_entry;
212 int pos;
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700213
Nguyễn Thái Ngọc Duy90d31ff2019-03-07 19:29:16 +0700214 pos = search_ref_dir(dir, prefix, prefix_len);
215 if (pos >= 0)
216 continue;
Ævar Arnfjörð Bjarmason750036c2021-09-28 15:02:24 +0200217 child_entry = create_dir_entry(dir->cache, prefix, prefix_len);
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700218 add_entry_to_dir(dir, child_entry);
219 }
220}
221
222/*
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100223 * Read the loose references from the namespace dirname into dir
224 * (without recursing). dirname must end with '/'. dir must be the
225 * directory entry corresponding to dirname.
226 */
Michael Haggertydf308752017-04-16 08:41:34 +0200227static void loose_fill_ref_dir(struct ref_store *ref_store,
228 struct ref_dir *dir, const char *dirname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100229{
Michael Haggertydf308752017-04-16 08:41:34 +0200230 struct files_ref_store *refs =
231 files_downcast(ref_store, REF_STORE_READ, "fill_ref_dir");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100232 DIR *d;
233 struct dirent *de;
234 int dirnamelen = strlen(dirname);
235 struct strbuf refname;
236 struct strbuf path = STRBUF_INIT;
237 size_t path_baselen;
238
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700239 files_ref_path(refs, &path, dirname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100240 path_baselen = path.len;
241
242 d = opendir(path.buf);
243 if (!d) {
244 strbuf_release(&path);
245 return;
246 }
247
248 strbuf_init(&refname, dirnamelen + 257);
249 strbuf_add(&refname, dirname, dirnamelen);
250
251 while ((de = readdir(d)) != NULL) {
brian m. carlson4417df82017-05-06 22:10:24 +0000252 struct object_id oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100253 struct stat st;
254 int flag;
255
256 if (de->d_name[0] == '.')
257 continue;
258 if (ends_with(de->d_name, ".lock"))
259 continue;
260 strbuf_addstr(&refname, de->d_name);
261 strbuf_addstr(&path, de->d_name);
262 if (stat(path.buf, &st) < 0) {
263 ; /* silently ignore */
264 } else if (S_ISDIR(st.st_mode)) {
265 strbuf_addch(&refname, '/');
266 add_entry_to_dir(dir,
Michael Haggertye00d1a42017-04-16 08:41:33 +0200267 create_dir_entry(dir->cache, refname.buf,
Ævar Arnfjörð Bjarmason750036c2021-09-28 15:02:24 +0200268 refname.len));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100269 } else {
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +0700270 if (!refs_resolve_ref_unsafe(&refs->base,
Michael Haggerty3c0cb0c2017-02-09 21:53:52 +0100271 refname.buf,
272 RESOLVE_REF_READING,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +0100273 &oid, &flag)) {
brian m. carlson4417df82017-05-06 22:10:24 +0000274 oidclr(&oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100275 flag |= REF_ISBROKEN;
brian m. carlson4417df82017-05-06 22:10:24 +0000276 } else if (is_null_oid(&oid)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100277 /*
278 * It is so astronomically unlikely
Michael Haggerty78fb4572017-11-05 09:42:09 +0100279 * that null_oid is the OID of an
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100280 * actual object that we consider its
281 * appearance in a loose reference
282 * file to be repo corruption
283 * (probably due to a software bug).
284 */
285 flag |= REF_ISBROKEN;
286 }
287
288 if (check_refname_format(refname.buf,
289 REFNAME_ALLOW_ONELEVEL)) {
290 if (!refname_is_safe(refname.buf))
291 die("loose refname is dangerous: %s", refname.buf);
brian m. carlson4417df82017-05-06 22:10:24 +0000292 oidclr(&oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100293 flag |= REF_BAD_NAME | REF_ISBROKEN;
294 }
295 add_entry_to_dir(dir,
Michael Haggertyc1da06c2017-05-22 16:17:53 +0200296 create_ref_entry(refname.buf, &oid, flag));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100297 }
298 strbuf_setlen(&refname, dirnamelen);
299 strbuf_setlen(&path, path_baselen);
300 }
301 strbuf_release(&refname);
302 strbuf_release(&path);
303 closedir(d);
Michael Haggertye3bf2982017-04-16 08:41:35 +0200304
Nguyễn Thái Ngọc Duy09e65642019-03-07 19:29:15 +0700305 add_per_worktree_entries_to_dir(dir, dirname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100306}
307
Michael Haggertya714b192017-04-16 08:41:38 +0200308static struct ref_cache *get_loose_ref_cache(struct files_ref_store *refs)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100309{
310 if (!refs->loose) {
311 /*
312 * Mark the top-level directory complete because we
313 * are about to read the only subdirectory that can
314 * hold references:
315 */
Michael Haggertydf308752017-04-16 08:41:34 +0200316 refs->loose = create_ref_cache(&refs->base, loose_fill_ref_dir);
Michael Haggerty7c22bc82017-04-16 08:41:32 +0200317
318 /* We're going to fill the top level ourselves: */
319 refs->loose->root->flag &= ~REF_INCOMPLETE;
320
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100321 /*
Michael Haggerty7c22bc82017-04-16 08:41:32 +0200322 * Add an incomplete entry for "refs/" (to be filled
323 * lazily):
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100324 */
Michael Haggerty7c22bc82017-04-16 08:41:32 +0200325 add_entry_to_dir(get_ref_dir(refs->loose->root),
Ævar Arnfjörð Bjarmason750036c2021-09-28 15:02:24 +0200326 create_dir_entry(refs->loose, "refs/", 5));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100327 }
Michael Haggertya714b192017-04-16 08:41:38 +0200328 return refs->loose;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100329}
330
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100331static int read_ref_internal(struct ref_store *ref_store, const char *refname,
332 struct object_id *oid, struct strbuf *referent,
333 unsigned int *type, int *failure_errno, int skip_packed_refs)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100334{
Michael Haggerty43086512016-09-04 18:08:14 +0200335 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700336 files_downcast(ref_store, REF_STORE_READ, "read_raw_ref");
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400337 struct strbuf sb_contents = STRBUF_INIT;
338 struct strbuf sb_path = STRBUF_INIT;
David Turner70486532016-04-07 15:03:01 -0400339 const char *path;
340 const char *buf;
341 struct stat st;
342 int fd;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400343 int ret = -1;
Jeff Kinge8c42cb2016-10-06 12:48:42 -0400344 int remaining_retries = 3;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200345 int myerr = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100346
Michael Haggertyfa96ea12016-04-22 01:11:17 +0200347 *type = 0;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400348 strbuf_reset(&sb_path);
Michael Haggerty34c7ad82016-09-04 18:08:20 +0200349
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700350 files_ref_path(refs, &sb_path, refname);
Michael Haggerty34c7ad82016-09-04 18:08:20 +0200351
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400352 path = sb_path.buf;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100353
David Turner70486532016-04-07 15:03:01 -0400354stat_ref:
355 /*
356 * We might have to loop back here to avoid a race
357 * condition: first we lstat() the file, then we try
358 * to read it as a link or as a file. But if somebody
359 * changes the type of the file (file <-> directory
360 * <-> symlink) between the lstat() and reading, then
361 * we don't want to report that as an error but rather
362 * try again starting with the lstat().
Jeff Kinge8c42cb2016-10-06 12:48:42 -0400363 *
364 * We'll keep a count of the retries, though, just to avoid
365 * any confusing situation sending us into an infinite loop.
David Turner70486532016-04-07 15:03:01 -0400366 */
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100367
Jeff Kinge8c42cb2016-10-06 12:48:42 -0400368 if (remaining_retries-- <= 0)
369 goto out;
370
David Turner70486532016-04-07 15:03:01 -0400371 if (lstat(path, &st) < 0) {
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200372 int ignore_errno;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200373 myerr = errno;
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100374 if (myerr != ENOENT || skip_packed_refs)
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400375 goto out;
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200376 if (refs_read_raw_ref(refs->packed_ref_store, refname, oid,
377 referent, type, &ignore_errno)) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200378 myerr = ENOENT;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400379 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100380 }
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400381 ret = 0;
382 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100383 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100384
David Turner70486532016-04-07 15:03:01 -0400385 /* Follow "normalized" - ie "refs/.." symlinks by hand */
386 if (S_ISLNK(st.st_mode)) {
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400387 strbuf_reset(&sb_contents);
Jeff King765b4962018-07-24 06:51:39 -0400388 if (strbuf_readlink(&sb_contents, path, st.st_size) < 0) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200389 myerr = errno;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200390 if (myerr == ENOENT || myerr == EINVAL)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100391 /* inconsistent with lstat; retry */
392 goto stat_ref;
393 else
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400394 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100395 }
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400396 if (starts_with(sb_contents.buf, "refs/") &&
397 !check_refname_format(sb_contents.buf, 0)) {
Michael Haggerty92b38092016-04-22 01:11:17 +0200398 strbuf_swap(&sb_contents, referent);
Michael Haggerty3a0b6b92016-04-26 03:06:23 +0200399 *type |= REF_ISSYMREF;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400400 ret = 0;
401 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100402 }
Jeff King3f7bd762016-10-06 15:41:08 -0400403 /*
404 * It doesn't look like a refname; fall through to just
405 * treating it like a non-symlink, and reading whatever it
406 * points to.
407 */
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100408 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100409
David Turner70486532016-04-07 15:03:01 -0400410 /* Is it a directory? */
411 if (S_ISDIR(st.st_mode)) {
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200412 int ignore_errno;
Michael Haggertye167a562016-05-05 14:09:41 +0200413 /*
414 * Even though there is a directory where the loose
415 * ref is supposed to be, there could still be a
416 * packed ref:
417 */
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100418 if (skip_packed_refs ||
419 refs_read_raw_ref(refs->packed_ref_store, refname, oid,
Han-Wen Nienhuys8b72fea2021-10-16 11:39:09 +0200420 referent, type, &ignore_errno)) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200421 myerr = EISDIR;
Michael Haggertye167a562016-05-05 14:09:41 +0200422 goto out;
423 }
424 ret = 0;
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400425 goto out;
David Turner70486532016-04-07 15:03:01 -0400426 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100427
David Turner70486532016-04-07 15:03:01 -0400428 /*
429 * Anything else, just open it and try to use it as
430 * a ref
431 */
432 fd = open(path, O_RDONLY);
433 if (fd < 0) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200434 myerr = errno;
435 if (myerr == ENOENT && !S_ISLNK(st.st_mode))
David Turner70486532016-04-07 15:03:01 -0400436 /* inconsistent with lstat; retry */
437 goto stat_ref;
438 else
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400439 goto out;
David Turner70486532016-04-07 15:03:01 -0400440 }
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400441 strbuf_reset(&sb_contents);
442 if (strbuf_read(&sb_contents, fd, 256) < 0) {
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200443 myerr = errno;
David Turner70486532016-04-07 15:03:01 -0400444 close(fd);
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400445 goto out;
David Turner70486532016-04-07 15:03:01 -0400446 }
447 close(fd);
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400448 strbuf_rtrim(&sb_contents);
449 buf = sb_contents.buf;
David Turner70486532016-04-07 15:03:01 -0400450
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200451 ret = parse_loose_ref_contents(buf, oid, referent, type, &myerr);
Michael Haggerty42a38cf2016-04-07 15:03:02 -0400452
453out:
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200454 if (ret && !myerr)
455 BUG("returning non-zero %d, should have set myerr!", ret);
456 *failure_errno = myerr;
457
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100458 strbuf_release(&sb_path);
459 strbuf_release(&sb_contents);
Ævar Arnfjörð Bjarmasoncac15b32022-01-12 13:36:46 +0100460 errno = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100461 return ret;
462}
463
Patrick Steinhardt0a7b3872022-03-01 10:33:54 +0100464static int files_read_raw_ref(struct ref_store *ref_store, const char *refname,
465 struct object_id *oid, struct strbuf *referent,
466 unsigned int *type, int *failure_errno)
467{
468 return read_ref_internal(ref_store, refname, oid, referent, type, failure_errno, 0);
469}
470
471static int files_read_symbolic_ref(struct ref_store *ref_store, const char *refname,
472 struct strbuf *referent)
473{
474 struct object_id oid;
475 int failure_errno, ret;
476 unsigned int type;
477
478 ret = read_ref_internal(ref_store, refname, &oid, referent, &type, &failure_errno, 1);
479 if (ret)
480 return ret;
481
482 return !(type & REF_ISSYMREF);
483}
484
Han-Wen Nienhuyse39620f2020-08-19 14:27:55 +0000485int parse_loose_ref_contents(const char *buf, struct object_id *oid,
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200486 struct strbuf *referent, unsigned int *type,
487 int *failure_errno)
Han-Wen Nienhuyse39620f2020-08-19 14:27:55 +0000488{
489 const char *p;
490 if (skip_prefix(buf, "ref:", &buf)) {
491 while (isspace(*buf))
492 buf++;
493
494 strbuf_reset(referent);
495 strbuf_addstr(referent, buf);
496 *type |= REF_ISSYMREF;
497 return 0;
498 }
499
500 /*
501 * FETCH_HEAD has additional data after the sha.
502 */
503 if (parse_oid_hex(buf, oid, &p) ||
504 (*p != '\0' && !isspace(*p))) {
505 *type |= REF_ISBROKEN;
Han-Wen Nienhuysdf3458e2021-10-16 11:39:10 +0200506 *failure_errno = EINVAL;
Han-Wen Nienhuyse39620f2020-08-19 14:27:55 +0000507 return -1;
508 }
509 return 0;
510}
511
Michael Haggerty8415d242016-04-24 08:11:37 +0200512static void unlock_ref(struct ref_lock *lock)
513{
Jeff Kingee4d8e42017-09-05 08:15:15 -0400514 rollback_lock_file(&lock->lk);
Michael Haggerty8415d242016-04-24 08:11:37 +0200515 free(lock->ref_name);
Michael Haggerty8415d242016-04-24 08:11:37 +0200516 free(lock);
517}
518
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100519/*
Michael Haggerty92b15512016-04-25 15:56:07 +0200520 * Lock refname, without following symrefs, and set *lock_p to point
521 * at a newly-allocated lock object. Fill in lock->old_oid, referent,
522 * and type similarly to read_raw_ref().
523 *
524 * The caller must verify that refname is a "safe" reference name (in
525 * the sense of refname_is_safe()) before calling this function.
526 *
527 * If the reference doesn't already exist, verify that refname doesn't
528 * have a D/F conflict with any existing references. extras and skip
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200529 * are passed to refs_verify_refname_available() for this check.
Michael Haggerty92b15512016-04-25 15:56:07 +0200530 *
531 * If mustexist is not set and the reference is not found or is
Michael Haggerty78fb4572017-11-05 09:42:09 +0100532 * broken, lock the reference anyway but clear old_oid.
Michael Haggerty92b15512016-04-25 15:56:07 +0200533 *
534 * Return 0 on success. On failure, write an error message to err and
535 * return TRANSACTION_NAME_CONFLICT or TRANSACTION_GENERIC_ERROR.
536 *
537 * Implementation note: This function is basically
538 *
539 * lock reference
540 * read_raw_ref()
541 *
542 * but it includes a lot more code to
543 * - Deal with possible races with other processes
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200544 * - Avoid calling refs_verify_refname_available() when it can be
Michael Haggerty92b15512016-04-25 15:56:07 +0200545 * avoided, namely if we were successfully able to read the ref
546 * - Generate informative error messages in the case of failure
547 */
Michael Haggertyf7b0a982016-09-04 18:08:31 +0200548static int lock_raw_ref(struct files_ref_store *refs,
549 const char *refname, int mustexist,
Michael Haggerty92b15512016-04-25 15:56:07 +0200550 const struct string_list *extras,
Michael Haggerty92b15512016-04-25 15:56:07 +0200551 struct ref_lock **lock_p,
552 struct strbuf *referent,
553 unsigned int *type,
554 struct strbuf *err)
555{
556 struct ref_lock *lock;
557 struct strbuf ref_file = STRBUF_INIT;
558 int attempts_remaining = 3;
559 int ret = TRANSACTION_GENERIC_ERROR;
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200560 int failure_errno;
Michael Haggerty92b15512016-04-25 15:56:07 +0200561
562 assert(err);
Michael Haggerty32c597e2017-02-10 12:16:16 +0100563 files_assert_main_repository(refs, "lock_raw_ref");
Michael Haggertyf7b0a982016-09-04 18:08:31 +0200564
Michael Haggerty92b15512016-04-25 15:56:07 +0200565 *type = 0;
566
567 /* First lock the file so it can't change out from under us. */
568
René Scharfeca56dad2021-03-13 17:17:22 +0100569 *lock_p = CALLOC_ARRAY(lock, 1);
Michael Haggerty92b15512016-04-25 15:56:07 +0200570
571 lock->ref_name = xstrdup(refname);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +0700572 files_ref_path(refs, &ref_file, refname);
Michael Haggerty92b15512016-04-25 15:56:07 +0200573
574retry:
575 switch (safe_create_leading_directories(ref_file.buf)) {
576 case SCLD_OK:
577 break; /* success */
578 case SCLD_EXISTS:
579 /*
580 * Suppose refname is "refs/foo/bar". We just failed
581 * to create the containing directory, "refs/foo",
582 * because there was a non-directory in the way. This
583 * indicates a D/F conflict, probably because of
584 * another reference such as "refs/foo". There is no
585 * reason to expect this error to be transitory.
586 */
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +0700587 if (refs_verify_refname_available(&refs->base, refname,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +0200588 extras, NULL, err)) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200589 if (mustexist) {
590 /*
591 * To the user the relevant error is
592 * that the "mustexist" reference is
593 * missing:
594 */
595 strbuf_reset(err);
596 strbuf_addf(err, "unable to resolve reference '%s'",
597 refname);
598 } else {
599 /*
600 * The error message set by
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200601 * refs_verify_refname_available() is
602 * OK.
Michael Haggerty92b15512016-04-25 15:56:07 +0200603 */
604 ret = TRANSACTION_NAME_CONFLICT;
605 }
606 } else {
607 /*
608 * The file that is in the way isn't a loose
609 * reference. Report it as a low-level
610 * failure.
611 */
612 strbuf_addf(err, "unable to create lock file %s.lock; "
613 "non-directory in the way",
614 ref_file.buf);
615 }
616 goto error_return;
617 case SCLD_VANISHED:
618 /* Maybe another process was tidying up. Try again. */
619 if (--attempts_remaining > 0)
620 goto retry;
621 /* fall through */
622 default:
623 strbuf_addf(err, "unable to create directory for %s",
624 ref_file.buf);
625 goto error_return;
626 }
627
Michael Haggerty4ff0f012017-08-21 13:51:34 +0200628 if (hold_lock_file_for_update_timeout(
Jeff Kingee4d8e42017-09-05 08:15:15 -0400629 &lock->lk, ref_file.buf, LOCK_NO_DEREF,
Michael Haggerty4ff0f012017-08-21 13:51:34 +0200630 get_files_ref_lock_timeout_ms()) < 0) {
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200631 int myerr = errno;
632 errno = 0;
633 if (myerr == ENOENT && --attempts_remaining > 0) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200634 /*
635 * Maybe somebody just deleted one of the
636 * directories leading to ref_file. Try
637 * again:
638 */
639 goto retry;
640 } else {
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200641 unable_to_lock_message(ref_file.buf, myerr, err);
Michael Haggerty92b15512016-04-25 15:56:07 +0200642 goto error_return;
643 }
644 }
645
646 /*
647 * Now we hold the lock and can read the reference without
648 * fear that its value will change.
649 */
650
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200651 if (files_read_raw_ref(&refs->base, refname, &lock->old_oid, referent,
652 type, &failure_errno)) {
653 if (failure_errno == ENOENT) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200654 if (mustexist) {
655 /* Garden variety missing reference. */
656 strbuf_addf(err, "unable to resolve reference '%s'",
657 refname);
658 goto error_return;
659 } else {
660 /*
661 * Reference is missing, but that's OK. We
662 * know that there is not a conflict with
663 * another loose reference because
664 * (supposing that we are trying to lock
665 * reference "refs/foo/bar"):
666 *
667 * - We were successfully able to create
668 * the lockfile refs/foo/bar.lock, so we
669 * know there cannot be a loose reference
670 * named "refs/foo".
671 *
672 * - We got ENOENT and not EISDIR, so we
673 * know that there cannot be a loose
674 * reference named "refs/foo/bar/baz".
675 */
676 }
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200677 } else if (failure_errno == EISDIR) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200678 /*
679 * There is a directory in the way. It might have
680 * contained references that have been deleted. If
681 * we don't require that the reference already
682 * exists, try to remove the directory so that it
683 * doesn't cause trouble when we want to rename the
684 * lockfile into place later.
685 */
686 if (mustexist) {
687 /* Garden variety missing reference. */
688 strbuf_addf(err, "unable to resolve reference '%s'",
689 refname);
690 goto error_return;
691 } else if (remove_dir_recursively(&ref_file,
692 REMOVE_DIR_EMPTY_ONLY)) {
Michael Haggertyb05855b2017-04-16 08:41:26 +0200693 if (refs_verify_refname_available(
694 &refs->base, refname,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +0200695 extras, NULL, err)) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200696 /*
697 * The error message set by
698 * verify_refname_available() is OK.
699 */
700 ret = TRANSACTION_NAME_CONFLICT;
701 goto error_return;
702 } else {
703 /*
704 * We can't delete the directory,
705 * but we also don't know of any
706 * references that it should
707 * contain.
708 */
709 strbuf_addf(err, "there is a non-empty directory '%s' "
710 "blocking reference '%s'",
711 ref_file.buf, refname);
712 goto error_return;
713 }
714 }
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200715 } else if (failure_errno == EINVAL && (*type & REF_ISBROKEN)) {
Michael Haggerty92b15512016-04-25 15:56:07 +0200716 strbuf_addf(err, "unable to resolve reference '%s': "
717 "reference broken", refname);
718 goto error_return;
719 } else {
720 strbuf_addf(err, "unable to resolve reference '%s': %s",
Han-Wen Nienhuys5b12e162021-08-23 13:52:40 +0200721 refname, strerror(failure_errno));
Michael Haggerty92b15512016-04-25 15:56:07 +0200722 goto error_return;
723 }
724
725 /*
726 * If the ref did not exist and we are creating it,
Michael Haggerty8ec617c2017-08-17 17:12:50 +0200727 * make sure there is no existing packed ref that
728 * conflicts with refname:
Michael Haggerty92b15512016-04-25 15:56:07 +0200729 */
Michael Haggerty524a9fd2017-04-16 08:41:27 +0200730 if (refs_verify_refname_available(
Michael Haggerty8ec617c2017-08-17 17:12:50 +0200731 refs->packed_ref_store, refname,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +0200732 extras, NULL, err))
Michael Haggerty92b15512016-04-25 15:56:07 +0200733 goto error_return;
Michael Haggerty92b15512016-04-25 15:56:07 +0200734 }
735
736 ret = 0;
737 goto out;
738
739error_return:
740 unlock_ref(lock);
741 *lock_p = NULL;
742
743out:
744 strbuf_release(&ref_file);
745 return ret;
746}
747
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200748struct files_ref_iterator {
749 struct ref_iterator base;
750
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200751 struct ref_iterator *iter0;
Jonathan Tan9bc45a22021-10-08 14:08:15 -0700752 struct repository *repo;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200753 unsigned int flags;
754};
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100755
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200756static int files_ref_iterator_advance(struct ref_iterator *ref_iterator)
757{
758 struct files_ref_iterator *iter =
759 (struct files_ref_iterator *)ref_iterator;
760 int ok;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100761
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200762 while ((ok = ref_iterator_advance(iter->iter0)) == ITER_OK) {
David Turner0c09ec02016-09-04 18:08:44 +0200763 if (iter->flags & DO_FOR_EACH_PER_WORKTREE_ONLY &&
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +0000764 parse_worktree_ref(iter->iter0->refname, NULL, NULL,
765 NULL) != REF_WORKTREE_CURRENT)
David Turner0c09ec02016-09-04 18:08:44 +0200766 continue;
767
Jeff King8dccb222021-09-24 14:41:32 -0400768 if ((iter->flags & DO_FOR_EACH_OMIT_DANGLING_SYMREFS) &&
769 (iter->iter0->flags & REF_ISSYMREF) &&
770 (iter->iter0->flags & REF_ISBROKEN))
771 continue;
772
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200773 if (!(iter->flags & DO_FOR_EACH_INCLUDE_BROKEN) &&
774 !ref_resolves_to_object(iter->iter0->refname,
Jonathan Tan9bc45a22021-10-08 14:08:15 -0700775 iter->repo,
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200776 iter->iter0->oid,
777 iter->iter0->flags))
778 continue;
779
780 iter->base.refname = iter->iter0->refname;
781 iter->base.oid = iter->iter0->oid;
782 iter->base.flags = iter->iter0->flags;
783 return ITER_OK;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100784 }
785
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200786 iter->iter0 = NULL;
787 if (ref_iterator_abort(ref_iterator) != ITER_DONE)
788 ok = ITER_ERROR;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100789
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200790 return ok;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100791}
792
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200793static int files_ref_iterator_peel(struct ref_iterator *ref_iterator,
794 struct object_id *peeled)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100795{
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200796 struct files_ref_iterator *iter =
797 (struct files_ref_iterator *)ref_iterator;
David Turner93770592016-04-07 15:02:49 -0400798
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200799 return ref_iterator_peel(iter->iter0, peeled);
800}
801
802static int files_ref_iterator_abort(struct ref_iterator *ref_iterator)
803{
804 struct files_ref_iterator *iter =
805 (struct files_ref_iterator *)ref_iterator;
806 int ok = ITER_DONE;
807
808 if (iter->iter0)
809 ok = ref_iterator_abort(iter->iter0);
810
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200811 base_ref_iterator_free(ref_iterator);
812 return ok;
813}
814
815static struct ref_iterator_vtable files_ref_iterator_vtable = {
Ævar Arnfjörð Bjarmasone2f8acb2022-03-17 18:27:16 +0100816 .advance = files_ref_iterator_advance,
817 .peel = files_ref_iterator_peel,
818 .abort = files_ref_iterator_abort,
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200819};
820
Michael Haggerty1a769002016-09-04 18:08:37 +0200821static struct ref_iterator *files_ref_iterator_begin(
Michael Haggerty37b6f6d2016-09-04 18:08:36 +0200822 struct ref_store *ref_store,
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200823 const char *prefix, unsigned int flags)
824{
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700825 struct files_ref_store *refs;
Michael Haggerty8738a8a2017-09-13 19:15:55 +0200826 struct ref_iterator *loose_iter, *packed_iter, *overlay_iter;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200827 struct files_ref_iterator *iter;
828 struct ref_iterator *ref_iterator;
Michael Haggerty0a0865b2017-05-22 16:17:52 +0200829 unsigned int required_flags = REF_STORE_READ;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200830
Michael Haggerty0a0865b2017-05-22 16:17:52 +0200831 if (!(flags & DO_FOR_EACH_INCLUDE_BROKEN))
832 required_flags |= REF_STORE_ODB;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100833
Michael Haggerty0a0865b2017-05-22 16:17:52 +0200834 refs = files_downcast(ref_store, required_flags, "ref_iterator_begin");
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +0700835
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200836 /*
837 * We must make sure that all loose refs are read before
838 * accessing the packed-refs file; this avoids a race
839 * condition if loose refs are migrated to the packed-refs
840 * file by a simultaneous process, but our in-memory view is
841 * from before the migration. We ensure this as follows:
Michael Haggerty059ae352017-04-16 08:41:39 +0200842 * First, we call start the loose refs iteration with its
843 * `prime_ref` argument set to true. This causes the loose
844 * references in the subtree to be pre-read into the cache.
845 * (If they've already been read, that's OK; we only need to
846 * guarantee that they're read before the packed refs, not
847 * *how much* before.) After that, we call
Michael Haggerty38b86e82017-06-23 09:01:35 +0200848 * packed_ref_iterator_begin(), which internally checks
849 * whether the packed-ref cache is up to date with what is on
850 * disk, and re-reads it if not.
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200851 */
852
Michael Haggerty059ae352017-04-16 08:41:39 +0200853 loose_iter = cache_ref_iterator_begin(get_loose_ref_cache(refs),
Jonathan Tan87881952021-10-08 14:08:16 -0700854 prefix, ref_store->repo, 1);
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200855
Michael Haggerty38b86e82017-06-23 09:01:35 +0200856 /*
857 * The packed-refs file might contain broken references, for
858 * example an old version of a reference that points at an
859 * object that has since been garbage-collected. This is OK as
860 * long as there is a corresponding loose reference that
861 * overrides it, and we don't want to emit an error message in
862 * this case. So ask the packed_ref_store for all of its
863 * references, and (if needed) do our own check for broken
864 * ones in files_ref_iterator_advance(), after we have merged
865 * the packed and loose references.
866 */
Michael Haggertye0cc8ac2017-06-23 09:01:38 +0200867 packed_iter = refs_ref_iterator_begin(
868 refs->packed_ref_store, prefix, 0,
Michael Haggerty38b86e82017-06-23 09:01:35 +0200869 DO_FOR_EACH_INCLUDE_BROKEN);
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200870
Michael Haggerty8738a8a2017-09-13 19:15:55 +0200871 overlay_iter = overlay_ref_iterator_begin(loose_iter, packed_iter);
872
René Scharfeca56dad2021-03-13 17:17:22 +0100873 CALLOC_ARRAY(iter, 1);
Michael Haggerty8738a8a2017-09-13 19:15:55 +0200874 ref_iterator = &iter->base;
875 base_ref_iterator_init(ref_iterator, &files_ref_iterator_vtable,
876 overlay_iter->ordered);
877 iter->iter0 = overlay_iter;
Jonathan Tan9bc45a22021-10-08 14:08:15 -0700878 iter->repo = ref_store->repo;
Michael Haggerty3bc581b2016-06-18 06:15:15 +0200879 iter->flags = flags;
880
881 return ref_iterator;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100882}
883
Ævar Arnfjörð Bjarmason3fa2e912021-08-23 13:52:37 +0200884/*
885 * Callback function for raceproof_create_file(). This function is
886 * expected to do something that makes dirname(path) permanent despite
887 * the fact that other processes might be cleaning up empty
888 * directories at the same time. Usually it will create a file named
889 * path, but alternatively it could create another file in that
890 * directory, or even chdir() into that directory. The function should
891 * return 0 if the action was completed successfully. On error, it
892 * should return a nonzero result and set errno.
893 * raceproof_create_file() treats two errno values specially:
894 *
895 * - ENOENT -- dirname(path) does not exist. In this case,
896 * raceproof_create_file() tries creating dirname(path)
897 * (and any parent directories, if necessary) and calls
898 * the function again.
899 *
900 * - EISDIR -- the file already exists and is a directory. In this
901 * case, raceproof_create_file() removes the directory if
902 * it is empty (and recursively any empty directories that
903 * it contains) and calls the function again.
904 *
905 * Any other errno causes raceproof_create_file() to fail with the
906 * callback's return value and errno.
907 *
908 * Obviously, this function should be OK with being called again if it
909 * fails with ENOENT or EISDIR. In other scenarios it will not be
910 * called again.
911 */
912typedef int create_file_fn(const char *path, void *cb);
913
914/*
915 * Create a file in dirname(path) by calling fn, creating leading
916 * directories if necessary. Retry a few times in case we are racing
917 * with another process that is trying to clean up the directory that
918 * contains path. See the documentation for create_file_fn for more
919 * details.
920 *
921 * Return the value and set the errno that resulted from the most
922 * recent call of fn. fn is always called at least once, and will be
923 * called more than once if it returns ENOENT or EISDIR.
924 */
925static int raceproof_create_file(const char *path, create_file_fn fn, void *cb)
926{
927 /*
928 * The number of times we will try to remove empty directories
929 * in the way of path. This is only 1 because if another
930 * process is racily creating directories that conflict with
931 * us, we don't want to fight against them.
932 */
933 int remove_directories_remaining = 1;
934
935 /*
936 * The number of times that we will try to create the
937 * directories containing path. We are willing to attempt this
938 * more than once, because another process could be trying to
939 * clean up empty directories at the same time as we are
940 * trying to create them.
941 */
942 int create_directories_remaining = 3;
943
944 /* A scratch copy of path, filled lazily if we need it: */
945 struct strbuf path_copy = STRBUF_INIT;
946
947 int ret, save_errno;
948
949 /* Sanity check: */
950 assert(*path);
951
952retry_fn:
953 ret = fn(path, cb);
954 save_errno = errno;
955 if (!ret)
956 goto out;
957
958 if (errno == EISDIR && remove_directories_remaining-- > 0) {
959 /*
960 * A directory is in the way. Maybe it is empty; try
961 * to remove it:
962 */
963 if (!path_copy.len)
964 strbuf_addstr(&path_copy, path);
965
966 if (!remove_dir_recursively(&path_copy, REMOVE_DIR_EMPTY_ONLY))
967 goto retry_fn;
968 } else if (errno == ENOENT && create_directories_remaining-- > 0) {
969 /*
970 * Maybe the containing directory didn't exist, or
971 * maybe it was just deleted by a process that is
972 * racing with us to clean up empty directories. Try
973 * to create it:
974 */
975 enum scld_error scld_result;
976
977 if (!path_copy.len)
978 strbuf_addstr(&path_copy, path);
979
980 do {
981 scld_result = safe_create_leading_directories(path_copy.buf);
982 if (scld_result == SCLD_OK)
983 goto retry_fn;
984 } while (scld_result == SCLD_VANISHED && create_directories_remaining-- > 0);
985 }
986
987out:
988 strbuf_release(&path_copy);
989 errno = save_errno;
990 return ret;
991}
992
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +0100993static int remove_empty_directories(struct strbuf *path)
994{
995 /*
996 * we want to create a file but there is a directory there;
997 * if that is an empty directory (or a directory that contains
998 * only empty directories), remove them.
999 */
1000 return remove_dir_recursively(path, REMOVE_DIR_EMPTY_ONLY);
1001}
1002
Michael Haggerty3b5d3c92017-01-06 17:22:28 +01001003static int create_reflock(const char *path, void *cb)
1004{
1005 struct lock_file *lk = cb;
1006
Michael Haggerty4ff0f012017-08-21 13:51:34 +02001007 return hold_lock_file_for_update_timeout(
1008 lk, path, LOCK_NO_DEREF,
1009 get_files_ref_lock_timeout_ms()) < 0 ? -1 : 0;
Michael Haggerty3b5d3c92017-01-06 17:22:28 +01001010}
1011
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001012/*
1013 * Locks a ref returning the lock on success and NULL on failure.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001014 */
brian m. carlson4f01e502017-10-15 22:07:12 +00001015static struct ref_lock *lock_ref_oid_basic(struct files_ref_store *refs,
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001016 const char *refname,
brian m. carlson4f01e502017-10-15 22:07:12 +00001017 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001018{
1019 struct strbuf ref_file = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001020 struct ref_lock *lock;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001021
brian m. carlson4f01e502017-10-15 22:07:12 +00001022 files_assert_main_repository(refs, "lock_ref_oid_basic");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001023 assert(err);
1024
René Scharfeca56dad2021-03-13 17:17:22 +01001025 CALLOC_ARRAY(lock, 1);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001026
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07001027 files_ref_path(refs, &ref_file, refname);
Jeff King2859dcd2016-01-12 16:45:09 -05001028
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001029 /*
1030 * If the ref did not exist and we are creating it, make sure
1031 * there is no existing packed ref whose name begins with our
1032 * refname, nor a packed ref whose name is a proper prefix of
1033 * our refname.
1034 */
1035 if (is_null_oid(&lock->old_oid) &&
Michael Haggerty8ec617c2017-08-17 17:12:50 +02001036 refs_verify_refname_available(refs->packed_ref_store, refname,
Han-Wen Nienhuys1ae6ed22021-08-23 13:52:39 +02001037 NULL, NULL, err))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001038 goto error_return;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001039
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001040 lock->ref_name = xstrdup(refname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001041
Jeff Kingee4d8e42017-09-05 08:15:15 -04001042 if (raceproof_create_file(ref_file.buf, create_reflock, &lock->lk)) {
Michael Haggerty3b5d3c92017-01-06 17:22:28 +01001043 unable_to_lock_message(ref_file.buf, errno, err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001044 goto error_return;
1045 }
1046
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02001047 if (!refs_resolve_ref_unsafe(&refs->base, lock->ref_name, 0,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001048 &lock->old_oid, NULL))
Ævar Arnfjörð Bjarmasonff7a2e42021-08-23 13:36:12 +02001049 oidclr(&lock->old_oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001050 goto out;
1051
1052 error_return:
1053 unlock_ref(lock);
1054 lock = NULL;
1055
1056 out:
1057 strbuf_release(&ref_file);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001058 return lock;
1059}
1060
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001061struct ref_to_prune {
1062 struct ref_to_prune *next;
brian m. carlson49e99582017-10-15 22:06:49 +00001063 struct object_id oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001064 char name[FLEX_ARRAY];
1065};
1066
Michael Haggertya8f0db22017-01-06 17:22:42 +01001067enum {
1068 REMOVE_EMPTY_PARENTS_REF = 0x01,
1069 REMOVE_EMPTY_PARENTS_REFLOG = 0x02
1070};
1071
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001072/*
Michael Haggertya8f0db22017-01-06 17:22:42 +01001073 * Remove empty parent directories associated with the specified
1074 * reference and/or its reflog, but spare [logs/]refs/ and immediate
1075 * subdirs. flags is a combination of REMOVE_EMPTY_PARENTS_REF and/or
1076 * REMOVE_EMPTY_PARENTS_REFLOG.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001077 */
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001078static void try_remove_empty_parents(struct files_ref_store *refs,
1079 const char *refname,
1080 unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001081{
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001082 struct strbuf buf = STRBUF_INIT;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001083 struct strbuf sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001084 char *p, *q;
1085 int i;
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001086
1087 strbuf_addstr(&buf, refname);
1088 p = buf.buf;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001089 for (i = 0; i < 2; i++) { /* refs/{heads,tags,...}/ */
1090 while (*p && *p != '/')
1091 p++;
1092 /* tolerate duplicate slashes; see check_refname_format() */
1093 while (*p == '/')
1094 p++;
1095 }
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001096 q = buf.buf + buf.len;
Michael Haggertya8f0db22017-01-06 17:22:42 +01001097 while (flags & (REMOVE_EMPTY_PARENTS_REF | REMOVE_EMPTY_PARENTS_REFLOG)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001098 while (q > p && *q != '/')
1099 q--;
1100 while (q > p && *(q-1) == '/')
1101 q--;
1102 if (q == p)
1103 break;
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001104 strbuf_setlen(&buf, q - buf.buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001105
1106 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07001107 files_ref_path(refs, &sb, buf.buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001108 if ((flags & REMOVE_EMPTY_PARENTS_REF) && rmdir(sb.buf))
Michael Haggertya8f0db22017-01-06 17:22:42 +01001109 flags &= ~REMOVE_EMPTY_PARENTS_REF;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001110
1111 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001112 files_reflog_path(refs, &sb, buf.buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001113 if ((flags & REMOVE_EMPTY_PARENTS_REFLOG) && rmdir(sb.buf))
Michael Haggertya8f0db22017-01-06 17:22:42 +01001114 flags &= ~REMOVE_EMPTY_PARENTS_REFLOG;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001115 }
Michael Haggerty8bdaecb2017-01-06 17:22:41 +01001116 strbuf_release(&buf);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001117 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001118}
1119
1120/* make sure nobody touched the ref, and unlink */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001121static void prune_ref(struct files_ref_store *refs, struct ref_to_prune *r)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001122{
1123 struct ref_transaction *transaction;
1124 struct strbuf err = STRBUF_INIT;
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001125 int ret = -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001126
1127 if (check_refname_format(r->name, 0))
1128 return;
1129
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001130 transaction = ref_store_transaction_begin(&refs->base, &err);
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001131 if (!transaction)
1132 goto cleanup;
1133 ref_transaction_add_update(
1134 transaction, r->name,
Michael Haggertyacedcde2017-11-05 09:42:07 +01001135 REF_NO_DEREF | REF_HAVE_NEW | REF_HAVE_OLD | REF_IS_PRUNING,
brian m. carlson14228442021-04-26 01:02:56 +00001136 null_oid(), &r->oid, NULL);
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001137 if (ref_transaction_commit(transaction, &err))
1138 goto cleanup;
1139
1140 ret = 0;
1141
1142cleanup:
1143 if (ret)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001144 error("%s", err.buf);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001145 strbuf_release(&err);
Michael Haggertyb00f3cf2017-11-05 09:42:02 +01001146 ref_transaction_free(transaction);
1147 return;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001148}
1149
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001150/*
1151 * Prune the loose versions of the references in the linked list
1152 * `*refs_to_prune`, freeing the entries in the list as we go.
1153 */
1154static void prune_refs(struct files_ref_store *refs, struct ref_to_prune **refs_to_prune)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001155{
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001156 while (*refs_to_prune) {
1157 struct ref_to_prune *r = *refs_to_prune;
1158 *refs_to_prune = r->next;
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001159 prune_ref(refs, r);
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001160 free(r);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001161 }
1162}
1163
Michael Haggerty531cc4a2017-05-22 16:17:48 +02001164/*
1165 * Return true if the specified reference should be packed.
1166 */
1167static int should_pack_ref(const char *refname,
1168 const struct object_id *oid, unsigned int ref_flags,
1169 unsigned int pack_flags)
1170{
1171 /* Do not pack per-worktree refs: */
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +00001172 if (parse_worktree_ref(refname, NULL, NULL, NULL) !=
1173 REF_WORKTREE_SHARED)
Michael Haggerty531cc4a2017-05-22 16:17:48 +02001174 return 0;
1175
1176 /* Do not pack non-tags unless PACK_REFS_ALL is set: */
1177 if (!(pack_flags & PACK_REFS_ALL) && !starts_with(refname, "refs/tags/"))
1178 return 0;
1179
1180 /* Do not pack symbolic refs: */
1181 if (ref_flags & REF_ISSYMREF)
1182 return 0;
1183
1184 /* Do not pack broken refs: */
Jonathan Tan9bc45a22021-10-08 14:08:15 -07001185 if (!ref_resolves_to_object(refname, the_repository, oid, ref_flags))
Michael Haggerty531cc4a2017-05-22 16:17:48 +02001186 return 0;
1187
1188 return 1;
1189}
1190
Michael Haggerty82315272016-09-04 18:08:27 +02001191static int files_pack_refs(struct ref_store *ref_store, unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001192{
Michael Haggerty00eebe32016-09-04 18:08:11 +02001193 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001194 files_downcast(ref_store, REF_STORE_WRITE | REF_STORE_ODB,
1195 "pack_refs");
Michael Haggerty50c2d852017-04-16 08:41:41 +02001196 struct ref_iterator *iter;
Michael Haggerty50c2d852017-04-16 08:41:41 +02001197 int ok;
1198 struct ref_to_prune *refs_to_prune = NULL;
Michael Haggerty34789832017-06-23 09:01:39 +02001199 struct strbuf err = STRBUF_INIT;
Michael Haggerty27d03d02017-09-08 15:51:47 +02001200 struct ref_transaction *transaction;
1201
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001202 transaction = ref_store_transaction_begin(refs->packed_ref_store, &err);
Michael Haggerty27d03d02017-09-08 15:51:47 +02001203 if (!transaction)
1204 return -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001205
Michael Haggertyc8bed832017-06-23 09:01:42 +02001206 packed_refs_lock(refs->packed_ref_store, LOCK_DIE_ON_ERROR, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001207
Jonathan Tan87881952021-10-08 14:08:16 -07001208 iter = cache_ref_iterator_begin(get_loose_ref_cache(refs), NULL,
1209 the_repository, 0);
Michael Haggerty50c2d852017-04-16 08:41:41 +02001210 while ((ok = ref_iterator_advance(iter)) == ITER_OK) {
1211 /*
1212 * If the loose reference can be packed, add an entry
1213 * in the packed ref cache. If the reference should be
1214 * pruned, also add it to refs_to_prune.
1215 */
Michael Haggerty531cc4a2017-05-22 16:17:48 +02001216 if (!should_pack_ref(iter->refname, iter->oid, iter->flags,
1217 flags))
Michael Haggerty50c2d852017-04-16 08:41:41 +02001218 continue;
1219
1220 /*
Michael Haggerty27d03d02017-09-08 15:51:47 +02001221 * Add a reference creation for this reference to the
1222 * packed-refs transaction:
Michael Haggerty50c2d852017-04-16 08:41:41 +02001223 */
Michael Haggerty27d03d02017-09-08 15:51:47 +02001224 if (ref_transaction_update(transaction, iter->refname,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00001225 iter->oid, NULL,
Michael Haggerty91774af2017-11-05 09:42:06 +01001226 REF_NO_DEREF, NULL, &err))
Michael Haggerty27d03d02017-09-08 15:51:47 +02001227 die("failure preparing to create packed reference %s: %s",
1228 iter->refname, err.buf);
Michael Haggerty50c2d852017-04-16 08:41:41 +02001229
1230 /* Schedule the loose reference for pruning if requested. */
1231 if ((flags & PACK_REFS_PRUNE)) {
1232 struct ref_to_prune *n;
1233 FLEX_ALLOC_STR(n, name, iter->refname);
brian m. carlson49e99582017-10-15 22:06:49 +00001234 oidcpy(&n->oid, iter->oid);
Michael Haggerty50c2d852017-04-16 08:41:41 +02001235 n->next = refs_to_prune;
1236 refs_to_prune = n;
1237 }
1238 }
1239 if (ok != ITER_DONE)
1240 die("error while iterating over references");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001241
Michael Haggerty27d03d02017-09-08 15:51:47 +02001242 if (ref_transaction_commit(transaction, &err))
1243 die("unable to write new packed-refs: %s", err.buf);
1244
1245 ref_transaction_free(transaction);
1246
Michael Haggerty42c7f7f2017-06-23 09:01:45 +02001247 packed_refs_unlock(refs->packed_ref_store);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001248
Michael Haggerty22b09cd2017-09-08 15:51:48 +02001249 prune_refs(refs, &refs_to_prune);
Michael Haggerty34789832017-06-23 09:01:39 +02001250 strbuf_release(&err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001251 return 0;
1252}
1253
Michael Haggerty64da4192017-05-22 16:17:38 +02001254static int files_delete_refs(struct ref_store *ref_store, const char *msg,
David Turnera27dcf82016-09-04 18:08:40 +02001255 struct string_list *refnames, unsigned int flags)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001256{
Michael Haggerty0a95ac52016-09-04 18:08:30 +02001257 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001258 files_downcast(ref_store, REF_STORE_WRITE, "delete_refs");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001259 struct strbuf err = STRBUF_INIT;
1260 int i, result = 0;
1261
1262 if (!refnames->nr)
1263 return 0;
1264
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001265 if (packed_refs_lock(refs->packed_ref_store, 0, &err))
1266 goto error;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001267
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001268 if (refs_delete_refs(refs->packed_ref_store, msg, refnames, flags)) {
1269 packed_refs_unlock(refs->packed_ref_store);
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001270 goto error;
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07001271 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001272
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001273 packed_refs_unlock(refs->packed_ref_store);
1274
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001275 for (i = 0; i < refnames->nr; i++) {
1276 const char *refname = refnames->items[i].string;
1277
Michael Haggerty64da4192017-05-22 16:17:38 +02001278 if (refs_delete_ref(&refs->base, msg, refname, NULL, flags))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001279 result |= error(_("could not remove reference %s"), refname);
1280 }
1281
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001282 strbuf_release(&err);
1283 return result;
Michael Haggertye5cc7d72017-07-01 20:31:06 +02001284
1285error:
1286 /*
1287 * If we failed to rewrite the packed-refs file, then it is
1288 * unsafe to try to remove loose refs, because doing so might
1289 * expose an obsolete packed value for a reference that might
1290 * even point at an object that has been garbage collected.
1291 */
1292 if (refnames->nr == 1)
1293 error(_("could not delete reference %s: %s"),
1294 refnames->items[0].string, err.buf);
1295 else
1296 error(_("could not delete references: %s"), err.buf);
1297
1298 strbuf_release(&err);
1299 return -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001300}
1301
1302/*
1303 * People using contrib's git-new-workdir have .git/logs/refs ->
1304 * /some/other/path/.git/logs/refs, and that may live on another device.
1305 *
1306 * IOW, to avoid cross device rename errors, the temporary renamed log must
1307 * live into logs/refs.
1308 */
Nguyễn Thái Ngọc Duya5c1efd2017-03-26 09:42:21 +07001309#define TMP_RENAMED_LOG "refs/.tmp-renamed-log"
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001310
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001311struct rename_cb {
1312 const char *tmp_renamed_log;
1313 int true_errno;
1314};
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001315
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001316static int rename_tmp_log_callback(const char *path, void *cb_data)
1317{
1318 struct rename_cb *cb = cb_data;
1319
1320 if (rename(cb->tmp_renamed_log, path)) {
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001321 /*
1322 * rename(a, b) when b is an existing directory ought
1323 * to result in ISDIR, but Solaris 5.8 gives ENOTDIR.
1324 * Sheesh. Record the true errno for error reporting,
1325 * but report EISDIR to raceproof_create_file() so
1326 * that it knows to retry.
1327 */
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001328 cb->true_errno = errno;
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001329 if (errno == ENOTDIR)
1330 errno = EISDIR;
1331 return -1;
1332 } else {
1333 return 0;
1334 }
1335}
1336
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001337static int rename_tmp_log(struct files_ref_store *refs, const char *newrefname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001338{
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001339 struct strbuf path = STRBUF_INIT;
1340 struct strbuf tmp = STRBUF_INIT;
1341 struct rename_cb cb;
1342 int ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001343
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001344 files_reflog_path(refs, &path, newrefname);
1345 files_reflog_path(refs, &tmp, TMP_RENAMED_LOG);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001346 cb.tmp_renamed_log = tmp.buf;
1347 ret = raceproof_create_file(path.buf, rename_tmp_log_callback, &cb);
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001348 if (ret) {
1349 if (errno == EISDIR)
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001350 error("directory not empty: %s", path.buf);
Michael Haggerty6a7f3632017-01-06 17:22:29 +01001351 else
Michael Haggerty990c98d2017-01-06 17:22:30 +01001352 error("unable to move logfile %s to %s: %s",
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001353 tmp.buf, path.buf,
1354 strerror(cb.true_errno));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001355 }
1356
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001357 strbuf_release(&path);
1358 strbuf_release(&tmp);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001359 return ret;
1360}
1361
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001362static int write_ref_to_lockfile(struct ref_lock *lock,
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001363 const struct object_id *oid,
1364 int skip_oid_verification, struct strbuf *err);
Michael Haggertyf18a7892016-09-04 18:08:32 +02001365static int commit_ref_update(struct files_ref_store *refs,
1366 struct ref_lock *lock,
brian m. carlson4417df82017-05-06 22:10:24 +00001367 const struct object_id *oid, const char *logmsg,
Michael Haggerty5d9b2de2016-04-22 14:38:56 +02001368 struct strbuf *err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001369
Ævar Arnfjörð Bjarmasonc339ff62021-10-16 11:39:11 +02001370/*
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001371 * Emit a better error message than lockfile.c's
1372 * unable_to_lock_message() would in case there is a D/F conflict with
1373 * another existing reference. If there would be a conflict, emit an error
Ævar Arnfjörð Bjarmasonc339ff62021-10-16 11:39:11 +02001374 * message and return false; otherwise, return true.
1375 *
1376 * Note that this function is not safe against all races with other
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001377 * processes, and that's not its job. We'll emit a more verbose error on D/f
1378 * conflicts if we get past it into lock_ref_oid_basic().
Ævar Arnfjörð Bjarmasonc339ff62021-10-16 11:39:11 +02001379 */
1380static int refs_rename_ref_available(struct ref_store *refs,
1381 const char *old_refname,
1382 const char *new_refname)
1383{
1384 struct string_list skip = STRING_LIST_INIT_NODUP;
1385 struct strbuf err = STRBUF_INIT;
1386 int ok;
1387
1388 string_list_insert(&skip, old_refname);
1389 ok = !refs_verify_refname_available(refs, new_refname,
1390 NULL, &skip, &err);
1391 if (!ok)
1392 error("%s", err.buf);
1393
1394 string_list_clear(&skip, 0);
1395 strbuf_release(&err);
1396 return ok;
1397}
1398
Sahil Dua52d59cc2017-06-18 23:19:16 +02001399static int files_copy_or_rename_ref(struct ref_store *ref_store,
David Turner9b6b40d2016-09-04 18:08:42 +02001400 const char *oldrefname, const char *newrefname,
Sahil Dua52d59cc2017-06-18 23:19:16 +02001401 const char *logmsg, int copy)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001402{
David Turner9b6b40d2016-09-04 18:08:42 +02001403 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001404 files_downcast(ref_store, REF_STORE_WRITE, "rename_ref");
René Scharfee0ae2442019-12-11 19:46:19 +01001405 struct object_id orig_oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001406 int flag = 0, logmoved = 0;
1407 struct ref_lock *lock;
1408 struct stat loginfo;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001409 struct strbuf sb_oldref = STRBUF_INIT;
1410 struct strbuf sb_newref = STRBUF_INIT;
1411 struct strbuf tmp_renamed_log = STRBUF_INIT;
1412 int log, ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001413 struct strbuf err = STRBUF_INIT;
1414
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001415 files_reflog_path(refs, &sb_oldref, oldrefname);
1416 files_reflog_path(refs, &sb_newref, newrefname);
1417 files_reflog_path(refs, &tmp_renamed_log, TMP_RENAMED_LOG);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001418
1419 log = !lstat(sb_oldref.buf, &loginfo);
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001420 if (log && S_ISLNK(loginfo.st_mode)) {
1421 ret = error("reflog for %s is a symlink", oldrefname);
1422 goto out;
1423 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001424
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001425 if (!refs_resolve_ref_unsafe(&refs->base, oldrefname,
1426 RESOLVE_REF_READING | RESOLVE_REF_NO_RECURSE,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001427 &orig_oid, &flag)) {
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001428 ret = error("refname %s not found", oldrefname);
1429 goto out;
1430 }
Michael Haggertye711b1a2016-04-21 23:42:19 +02001431
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001432 if (flag & REF_ISSYMREF) {
Sahil Dua52d59cc2017-06-18 23:19:16 +02001433 if (copy)
1434 ret = error("refname %s is a symbolic ref, copying it is not supported",
1435 oldrefname);
1436 else
1437 ret = error("refname %s is a symbolic ref, renaming it is not supported",
1438 oldrefname);
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001439 goto out;
1440 }
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +07001441 if (!refs_rename_ref_available(&refs->base, oldrefname, newrefname)) {
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001442 ret = 1;
1443 goto out;
1444 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001445
Sahil Dua52d59cc2017-06-18 23:19:16 +02001446 if (!copy && log && rename(sb_oldref.buf, tmp_renamed_log.buf)) {
Nguyễn Thái Ngọc Duya5c1efd2017-03-26 09:42:21 +07001447 ret = error("unable to move logfile logs/%s to logs/"TMP_RENAMED_LOG": %s",
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001448 oldrefname, strerror(errno));
1449 goto out;
1450 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001451
Sahil Dua52d59cc2017-06-18 23:19:16 +02001452 if (copy && log && copy_file(tmp_renamed_log.buf, sb_oldref.buf, 0644)) {
1453 ret = error("unable to copy logfile logs/%s to logs/"TMP_RENAMED_LOG": %s",
1454 oldrefname, strerror(errno));
1455 goto out;
1456 }
1457
1458 if (!copy && refs_delete_ref(&refs->base, logmsg, oldrefname,
Michael Haggerty91774af2017-11-05 09:42:06 +01001459 &orig_oid, REF_NO_DEREF)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001460 error("unable to delete old %s", oldrefname);
1461 goto rollback;
1462 }
1463
David Turner12fd3492016-02-24 17:58:51 -05001464 /*
brian m. carlson4417df82017-05-06 22:10:24 +00001465 * Since we are doing a shallow lookup, oid is not the
1466 * correct value to pass to delete_ref as old_oid. But that
1467 * doesn't matter, because an old_oid check wouldn't add to
David Turner12fd3492016-02-24 17:58:51 -05001468 * the safety anyway; we want to delete the reference whatever
1469 * its current value.
1470 */
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02001471 if (!copy && refs_resolve_ref_unsafe(&refs->base, newrefname,
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02001472 RESOLVE_REF_READING | RESOLVE_REF_NO_RECURSE,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001473 NULL, NULL) &&
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001474 refs_delete_ref(&refs->base, NULL, newrefname,
Michael Haggerty91774af2017-11-05 09:42:06 +01001475 NULL, REF_NO_DEREF)) {
Michael Haggerty58364322017-01-06 17:22:21 +01001476 if (errno == EISDIR) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001477 struct strbuf path = STRBUF_INIT;
1478 int result;
1479
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07001480 files_ref_path(refs, &path, newrefname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001481 result = remove_empty_directories(&path);
1482 strbuf_release(&path);
1483
1484 if (result) {
1485 error("Directory not empty: %s", newrefname);
1486 goto rollback;
1487 }
1488 } else {
1489 error("unable to delete existing %s", newrefname);
1490 goto rollback;
1491 }
1492 }
1493
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001494 if (log && rename_tmp_log(refs, newrefname))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001495 goto rollback;
1496
1497 logmoved = log;
1498
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001499 lock = lock_ref_oid_basic(refs, newrefname, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001500 if (!lock) {
Sahil Dua52d59cc2017-06-18 23:19:16 +02001501 if (copy)
1502 error("unable to copy '%s' to '%s': %s", oldrefname, newrefname, err.buf);
1503 else
1504 error("unable to rename '%s' to '%s': %s", oldrefname, newrefname, err.buf);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001505 strbuf_release(&err);
1506 goto rollback;
1507 }
brian m. carlson4417df82017-05-06 22:10:24 +00001508 oidcpy(&lock->old_oid, &orig_oid);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001509
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001510 if (write_ref_to_lockfile(lock, &orig_oid, 0, &err) ||
brian m. carlson4417df82017-05-06 22:10:24 +00001511 commit_ref_update(refs, lock, &orig_oid, logmsg, &err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001512 error("unable to write current sha1 into %s: %s", newrefname, err.buf);
1513 strbuf_release(&err);
1514 goto rollback;
1515 }
1516
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001517 ret = 0;
1518 goto out;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001519
1520 rollback:
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001521 lock = lock_ref_oid_basic(refs, oldrefname, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001522 if (!lock) {
1523 error("unable to lock %s for rollback: %s", oldrefname, err.buf);
1524 strbuf_release(&err);
1525 goto rollbacklog;
1526 }
1527
1528 flag = log_all_ref_updates;
Cornelius Weig341fb282017-01-27 11:09:47 +01001529 log_all_ref_updates = LOG_REFS_NONE;
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001530 if (write_ref_to_lockfile(lock, &orig_oid, 0, &err) ||
brian m. carlson4417df82017-05-06 22:10:24 +00001531 commit_ref_update(refs, lock, &orig_oid, NULL, &err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001532 error("unable to write current sha1 into %s: %s", oldrefname, err.buf);
1533 strbuf_release(&err);
1534 }
1535 log_all_ref_updates = flag;
1536
1537 rollbacklog:
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001538 if (logmoved && rename(sb_newref.buf, sb_oldref.buf))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001539 error("unable to restore logfile %s from %s: %s",
1540 oldrefname, newrefname, strerror(errno));
1541 if (!logmoved && log &&
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001542 rename(tmp_renamed_log.buf, sb_oldref.buf))
Nguyễn Thái Ngọc Duya5c1efd2017-03-26 09:42:21 +07001543 error("unable to restore logfile %s from logs/"TMP_RENAMED_LOG": %s",
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001544 oldrefname, strerror(errno));
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001545 ret = 1;
1546 out:
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001547 strbuf_release(&sb_newref);
1548 strbuf_release(&sb_oldref);
1549 strbuf_release(&tmp_renamed_log);
1550
Nguyễn Thái Ngọc Duy0a3f07d2017-03-26 09:42:19 +07001551 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001552}
1553
Sahil Dua52d59cc2017-06-18 23:19:16 +02001554static int files_rename_ref(struct ref_store *ref_store,
1555 const char *oldrefname, const char *newrefname,
1556 const char *logmsg)
1557{
1558 return files_copy_or_rename_ref(ref_store, oldrefname,
1559 newrefname, logmsg, 0);
1560}
1561
1562static int files_copy_ref(struct ref_store *ref_store,
1563 const char *oldrefname, const char *newrefname,
1564 const char *logmsg)
1565{
1566 return files_copy_or_rename_ref(ref_store, oldrefname,
1567 newrefname, logmsg, 1);
1568}
1569
Jeff King83a30692017-09-05 08:14:33 -04001570static int close_ref_gently(struct ref_lock *lock)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001571{
Jeff Kingee4d8e42017-09-05 08:15:15 -04001572 if (close_lock_file_gently(&lock->lk))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001573 return -1;
1574 return 0;
1575}
1576
1577static int commit_ref(struct ref_lock *lock)
1578{
Jeff Kingee4d8e42017-09-05 08:15:15 -04001579 char *path = get_locked_file_path(&lock->lk);
Michael Haggerty5387c0d2016-05-05 15:33:03 +02001580 struct stat st;
1581
1582 if (!lstat(path, &st) && S_ISDIR(st.st_mode)) {
1583 /*
1584 * There is a directory at the path we want to rename
1585 * the lockfile to. Hopefully it is empty; try to
1586 * delete it.
1587 */
1588 size_t len = strlen(path);
1589 struct strbuf sb_path = STRBUF_INIT;
1590
1591 strbuf_attach(&sb_path, path, len, len);
1592
1593 /*
1594 * If this fails, commit_lock_file() will also fail
1595 * and will report the problem.
1596 */
1597 remove_empty_directories(&sb_path);
1598 strbuf_release(&sb_path);
1599 } else {
1600 free(path);
1601 }
1602
Jeff Kingee4d8e42017-09-05 08:15:15 -04001603 if (commit_lock_file(&lock->lk))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001604 return -1;
1605 return 0;
1606}
1607
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001608static int open_or_create_logfile(const char *path, void *cb)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001609{
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001610 int *fd = cb;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001611
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001612 *fd = open(path, O_APPEND | O_WRONLY | O_CREAT, 0666);
1613 return (*fd < 0) ? -1 : 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001614}
1615
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001616/*
Michael Haggerty4533e532017-01-06 17:22:36 +01001617 * Create a reflog for a ref. If force_create = 0, only create the
1618 * reflog for certain refs (those for which should_autocreate_reflog
1619 * returns non-zero). Otherwise, create it regardless of the reference
1620 * name. If the logfile already existed or was created, return 0 and
1621 * set *logfd to the file descriptor opened for appending to the file.
1622 * If no logfile exists and we decided not to create one, return 0 and
1623 * set *logfd to -1. On failure, fill in *err, set *logfd to -1, and
1624 * return -1.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001625 */
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001626static int log_ref_setup(struct files_ref_store *refs,
1627 const char *refname, int force_create,
Michael Haggerty4533e532017-01-06 17:22:36 +01001628 int *logfd, struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001629{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001630 struct strbuf logfile_sb = STRBUF_INIT;
1631 char *logfile;
1632
1633 files_reflog_path(refs, &logfile_sb, refname);
1634 logfile = strbuf_detach(&logfile_sb, NULL);
Michael Haggerty854bda62017-01-06 17:22:32 +01001635
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001636 if (force_create || should_autocreate_reflog(refname)) {
Michael Haggerty4533e532017-01-06 17:22:36 +01001637 if (raceproof_create_file(logfile, open_or_create_logfile, logfd)) {
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001638 if (errno == ENOENT)
1639 strbuf_addf(err, "unable to create directory for '%s': "
Michael Haggerty4533e532017-01-06 17:22:36 +01001640 "%s", logfile, strerror(errno));
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001641 else if (errno == EISDIR)
1642 strbuf_addf(err, "there are still logs under '%s'",
Michael Haggerty4533e532017-01-06 17:22:36 +01001643 logfile);
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001644 else
Michael Haggerty854bda62017-01-06 17:22:32 +01001645 strbuf_addf(err, "unable to append to '%s': %s",
Michael Haggerty4533e532017-01-06 17:22:36 +01001646 logfile, strerror(errno));
Michael Haggerty1fb0c802017-01-06 17:22:33 +01001647
Michael Haggerty4533e532017-01-06 17:22:36 +01001648 goto error;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001649 }
Michael Haggerty854bda62017-01-06 17:22:32 +01001650 } else {
René Scharfe35cf94e2021-09-09 23:45:51 +02001651 *logfd = open(logfile, O_APPEND | O_WRONLY);
Michael Haggertye404f452017-01-06 17:22:34 +01001652 if (*logfd < 0) {
Michael Haggerty854bda62017-01-06 17:22:32 +01001653 if (errno == ENOENT || errno == EISDIR) {
1654 /*
1655 * The logfile doesn't already exist,
1656 * but that is not an error; it only
1657 * means that we won't write log
1658 * entries to it.
1659 */
1660 ;
1661 } else {
1662 strbuf_addf(err, "unable to append to '%s': %s",
Michael Haggerty4533e532017-01-06 17:22:36 +01001663 logfile, strerror(errno));
1664 goto error;
Michael Haggerty854bda62017-01-06 17:22:32 +01001665 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001666 }
1667 }
1668
Michael Haggertye404f452017-01-06 17:22:34 +01001669 if (*logfd >= 0)
Michael Haggerty4533e532017-01-06 17:22:36 +01001670 adjust_shared_perm(logfile);
Michael Haggerty854bda62017-01-06 17:22:32 +01001671
Michael Haggerty4533e532017-01-06 17:22:36 +01001672 free(logfile);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001673 return 0;
Michael Haggerty4533e532017-01-06 17:22:36 +01001674
1675error:
1676 free(logfile);
1677 return -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001678}
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001679
Han-Wen Nienhuys7b089122021-11-22 14:19:08 +00001680static int files_create_reflog(struct ref_store *ref_store, const char *refname,
David Turnere3688bd2016-09-04 18:08:38 +02001681 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001682{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001683 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001684 files_downcast(ref_store, REF_STORE_WRITE, "create_reflog");
Michael Haggertye404f452017-01-06 17:22:34 +01001685 int fd;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001686
Han-Wen Nienhuys7b089122021-11-22 14:19:08 +00001687 if (log_ref_setup(refs, refname, 1, &fd, err))
Michael Haggerty4533e532017-01-06 17:22:36 +01001688 return -1;
1689
Michael Haggertye404f452017-01-06 17:22:34 +01001690 if (fd >= 0)
1691 close(fd);
Michael Haggerty4533e532017-01-06 17:22:36 +01001692
1693 return 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001694}
1695
brian m. carlson4417df82017-05-06 22:10:24 +00001696static int log_ref_write_fd(int fd, const struct object_id *old_oid,
1697 const struct object_id *new_oid,
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001698 const char *committer, const char *msg)
1699{
Ben Peart80a6c202018-07-10 21:08:22 +00001700 struct strbuf sb = STRBUF_INIT;
1701 int ret = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001702
Ben Peart80a6c202018-07-10 21:08:22 +00001703 strbuf_addf(&sb, "%s %s %s", oid_to_hex(old_oid), oid_to_hex(new_oid), committer);
Han-Wen Nienhuys25429fe2020-07-31 11:36:10 +00001704 if (msg && *msg) {
1705 strbuf_addch(&sb, '\t');
Junio C Hamano523fa692020-07-10 17:19:53 +00001706 strbuf_addstr(&sb, msg);
Han-Wen Nienhuys25429fe2020-07-31 11:36:10 +00001707 }
Ben Peart80a6c202018-07-10 21:08:22 +00001708 strbuf_addch(&sb, '\n');
1709 if (write_in_full(fd, sb.buf, sb.len) < 0)
1710 ret = -1;
1711 strbuf_release(&sb);
1712 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001713}
1714
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001715static int files_log_ref_write(struct files_ref_store *refs,
brian m. carlson4417df82017-05-06 22:10:24 +00001716 const char *refname, const struct object_id *old_oid,
1717 const struct object_id *new_oid, const char *msg,
Nguyễn Thái Ngọc Duy11f84572017-03-26 09:42:15 +07001718 int flags, struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001719{
Michael Haggertye404f452017-01-06 17:22:34 +01001720 int logfd, result;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001721
Cornelius Weig341fb282017-01-27 11:09:47 +01001722 if (log_all_ref_updates == LOG_REFS_UNSET)
1723 log_all_ref_updates = is_bare_repository() ? LOG_REFS_NONE : LOG_REFS_NORMAL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001724
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001725 result = log_ref_setup(refs, refname,
1726 flags & REF_FORCE_CREATE_REFLOG,
Michael Haggerty4533e532017-01-06 17:22:36 +01001727 &logfd, err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001728
1729 if (result)
1730 return result;
1731
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001732 if (logfd < 0)
1733 return 0;
brian m. carlson4417df82017-05-06 22:10:24 +00001734 result = log_ref_write_fd(logfd, old_oid, new_oid,
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001735 git_committer_info(0), msg);
1736 if (result) {
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001737 struct strbuf sb = STRBUF_INIT;
Michael Haggerty87b21e02017-01-06 17:22:35 +01001738 int save_errno = errno;
1739
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001740 files_reflog_path(refs, &sb, refname);
Michael Haggerty87b21e02017-01-06 17:22:35 +01001741 strbuf_addf(err, "unable to append to '%s': %s",
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001742 sb.buf, strerror(save_errno));
1743 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001744 close(logfd);
1745 return -1;
1746 }
1747 if (close(logfd)) {
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001748 struct strbuf sb = STRBUF_INIT;
Michael Haggerty87b21e02017-01-06 17:22:35 +01001749 int save_errno = errno;
1750
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001751 files_reflog_path(refs, &sb, refname);
Michael Haggerty87b21e02017-01-06 17:22:35 +01001752 strbuf_addf(err, "unable to append to '%s': %s",
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001753 sb.buf, strerror(save_errno));
1754 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001755 return -1;
1756 }
1757 return 0;
1758}
1759
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001760/*
Michael Haggerty78fb4572017-11-05 09:42:09 +01001761 * Write oid into the open lockfile, then close the lockfile. On
1762 * errors, rollback the lockfile, fill in *err and return -1.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001763 */
1764static int write_ref_to_lockfile(struct ref_lock *lock,
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001765 const struct object_id *oid,
1766 int skip_oid_verification, struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001767{
1768 static char term = '\n';
1769 struct object *o;
1770 int fd;
1771
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00001772 if (!skip_oid_verification) {
1773 o = parse_object(the_repository, oid);
1774 if (!o) {
1775 strbuf_addf(
1776 err,
1777 "trying to write ref '%s' with nonexistent object %s",
1778 lock->ref_name, oid_to_hex(oid));
1779 unlock_ref(lock);
1780 return -1;
1781 }
1782 if (o->type != OBJ_COMMIT && is_branch(lock->ref_name)) {
1783 strbuf_addf(
1784 err,
1785 "trying to write non-commit object %s to branch '%s'",
1786 oid_to_hex(oid), lock->ref_name);
1787 unlock_ref(lock);
1788 return -1;
1789 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001790 }
Jeff Kingee4d8e42017-09-05 08:15:15 -04001791 fd = get_lock_file_fd(&lock->lk);
brian m. carlson2ae2e2a2018-07-16 01:27:59 +00001792 if (write_in_full(fd, oid_to_hex(oid), the_hash_algo->hexsz) < 0 ||
Jeff King06f46f22017-09-13 13:16:03 -04001793 write_in_full(fd, &term, 1) < 0 ||
Patrick Steinhardtbc22d842022-03-11 10:58:59 +01001794 fsync_component(FSYNC_COMPONENT_REFERENCE, get_lock_file_fd(&lock->lk)) < 0 ||
Jeff King83a30692017-09-05 08:14:33 -04001795 close_ref_gently(lock) < 0) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001796 strbuf_addf(err,
Jeff Kingee4d8e42017-09-05 08:15:15 -04001797 "couldn't write '%s'", get_lock_file_path(&lock->lk));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001798 unlock_ref(lock);
1799 return -1;
1800 }
1801 return 0;
1802}
1803
1804/*
1805 * Commit a change to a loose reference that has already been written
1806 * to the loose reference lockfile. Also update the reflogs if
1807 * necessary, using the specified lockmsg (which can be NULL).
1808 */
Michael Haggertyf18a7892016-09-04 18:08:32 +02001809static int commit_ref_update(struct files_ref_store *refs,
1810 struct ref_lock *lock,
brian m. carlson4417df82017-05-06 22:10:24 +00001811 const struct object_id *oid, const char *logmsg,
Michael Haggerty5d9b2de2016-04-22 14:38:56 +02001812 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001813{
Michael Haggerty32c597e2017-02-10 12:16:16 +01001814 files_assert_main_repository(refs, "commit_ref_update");
Michael Haggerty00eebe32016-09-04 18:08:11 +02001815
1816 clear_loose_ref_cache(refs);
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001817 if (files_log_ref_write(refs, lock->ref_name,
brian m. carlson4417df82017-05-06 22:10:24 +00001818 &lock->old_oid, oid,
Michael Haggerty81b1b6d2017-01-06 17:22:31 +01001819 logmsg, 0, err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001820 char *old_msg = strbuf_detach(err, NULL);
Michael Haggerty0568c8e2016-04-27 15:21:36 +02001821 strbuf_addf(err, "cannot update the ref '%s': %s",
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001822 lock->ref_name, old_msg);
1823 free(old_msg);
1824 unlock_ref(lock);
1825 return -1;
1826 }
Michael Haggerty7a418f32016-04-22 15:25:25 +02001827
1828 if (strcmp(lock->ref_name, "HEAD") != 0) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001829 /*
1830 * Special hack: If a branch is updated directly and HEAD
1831 * points to it (may happen on the remote side of a push
1832 * for example) then logically the HEAD reflog should be
1833 * updated too.
1834 * A generic solution implies reverse symref information,
1835 * but finding all symrefs pointing to the given branch
1836 * would be rather costly for this rare event (the direct
1837 * update of a branch) to be worth it. So let's cheat and
1838 * check with HEAD only which should cover 99% of all usage
1839 * scenarios (even 100% of the default ones).
1840 */
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001841 int head_flag;
1842 const char *head_ref;
Michael Haggerty7a418f32016-04-22 15:25:25 +02001843
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001844 head_ref = refs_resolve_ref_unsafe(&refs->base, "HEAD",
1845 RESOLVE_REF_READING,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001846 NULL, &head_flag);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001847 if (head_ref && (head_flag & REF_ISSYMREF) &&
1848 !strcmp(head_ref, lock->ref_name)) {
1849 struct strbuf log_err = STRBUF_INIT;
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001850 if (files_log_ref_write(refs, "HEAD",
brian m. carlson4417df82017-05-06 22:10:24 +00001851 &lock->old_oid, oid,
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001852 logmsg, 0, &log_err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001853 error("%s", log_err.buf);
1854 strbuf_release(&log_err);
1855 }
1856 }
1857 }
Michael Haggerty7a418f32016-04-22 15:25:25 +02001858
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001859 if (commit_ref(lock)) {
Michael Haggerty0568c8e2016-04-27 15:21:36 +02001860 strbuf_addf(err, "couldn't set '%s'", lock->ref_name);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001861 unlock_ref(lock);
1862 return -1;
1863 }
1864
1865 unlock_ref(lock);
1866 return 0;
1867}
1868
Jeff King370e5ad2015-12-29 00:57:01 -05001869static int create_ref_symlink(struct ref_lock *lock, const char *target)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001870{
Jeff King370e5ad2015-12-29 00:57:01 -05001871 int ret = -1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001872#ifndef NO_SYMLINK_HEAD
Jeff Kingee4d8e42017-09-05 08:15:15 -04001873 char *ref_path = get_locked_file_path(&lock->lk);
Jeff King370e5ad2015-12-29 00:57:01 -05001874 unlink(ref_path);
1875 ret = symlink(target, ref_path);
1876 free(ref_path);
1877
1878 if (ret)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001879 fprintf(stderr, "no symlink - falling back to symbolic ref\n");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001880#endif
Jeff King370e5ad2015-12-29 00:57:01 -05001881 return ret;
1882}
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001883
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001884static void update_symref_reflog(struct files_ref_store *refs,
1885 struct ref_lock *lock, const char *refname,
Jeff King370e5ad2015-12-29 00:57:01 -05001886 const char *target, const char *logmsg)
1887{
1888 struct strbuf err = STRBUF_INIT;
brian m. carlson4417df82017-05-06 22:10:24 +00001889 struct object_id new_oid;
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02001890
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07001891 if (logmsg &&
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02001892 refs_resolve_ref_unsafe(&refs->base, target,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01001893 RESOLVE_REF_READING, &new_oid, NULL) &&
brian m. carlson4417df82017-05-06 22:10:24 +00001894 files_log_ref_write(refs, refname, &lock->old_oid,
1895 &new_oid, logmsg, 0, &err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001896 error("%s", err.buf);
1897 strbuf_release(&err);
1898 }
Jeff King370e5ad2015-12-29 00:57:01 -05001899}
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001900
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001901static int create_symref_locked(struct files_ref_store *refs,
1902 struct ref_lock *lock, const char *refname,
Jeff King370e5ad2015-12-29 00:57:01 -05001903 const char *target, const char *logmsg)
1904{
1905 if (prefer_symlink_refs && !create_ref_symlink(lock, target)) {
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001906 update_symref_reflog(refs, lock, refname, target, logmsg);
Jeff King370e5ad2015-12-29 00:57:01 -05001907 return 0;
1908 }
1909
Jeff Kingee4d8e42017-09-05 08:15:15 -04001910 if (!fdopen_lock_file(&lock->lk, "w"))
Jeff King370e5ad2015-12-29 00:57:01 -05001911 return error("unable to fdopen %s: %s",
Martin Ågren7f0dc792021-01-05 20:23:49 +01001912 get_lock_file_path(&lock->lk), strerror(errno));
Jeff King370e5ad2015-12-29 00:57:01 -05001913
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001914 update_symref_reflog(refs, lock, refname, target, logmsg);
Jeff King396da8f2015-12-29 00:57:25 -05001915
Jeff King370e5ad2015-12-29 00:57:01 -05001916 /* no error check; commit_ref will check ferror */
Martin Ågren7f0dc792021-01-05 20:23:49 +01001917 fprintf(get_lock_file_fp(&lock->lk), "ref: %s\n", target);
Jeff King370e5ad2015-12-29 00:57:01 -05001918 if (commit_ref(lock) < 0)
1919 return error("unable to write symref for %s: %s", refname,
1920 strerror(errno));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001921 return 0;
1922}
1923
Michael Haggerty284689b2016-09-04 18:08:28 +02001924static int files_create_symref(struct ref_store *ref_store,
1925 const char *refname, const char *target,
1926 const char *logmsg)
Jeff King370e5ad2015-12-29 00:57:01 -05001927{
Michael Haggerty7eb27cd2016-09-04 18:08:34 +02001928 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001929 files_downcast(ref_store, REF_STORE_WRITE, "create_symref");
Jeff King370e5ad2015-12-29 00:57:01 -05001930 struct strbuf err = STRBUF_INIT;
1931 struct ref_lock *lock;
1932 int ret;
1933
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02001934 lock = lock_ref_oid_basic(refs, refname, &err);
Jeff King370e5ad2015-12-29 00:57:01 -05001935 if (!lock) {
1936 error("%s", err.buf);
1937 strbuf_release(&err);
1938 return -1;
1939 }
1940
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001941 ret = create_symref_locked(refs, lock, refname, target, logmsg);
Jeff King370e5ad2015-12-29 00:57:01 -05001942 unlock_ref(lock);
1943 return ret;
1944}
1945
David Turnere3688bd2016-09-04 18:08:38 +02001946static int files_reflog_exists(struct ref_store *ref_store,
1947 const char *refname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001948{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001949 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001950 files_downcast(ref_store, REF_STORE_READ, "reflog_exists");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001951 struct strbuf sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001952 struct stat st;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001953 int ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001954
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001955 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001956 ret = !lstat(sb.buf, &st) && S_ISREG(st.st_mode);
1957 strbuf_release(&sb);
1958 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001959}
1960
David Turnere3688bd2016-09-04 18:08:38 +02001961static int files_delete_reflog(struct ref_store *ref_store,
1962 const char *refname)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001963{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001964 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07001965 files_downcast(ref_store, REF_STORE_WRITE, "delete_reflog");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001966 struct strbuf sb = STRBUF_INIT;
1967 int ret;
1968
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07001969 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07001970 ret = remove_path(sb.buf);
1971 strbuf_release(&sb);
1972 return ret;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001973}
1974
1975static int show_one_reflog_ent(struct strbuf *sb, each_reflog_ent_fn fn, void *cb_data)
1976{
brian m. carlson9461d272017-02-21 23:47:32 +00001977 struct object_id ooid, noid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001978 char *email_end, *message;
Johannes Schindelindddbad72017-04-26 21:29:31 +02001979 timestamp_t timestamp;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001980 int tz;
brian m. carlson43bc3b62017-02-21 23:47:33 +00001981 const char *p = sb->buf;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001982
1983 /* old SP new SP name <email> SP time TAB msg LF */
brian m. carlson43bc3b62017-02-21 23:47:33 +00001984 if (!sb->len || sb->buf[sb->len - 1] != '\n' ||
1985 parse_oid_hex(p, &ooid, &p) || *p++ != ' ' ||
1986 parse_oid_hex(p, &noid, &p) || *p++ != ' ' ||
1987 !(email_end = strchr(p, '>')) ||
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001988 email_end[1] != ' ' ||
Johannes Schindelin1aeb7e72017-04-21 12:45:44 +02001989 !(timestamp = parse_timestamp(email_end + 2, &message, 10)) ||
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01001990 !message || message[0] != ' ' ||
1991 (message[1] != '+' && message[1] != '-') ||
1992 !isdigit(message[2]) || !isdigit(message[3]) ||
1993 !isdigit(message[4]) || !isdigit(message[5]))
1994 return 0; /* corrupt? */
1995 email_end[1] = '\0';
1996 tz = strtol(message + 1, NULL, 10);
1997 if (message[6] != '\t')
1998 message += 6;
1999 else
2000 message += 7;
brian m. carlson43bc3b62017-02-21 23:47:33 +00002001 return fn(&ooid, &noid, p, timestamp, tz, message, cb_data);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002002}
2003
2004static char *find_beginning_of_line(char *bob, char *scan)
2005{
2006 while (bob < scan && *(--scan) != '\n')
2007 ; /* keep scanning backwards */
2008 /*
2009 * Return either beginning of the buffer, or LF at the end of
2010 * the previous line.
2011 */
2012 return scan;
2013}
2014
David Turnere3688bd2016-09-04 18:08:38 +02002015static int files_for_each_reflog_ent_reverse(struct ref_store *ref_store,
2016 const char *refname,
2017 each_reflog_ent_fn fn,
2018 void *cb_data)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002019{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002020 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07002021 files_downcast(ref_store, REF_STORE_READ,
2022 "for_each_reflog_ent_reverse");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002023 struct strbuf sb = STRBUF_INIT;
2024 FILE *logfp;
2025 long pos;
2026 int ret = 0, at_tail = 1;
2027
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002028 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002029 logfp = fopen(sb.buf, "r");
2030 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002031 if (!logfp)
2032 return -1;
2033
2034 /* Jump to the end */
2035 if (fseek(logfp, 0, SEEK_END) < 0)
René Scharfebe686f02017-04-16 18:55:46 +02002036 ret = error("cannot seek back reflog for %s: %s",
2037 refname, strerror(errno));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002038 pos = ftell(logfp);
2039 while (!ret && 0 < pos) {
2040 int cnt;
2041 size_t nread;
2042 char buf[BUFSIZ];
2043 char *endp, *scanp;
2044
2045 /* Fill next block from the end */
2046 cnt = (sizeof(buf) < pos) ? sizeof(buf) : pos;
René Scharfebe686f02017-04-16 18:55:46 +02002047 if (fseek(logfp, pos - cnt, SEEK_SET)) {
2048 ret = error("cannot seek back reflog for %s: %s",
2049 refname, strerror(errno));
2050 break;
2051 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002052 nread = fread(buf, cnt, 1, logfp);
René Scharfebe686f02017-04-16 18:55:46 +02002053 if (nread != 1) {
2054 ret = error("cannot read %d bytes from reflog for %s: %s",
2055 cnt, refname, strerror(errno));
2056 break;
2057 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002058 pos -= cnt;
2059
2060 scanp = endp = buf + cnt;
2061 if (at_tail && scanp[-1] == '\n')
2062 /* Looking at the final LF at the end of the file */
2063 scanp--;
2064 at_tail = 0;
2065
2066 while (buf < scanp) {
2067 /*
2068 * terminating LF of the previous line, or the beginning
2069 * of the buffer.
2070 */
2071 char *bp;
2072
2073 bp = find_beginning_of_line(buf, scanp);
2074
2075 if (*bp == '\n') {
2076 /*
2077 * The newline is the end of the previous line,
2078 * so we know we have complete line starting
2079 * at (bp + 1). Prefix it onto any prior data
2080 * we collected for the line and process it.
2081 */
2082 strbuf_splice(&sb, 0, 0, bp + 1, endp - (bp + 1));
2083 scanp = bp;
2084 endp = bp + 1;
2085 ret = show_one_reflog_ent(&sb, fn, cb_data);
2086 strbuf_reset(&sb);
2087 if (ret)
2088 break;
2089 } else if (!pos) {
2090 /*
2091 * We are at the start of the buffer, and the
2092 * start of the file; there is no previous
2093 * line, and we have everything for this one.
2094 * Process it, and we can end the loop.
2095 */
2096 strbuf_splice(&sb, 0, 0, buf, endp - buf);
2097 ret = show_one_reflog_ent(&sb, fn, cb_data);
2098 strbuf_reset(&sb);
2099 break;
2100 }
2101
2102 if (bp == buf) {
2103 /*
2104 * We are at the start of the buffer, and there
2105 * is more file to read backwards. Which means
2106 * we are in the middle of a line. Note that we
2107 * may get here even if *bp was a newline; that
2108 * just means we are at the exact end of the
2109 * previous line, rather than some spot in the
2110 * middle.
2111 *
2112 * Save away what we have to be combined with
2113 * the data from the next read.
2114 */
2115 strbuf_splice(&sb, 0, 0, buf, endp - buf);
2116 break;
2117 }
2118 }
2119
2120 }
2121 if (!ret && sb.len)
Johannes Schindelin033abf92018-05-02 11:38:39 +02002122 BUG("reverse reflog parser had leftover data");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002123
2124 fclose(logfp);
2125 strbuf_release(&sb);
2126 return ret;
2127}
2128
David Turnere3688bd2016-09-04 18:08:38 +02002129static int files_for_each_reflog_ent(struct ref_store *ref_store,
2130 const char *refname,
2131 each_reflog_ent_fn fn, void *cb_data)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002132{
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002133 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07002134 files_downcast(ref_store, REF_STORE_READ,
2135 "for_each_reflog_ent");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002136 FILE *logfp;
2137 struct strbuf sb = STRBUF_INIT;
2138 int ret = 0;
2139
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002140 files_reflog_path(refs, &sb, refname);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002141 logfp = fopen(sb.buf, "r");
2142 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002143 if (!logfp)
2144 return -1;
2145
2146 while (!ret && !strbuf_getwholeline(&sb, logfp, '\n'))
2147 ret = show_one_reflog_ent(&sb, fn, cb_data);
2148 fclose(logfp);
2149 strbuf_release(&sb);
2150 return ret;
2151}
Michael Haggerty2880d162016-06-18 06:15:19 +02002152
2153struct files_reflog_iterator {
2154 struct ref_iterator base;
2155
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07002156 struct ref_store *ref_store;
Michael Haggerty2880d162016-06-18 06:15:19 +02002157 struct dir_iterator *dir_iterator;
2158 struct object_id oid;
2159};
2160
2161static int files_reflog_iterator_advance(struct ref_iterator *ref_iterator)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002162{
Michael Haggerty2880d162016-06-18 06:15:19 +02002163 struct files_reflog_iterator *iter =
2164 (struct files_reflog_iterator *)ref_iterator;
2165 struct dir_iterator *diter = iter->dir_iterator;
2166 int ok;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002167
Michael Haggerty2880d162016-06-18 06:15:19 +02002168 while ((ok = dir_iterator_advance(diter)) == ITER_OK) {
2169 int flags;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002170
Michael Haggerty2880d162016-06-18 06:15:19 +02002171 if (!S_ISREG(diter->st.st_mode))
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002172 continue;
Michael Haggerty2880d162016-06-18 06:15:19 +02002173 if (diter->basename[0] == '.')
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002174 continue;
Michael Haggerty2880d162016-06-18 06:15:19 +02002175 if (ends_with(diter->basename, ".lock"))
2176 continue;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002177
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02002178 if (!refs_resolve_ref_unsafe(iter->ref_store,
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02002179 diter->relative_path, 0,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01002180 &iter->oid, &flags)) {
Michael Haggerty2880d162016-06-18 06:15:19 +02002181 error("bad ref for %s", diter->path.buf);
2182 continue;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002183 }
Michael Haggerty2880d162016-06-18 06:15:19 +02002184
2185 iter->base.refname = diter->relative_path;
2186 iter->base.oid = &iter->oid;
2187 iter->base.flags = flags;
2188 return ITER_OK;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002189 }
Michael Haggerty2880d162016-06-18 06:15:19 +02002190
2191 iter->dir_iterator = NULL;
2192 if (ref_iterator_abort(ref_iterator) == ITER_ERROR)
2193 ok = ITER_ERROR;
2194 return ok;
2195}
2196
Ævar Arnfjörð Bjarmason5cf88fd2022-08-25 19:09:48 +02002197static int files_reflog_iterator_peel(struct ref_iterator *ref_iterator UNUSED,
2198 struct object_id *peeled UNUSED)
Michael Haggerty2880d162016-06-18 06:15:19 +02002199{
Johannes Schindelin033abf92018-05-02 11:38:39 +02002200 BUG("ref_iterator_peel() called for reflog_iterator");
Michael Haggerty2880d162016-06-18 06:15:19 +02002201}
2202
2203static int files_reflog_iterator_abort(struct ref_iterator *ref_iterator)
2204{
2205 struct files_reflog_iterator *iter =
2206 (struct files_reflog_iterator *)ref_iterator;
2207 int ok = ITER_DONE;
2208
2209 if (iter->dir_iterator)
2210 ok = dir_iterator_abort(iter->dir_iterator);
2211
2212 base_ref_iterator_free(ref_iterator);
2213 return ok;
2214}
2215
2216static struct ref_iterator_vtable files_reflog_iterator_vtable = {
Ævar Arnfjörð Bjarmasone2f8acb2022-03-17 18:27:16 +01002217 .advance = files_reflog_iterator_advance,
2218 .peel = files_reflog_iterator_peel,
2219 .abort = files_reflog_iterator_abort,
Michael Haggerty2880d162016-06-18 06:15:19 +02002220};
2221
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002222static struct ref_iterator *reflog_iterator_begin(struct ref_store *ref_store,
2223 const char *gitdir)
Michael Haggerty2880d162016-06-18 06:15:19 +02002224{
Matheus Tavares30123972019-07-10 20:58:59 -03002225 struct dir_iterator *diter;
2226 struct files_reflog_iterator *iter;
2227 struct ref_iterator *ref_iterator;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002228 struct strbuf sb = STRBUF_INIT;
Michael Haggerty2880d162016-06-18 06:15:19 +02002229
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002230 strbuf_addf(&sb, "%s/logs", gitdir);
Matheus Tavares30123972019-07-10 20:58:59 -03002231
Matheus Tavaresfa1da7d2019-07-10 20:59:00 -03002232 diter = dir_iterator_begin(sb.buf, 0);
René Scharfe9b7b0292019-08-07 13:15:14 +02002233 if (!diter) {
2234 strbuf_release(&sb);
Matheus Tavares30123972019-07-10 20:58:59 -03002235 return empty_ref_iterator_begin();
René Scharfe9b7b0292019-08-07 13:15:14 +02002236 }
Matheus Tavares30123972019-07-10 20:58:59 -03002237
René Scharfeca56dad2021-03-13 17:17:22 +01002238 CALLOC_ARRAY(iter, 1);
Matheus Tavares30123972019-07-10 20:58:59 -03002239 ref_iterator = &iter->base;
2240
2241 base_ref_iterator_init(ref_iterator, &files_reflog_iterator_vtable, 0);
2242 iter->dir_iterator = diter;
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07002243 iter->ref_store = ref_store;
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002244 strbuf_release(&sb);
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002245
Michael Haggerty2880d162016-06-18 06:15:19 +02002246 return ref_iterator;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002247}
2248
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002249static enum iterator_selection reflog_iterator_select(
2250 struct ref_iterator *iter_worktree,
2251 struct ref_iterator *iter_common,
Ævar Arnfjörð Bjarmason5cf88fd2022-08-25 19:09:48 +02002252 void *cb_data UNUSED)
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002253{
2254 if (iter_worktree) {
2255 /*
2256 * We're a bit loose here. We probably should ignore
2257 * common refs if they are accidentally added as
2258 * per-worktree refs.
2259 */
2260 return ITER_SELECT_0;
2261 } else if (iter_common) {
Han-Wen Nienhuys71e54732022-09-19 16:34:50 +00002262 if (parse_worktree_ref(iter_common->refname, NULL, NULL,
2263 NULL) == REF_WORKTREE_SHARED)
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002264 return ITER_SELECT_1;
2265
2266 /*
2267 * The main ref store may contain main worktree's
2268 * per-worktree refs, which should be ignored
2269 */
2270 return ITER_SKIP_1;
2271 } else
2272 return ITER_DONE;
2273}
2274
2275static struct ref_iterator *files_reflog_iterator_begin(struct ref_store *ref_store)
2276{
2277 struct files_ref_store *refs =
2278 files_downcast(ref_store, REF_STORE_READ,
2279 "reflog_iterator_begin");
2280
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +00002281 if (!strcmp(refs->base.gitdir, refs->gitcommondir)) {
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002282 return reflog_iterator_begin(ref_store, refs->gitcommondir);
2283 } else {
2284 return merge_ref_iterator_begin(
Han-Wen Nienhuys5085aef2020-08-19 14:27:57 +00002285 0, reflog_iterator_begin(ref_store, refs->base.gitdir),
Nguyễn Thái Ngọc Duy944b4e32017-08-23 19:37:00 +07002286 reflog_iterator_begin(ref_store, refs->gitcommondir),
2287 reflog_iterator_select, refs);
2288 }
2289}
2290
Michael Haggerty165056b2016-04-24 08:58:41 +02002291/*
Michael Haggerty92b15512016-04-25 15:56:07 +02002292 * If update is a direct update of head_ref (the reference pointed to
2293 * by HEAD), then add an extra REF_LOG_ONLY update for HEAD.
Michael Haggerty165056b2016-04-24 08:58:41 +02002294 */
Michael Haggerty92b15512016-04-25 15:56:07 +02002295static int split_head_update(struct ref_update *update,
2296 struct ref_transaction *transaction,
2297 const char *head_ref,
2298 struct string_list *affected_refnames,
2299 struct strbuf *err)
2300{
2301 struct string_list_item *item;
2302 struct ref_update *new_update;
2303
2304 if ((update->flags & REF_LOG_ONLY) ||
Michael Haggertyacedcde2017-11-05 09:42:07 +01002305 (update->flags & REF_IS_PRUNING) ||
Michael Haggerty92b15512016-04-25 15:56:07 +02002306 (update->flags & REF_UPDATE_VIA_HEAD))
2307 return 0;
2308
2309 if (strcmp(update->refname, head_ref))
2310 return 0;
2311
2312 /*
2313 * First make sure that HEAD is not already in the
Martin Ågren276d0e32017-09-09 08:57:18 +02002314 * transaction. This check is O(lg N) in the transaction
Michael Haggerty92b15512016-04-25 15:56:07 +02002315 * size, but it happens at most once per transaction.
2316 */
Martin Ågren276d0e32017-09-09 08:57:18 +02002317 if (string_list_has_string(affected_refnames, "HEAD")) {
Michael Haggerty92b15512016-04-25 15:56:07 +02002318 /* An entry already existed */
2319 strbuf_addf(err,
2320 "multiple updates for 'HEAD' (including one "
2321 "via its referent '%s') are not allowed",
2322 update->refname);
2323 return TRANSACTION_NAME_CONFLICT;
2324 }
2325
2326 new_update = ref_transaction_add_update(
2327 transaction, "HEAD",
Michael Haggerty91774af2017-11-05 09:42:06 +01002328 update->flags | REF_LOG_ONLY | REF_NO_DEREF,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00002329 &update->new_oid, &update->old_oid,
Michael Haggerty92b15512016-04-25 15:56:07 +02002330 update->msg);
2331
Martin Ågren276d0e32017-09-09 08:57:18 +02002332 /*
2333 * Add "HEAD". This insertion is O(N) in the transaction
2334 * size, but it happens at most once per transaction.
2335 * Add new_update->refname instead of a literal "HEAD".
2336 */
2337 if (strcmp(new_update->refname, "HEAD"))
2338 BUG("%s unexpectedly not 'HEAD'", new_update->refname);
2339 item = string_list_insert(affected_refnames, new_update->refname);
Michael Haggerty92b15512016-04-25 15:56:07 +02002340 item->util = new_update;
2341
2342 return 0;
2343}
2344
2345/*
2346 * update is for a symref that points at referent and doesn't have
Michael Haggerty91774af2017-11-05 09:42:06 +01002347 * REF_NO_DEREF set. Split it into two updates:
2348 * - The original update, but with REF_LOG_ONLY and REF_NO_DEREF set
Michael Haggerty92b15512016-04-25 15:56:07 +02002349 * - A new, separate update for the referent reference
2350 * Note that the new update will itself be subject to splitting when
2351 * the iteration gets to it.
2352 */
Jeff King10dee402019-02-14 00:50:46 -05002353static int split_symref_update(struct ref_update *update,
Michael Haggerty92b15512016-04-25 15:56:07 +02002354 const char *referent,
Michael Haggerty165056b2016-04-24 08:58:41 +02002355 struct ref_transaction *transaction,
2356 struct string_list *affected_refnames,
2357 struct strbuf *err)
2358{
Michael Haggerty92b15512016-04-25 15:56:07 +02002359 struct string_list_item *item;
2360 struct ref_update *new_update;
2361 unsigned int new_flags;
Michael Haggerty165056b2016-04-24 08:58:41 +02002362
Michael Haggerty92b15512016-04-25 15:56:07 +02002363 /*
2364 * First make sure that referent is not already in the
Martin Ågrenc2994682017-09-09 08:57:15 +02002365 * transaction. This check is O(lg N) in the transaction
Michael Haggerty92b15512016-04-25 15:56:07 +02002366 * size, but it happens at most once per symref in a
2367 * transaction.
2368 */
Martin Ågrenc2994682017-09-09 08:57:15 +02002369 if (string_list_has_string(affected_refnames, referent)) {
2370 /* An entry already exists */
Michael Haggerty92b15512016-04-25 15:56:07 +02002371 strbuf_addf(err,
2372 "multiple updates for '%s' (including one "
2373 "via symref '%s') are not allowed",
2374 referent, update->refname);
2375 return TRANSACTION_NAME_CONFLICT;
2376 }
2377
2378 new_flags = update->flags;
2379 if (!strcmp(update->refname, "HEAD")) {
2380 /*
2381 * Record that the new update came via HEAD, so that
2382 * when we process it, split_head_update() doesn't try
2383 * to add another reflog update for HEAD. Note that
2384 * this bit will be propagated if the new_update
2385 * itself needs to be split.
2386 */
2387 new_flags |= REF_UPDATE_VIA_HEAD;
2388 }
2389
2390 new_update = ref_transaction_add_update(
2391 transaction, referent, new_flags,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00002392 &update->new_oid, &update->old_oid,
Michael Haggerty92b15512016-04-25 15:56:07 +02002393 update->msg);
2394
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002395 new_update->parent_update = update;
2396
2397 /*
2398 * Change the symbolic ref update to log only. Also, it
Michael Haggerty78fb4572017-11-05 09:42:09 +01002399 * doesn't need to check its old OID value, as that will be
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002400 * done when new_update is processed.
2401 */
Michael Haggerty91774af2017-11-05 09:42:06 +01002402 update->flags |= REF_LOG_ONLY | REF_NO_DEREF;
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002403 update->flags &= ~REF_HAVE_OLD;
Michael Haggerty92b15512016-04-25 15:56:07 +02002404
Martin Ågrenc2994682017-09-09 08:57:15 +02002405 /*
2406 * Add the referent. This insertion is O(N) in the transaction
2407 * size, but it happens at most once per symref in a
2408 * transaction. Make sure to add new_update->refname, which will
2409 * be valid as long as affected_refnames is in use, and NOT
2410 * referent, which might soon be freed by our caller.
2411 */
2412 item = string_list_insert(affected_refnames, new_update->refname);
2413 if (item->util)
2414 BUG("%s unexpectedly found in affected_refnames",
2415 new_update->refname);
Michael Haggerty92b15512016-04-25 15:56:07 +02002416 item->util = new_update;
2417
2418 return 0;
2419}
2420
2421/*
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002422 * Return the refname under which update was originally requested.
2423 */
2424static const char *original_update_refname(struct ref_update *update)
2425{
2426 while (update->parent_update)
2427 update = update->parent_update;
2428
2429 return update->refname;
2430}
2431
2432/*
Michael Haggertye3f51032016-06-07 09:29:23 +02002433 * Check whether the REF_HAVE_OLD and old_oid values stored in update
2434 * are consistent with oid, which is the reference's current value. If
2435 * everything is OK, return 0; otherwise, write an error message to
2436 * err and return -1.
2437 */
2438static int check_old_oid(struct ref_update *update, struct object_id *oid,
2439 struct strbuf *err)
2440{
2441 if (!(update->flags & REF_HAVE_OLD) ||
Jeff King4a7e27e2018-08-28 17:22:40 -04002442 oideq(oid, &update->old_oid))
Michael Haggertye3f51032016-06-07 09:29:23 +02002443 return 0;
2444
brian m. carlson98491292017-05-06 22:10:23 +00002445 if (is_null_oid(&update->old_oid))
Michael Haggertye3f51032016-06-07 09:29:23 +02002446 strbuf_addf(err, "cannot lock ref '%s': "
2447 "reference already exists",
2448 original_update_refname(update));
2449 else if (is_null_oid(oid))
2450 strbuf_addf(err, "cannot lock ref '%s': "
2451 "reference is missing but expected %s",
2452 original_update_refname(update),
brian m. carlson98491292017-05-06 22:10:23 +00002453 oid_to_hex(&update->old_oid));
Michael Haggertye3f51032016-06-07 09:29:23 +02002454 else
2455 strbuf_addf(err, "cannot lock ref '%s': "
2456 "is at %s but expected %s",
2457 original_update_refname(update),
2458 oid_to_hex(oid),
brian m. carlson98491292017-05-06 22:10:23 +00002459 oid_to_hex(&update->old_oid));
Michael Haggertye3f51032016-06-07 09:29:23 +02002460
2461 return -1;
2462}
2463
2464/*
Michael Haggerty92b15512016-04-25 15:56:07 +02002465 * Prepare for carrying out update:
2466 * - Lock the reference referred to by update.
2467 * - Read the reference under lock.
Michael Haggerty78fb4572017-11-05 09:42:09 +01002468 * - Check that its old OID value (if specified) is correct, and in
Michael Haggerty92b15512016-04-25 15:56:07 +02002469 * any case record it in update->lock->old_oid for later use when
2470 * writing the reflog.
Michael Haggerty91774af2017-11-05 09:42:06 +01002471 * - If it is a symref update without REF_NO_DEREF, split it up into a
Michael Haggerty92b15512016-04-25 15:56:07 +02002472 * REF_LOG_ONLY update of the symref and add a separate update for
2473 * the referent to transaction.
2474 * - If it is an update of head_ref, add a corresponding REF_LOG_ONLY
2475 * update of HEAD.
2476 */
Michael Haggertyb3bbbc52016-09-04 18:08:33 +02002477static int lock_ref_for_update(struct files_ref_store *refs,
2478 struct ref_update *update,
Michael Haggerty92b15512016-04-25 15:56:07 +02002479 struct ref_transaction *transaction,
2480 const char *head_ref,
2481 struct string_list *affected_refnames,
2482 struct strbuf *err)
2483{
2484 struct strbuf referent = STRBUF_INIT;
2485 int mustexist = (update->flags & REF_HAVE_OLD) &&
brian m. carlson98491292017-05-06 22:10:23 +00002486 !is_null_oid(&update->old_oid);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002487 int ret = 0;
Michael Haggerty92b15512016-04-25 15:56:07 +02002488 struct ref_lock *lock;
2489
Michael Haggerty32c597e2017-02-10 12:16:16 +01002490 files_assert_main_repository(refs, "lock_ref_for_update");
Michael Haggertyb3bbbc52016-09-04 18:08:33 +02002491
brian m. carlson98491292017-05-06 22:10:23 +00002492 if ((update->flags & REF_HAVE_NEW) && is_null_oid(&update->new_oid))
Michael Haggerty165056b2016-04-24 08:58:41 +02002493 update->flags |= REF_DELETING;
Michael Haggerty92b15512016-04-25 15:56:07 +02002494
2495 if (head_ref) {
2496 ret = split_head_update(update, transaction, head_ref,
2497 affected_refnames, err);
2498 if (ret)
Martin Ågren851e1fb2017-09-09 08:57:16 +02002499 goto out;
Michael Haggerty92b15512016-04-25 15:56:07 +02002500 }
2501
Michael Haggertyf7b0a982016-09-04 18:08:31 +02002502 ret = lock_raw_ref(refs, update->refname, mustexist,
Ævar Arnfjörð Bjarmason640d9d52021-08-23 13:36:06 +02002503 affected_refnames,
David Turner7d618262016-09-04 18:08:43 +02002504 &lock, &referent,
Michael Haggerty92b15512016-04-25 15:56:07 +02002505 &update->type, err);
Michael Haggerty92b15512016-04-25 15:56:07 +02002506 if (ret) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002507 char *reason;
2508
Michael Haggerty165056b2016-04-24 08:58:41 +02002509 reason = strbuf_detach(err, NULL);
2510 strbuf_addf(err, "cannot lock ref '%s': %s",
Michael Haggertye3f51032016-06-07 09:29:23 +02002511 original_update_refname(update), reason);
Michael Haggerty165056b2016-04-24 08:58:41 +02002512 free(reason);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002513 goto out;
Michael Haggerty165056b2016-04-24 08:58:41 +02002514 }
Michael Haggerty92b15512016-04-25 15:56:07 +02002515
David Turner7d618262016-09-04 18:08:43 +02002516 update->backend_data = lock;
Michael Haggerty92b15512016-04-25 15:56:07 +02002517
Michael Haggerty92b15512016-04-25 15:56:07 +02002518 if (update->type & REF_ISSYMREF) {
Michael Haggerty91774af2017-11-05 09:42:06 +01002519 if (update->flags & REF_NO_DEREF) {
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002520 /*
2521 * We won't be reading the referent as part of
2522 * the transaction, so we have to read it here
Michael Haggerty78fb4572017-11-05 09:42:09 +01002523 * to record and possibly check old_oid:
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002524 */
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02002525 if (!refs_resolve_ref_unsafe(&refs->base,
Ævar Arnfjörð Bjarmason76887df2021-10-16 11:39:14 +02002526 referent.buf, 0,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01002527 &lock->old_oid, NULL)) {
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002528 if (update->flags & REF_HAVE_OLD) {
2529 strbuf_addf(err, "cannot lock ref '%s': "
Michael Haggertye3f51032016-06-07 09:29:23 +02002530 "error reading reference",
2531 original_update_refname(update));
Martin Ågren3f5ef952017-09-09 08:57:17 +02002532 ret = TRANSACTION_GENERIC_ERROR;
Martin Ågren851e1fb2017-09-09 08:57:16 +02002533 goto out;
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002534 }
Michael Haggertye3f51032016-06-07 09:29:23 +02002535 } else if (check_old_oid(update, &lock->old_oid, err)) {
Martin Ågren851e1fb2017-09-09 08:57:16 +02002536 ret = TRANSACTION_GENERIC_ERROR;
2537 goto out;
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002538 }
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002539 } else {
2540 /*
2541 * Create a new update for the reference this
2542 * symref is pointing at. Also, we will record
Michael Haggerty78fb4572017-11-05 09:42:09 +01002543 * and verify old_oid for this update as part
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002544 * of processing the split-off update, so we
2545 * don't have to do it here.
2546 */
Jeff King10dee402019-02-14 00:50:46 -05002547 ret = split_symref_update(update,
Michael Haggertyfcc42ea2016-09-04 18:08:35 +02002548 referent.buf, transaction,
Michael Haggerty92b15512016-04-25 15:56:07 +02002549 affected_refnames, err);
2550 if (ret)
Martin Ågren851e1fb2017-09-09 08:57:16 +02002551 goto out;
Michael Haggerty92b15512016-04-25 15:56:07 +02002552 }
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002553 } else {
2554 struct ref_update *parent_update;
Michael Haggerty8169d0d2016-04-25 17:38:35 +02002555
Martin Ågren851e1fb2017-09-09 08:57:16 +02002556 if (check_old_oid(update, &lock->old_oid, err)) {
2557 ret = TRANSACTION_GENERIC_ERROR;
2558 goto out;
2559 }
Michael Haggertye3f51032016-06-07 09:29:23 +02002560
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002561 /*
2562 * If this update is happening indirectly because of a
Michael Haggerty78fb4572017-11-05 09:42:09 +01002563 * symref update, record the old OID in the parent
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002564 * update:
2565 */
2566 for (parent_update = update->parent_update;
2567 parent_update;
2568 parent_update = parent_update->parent_update) {
David Turner7d618262016-09-04 18:08:43 +02002569 struct ref_lock *parent_lock = parent_update->backend_data;
2570 oidcpy(&parent_lock->old_oid, &lock->old_oid);
Michael Haggerty6e30b2f2016-04-25 17:48:32 +02002571 }
Michael Haggerty92b15512016-04-25 15:56:07 +02002572 }
2573
Michael Haggerty165056b2016-04-24 08:58:41 +02002574 if ((update->flags & REF_HAVE_NEW) &&
2575 !(update->flags & REF_DELETING) &&
2576 !(update->flags & REF_LOG_ONLY)) {
Michael Haggerty92b15512016-04-25 15:56:07 +02002577 if (!(update->type & REF_ISSYMREF) &&
Jeff King4a7e27e2018-08-28 17:22:40 -04002578 oideq(&lock->old_oid, &update->new_oid)) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002579 /*
2580 * The reference already has the desired
2581 * value, so we don't need to write it.
2582 */
Han-Wen Nienhuyse9706a12021-12-07 13:38:17 +00002583 } else if (write_ref_to_lockfile(
2584 lock, &update->new_oid,
2585 update->flags & REF_SKIP_OID_VERIFICATION,
2586 err)) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002587 char *write_err = strbuf_detach(err, NULL);
2588
2589 /*
2590 * The lock was freed upon failure of
2591 * write_ref_to_lockfile():
2592 */
David Turner7d618262016-09-04 18:08:43 +02002593 update->backend_data = NULL;
Michael Haggerty165056b2016-04-24 08:58:41 +02002594 strbuf_addf(err,
Michael Haggertye3f51032016-06-07 09:29:23 +02002595 "cannot update ref '%s': %s",
Michael Haggerty165056b2016-04-24 08:58:41 +02002596 update->refname, write_err);
2597 free(write_err);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002598 ret = TRANSACTION_GENERIC_ERROR;
2599 goto out;
Michael Haggerty165056b2016-04-24 08:58:41 +02002600 } else {
2601 update->flags |= REF_NEEDS_COMMIT;
2602 }
2603 }
2604 if (!(update->flags & REF_NEEDS_COMMIT)) {
2605 /*
2606 * We didn't call write_ref_to_lockfile(), so
2607 * the lockfile is still open. Close it to
2608 * free up the file descriptor:
2609 */
Jeff King83a30692017-09-05 08:14:33 -04002610 if (close_ref_gently(lock)) {
Michael Haggerty165056b2016-04-24 08:58:41 +02002611 strbuf_addf(err, "couldn't close '%s.lock'",
2612 update->refname);
Martin Ågren851e1fb2017-09-09 08:57:16 +02002613 ret = TRANSACTION_GENERIC_ERROR;
2614 goto out;
Michael Haggerty165056b2016-04-24 08:58:41 +02002615 }
2616 }
Martin Ågren851e1fb2017-09-09 08:57:16 +02002617
2618out:
2619 strbuf_release(&referent);
2620 return ret;
Michael Haggerty165056b2016-04-24 08:58:41 +02002621}
2622
Michael Haggertydc39e092017-09-08 15:51:51 +02002623struct files_transaction_backend_data {
2624 struct ref_transaction *packed_transaction;
2625 int packed_refs_locked;
2626};
2627
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002628/*
2629 * Unlock any references in `transaction` that are still locked, and
2630 * mark the transaction closed.
2631 */
Michael Haggertydc39e092017-09-08 15:51:51 +02002632static void files_transaction_cleanup(struct files_ref_store *refs,
2633 struct ref_transaction *transaction)
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002634{
2635 size_t i;
Michael Haggertydc39e092017-09-08 15:51:51 +02002636 struct files_transaction_backend_data *backend_data =
2637 transaction->backend_data;
2638 struct strbuf err = STRBUF_INIT;
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002639
2640 for (i = 0; i < transaction->nr; i++) {
2641 struct ref_update *update = transaction->updates[i];
2642 struct ref_lock *lock = update->backend_data;
2643
2644 if (lock) {
2645 unlock_ref(lock);
2646 update->backend_data = NULL;
2647 }
2648 }
2649
Patrick Steinhardtedc30692020-03-30 15:46:13 +02002650 if (backend_data) {
2651 if (backend_data->packed_transaction &&
2652 ref_transaction_abort(backend_data->packed_transaction, &err)) {
2653 error("error aborting transaction: %s", err.buf);
2654 strbuf_release(&err);
2655 }
2656
2657 if (backend_data->packed_refs_locked)
2658 packed_refs_unlock(refs->packed_ref_store);
2659
2660 free(backend_data);
Michael Haggertydc39e092017-09-08 15:51:51 +02002661 }
2662
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002663 transaction->state = REF_TRANSACTION_CLOSED;
2664}
2665
Michael Haggerty30173b82017-05-22 16:17:44 +02002666static int files_transaction_prepare(struct ref_store *ref_store,
2667 struct ref_transaction *transaction,
2668 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002669{
Michael Haggerty00eebe32016-09-04 18:08:11 +02002670 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07002671 files_downcast(ref_store, REF_STORE_WRITE,
Michael Haggerty30173b82017-05-22 16:17:44 +02002672 "ref_transaction_prepare");
Michael Haggerty43a2dfd2017-05-22 16:17:37 +02002673 size_t i;
2674 int ret = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002675 struct string_list affected_refnames = STRING_LIST_INIT_NODUP;
Michael Haggerty92b15512016-04-25 15:56:07 +02002676 char *head_ref = NULL;
2677 int head_type;
Michael Haggertydc39e092017-09-08 15:51:51 +02002678 struct files_transaction_backend_data *backend_data;
2679 struct ref_transaction *packed_transaction = NULL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002680
2681 assert(err);
2682
Michael Haggertyc0ca9352017-05-22 16:17:42 +02002683 if (!transaction->nr)
2684 goto cleanup;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002685
René Scharfeca56dad2021-03-13 17:17:22 +01002686 CALLOC_ARRAY(backend_data, 1);
Michael Haggertydc39e092017-09-08 15:51:51 +02002687 transaction->backend_data = backend_data;
2688
Michael Haggerty92b15512016-04-25 15:56:07 +02002689 /*
2690 * Fail if a refname appears more than once in the
2691 * transaction. (If we end up splitting up any updates using
2692 * split_symref_update() or split_head_update(), those
2693 * functions will check that the new updates don't have the
Michael Haggerty62c72d12017-11-05 09:42:04 +01002694 * same refname as any existing ones.) Also fail if any of the
Michael Haggertyacedcde2017-11-05 09:42:07 +01002695 * updates use REF_IS_PRUNING without REF_NO_DEREF.
Michael Haggerty92b15512016-04-25 15:56:07 +02002696 */
2697 for (i = 0; i < transaction->nr; i++) {
2698 struct ref_update *update = transaction->updates[i];
2699 struct string_list_item *item =
2700 string_list_append(&affected_refnames, update->refname);
2701
Michael Haggertyacedcde2017-11-05 09:42:07 +01002702 if ((update->flags & REF_IS_PRUNING) &&
Michael Haggerty91774af2017-11-05 09:42:06 +01002703 !(update->flags & REF_NO_DEREF))
Michael Haggertyacedcde2017-11-05 09:42:07 +01002704 BUG("REF_IS_PRUNING set without REF_NO_DEREF");
Michael Haggerty62c72d12017-11-05 09:42:04 +01002705
Michael Haggerty92b15512016-04-25 15:56:07 +02002706 /*
2707 * We store a pointer to update in item->util, but at
2708 * the moment we never use the value of this field
2709 * except to check whether it is non-NULL.
2710 */
2711 item->util = update;
2712 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002713 string_list_sort(&affected_refnames);
2714 if (ref_update_reject_duplicates(&affected_refnames, err)) {
2715 ret = TRANSACTION_GENERIC_ERROR;
2716 goto cleanup;
2717 }
2718
2719 /*
Michael Haggerty92b15512016-04-25 15:56:07 +02002720 * Special hack: If a branch is updated directly and HEAD
2721 * points to it (may happen on the remote side of a push
2722 * for example) then logically the HEAD reflog should be
2723 * updated too.
2724 *
2725 * A generic solution would require reverse symref lookups,
2726 * but finding all symrefs pointing to a given branch would be
2727 * rather costly for this rare event (the direct update of a
2728 * branch) to be worth it. So let's cheat and check with HEAD
2729 * only, which should cover 99% of all usage scenarios (even
2730 * 100% of the default ones).
2731 *
2732 * So if HEAD is a symbolic reference, then record the name of
2733 * the reference that it points to. If we see an update of
2734 * head_ref within the transaction, then split_head_update()
2735 * arranges for the reflog of HEAD to be updated, too.
2736 */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07002737 head_ref = refs_resolve_refdup(ref_store, "HEAD",
2738 RESOLVE_REF_NO_RECURSE,
René Scharfe872ccb22017-10-01 09:28:50 +02002739 NULL, &head_type);
Michael Haggerty92b15512016-04-25 15:56:07 +02002740
2741 if (head_ref && !(head_type & REF_ISSYMREF)) {
Ævar Arnfjörð Bjarmason6a83d902017-06-15 23:15:46 +00002742 FREE_AND_NULL(head_ref);
Michael Haggerty92b15512016-04-25 15:56:07 +02002743 }
2744
2745 /*
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002746 * Acquire all locks, verify old values if provided, check
2747 * that new values are valid, and write new values to the
2748 * lockfiles, ready to be activated. Only keep one lockfile
2749 * open at a time to avoid running out of file descriptors.
Michael Haggerty30173b82017-05-22 16:17:44 +02002750 * Note that lock_ref_for_update() might append more updates
2751 * to the transaction.
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002752 */
Michael Haggertyefe47282016-04-22 00:02:50 +02002753 for (i = 0; i < transaction->nr; i++) {
2754 struct ref_update *update = transaction->updates[i];
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002755
Michael Haggertyb3bbbc52016-09-04 18:08:33 +02002756 ret = lock_ref_for_update(refs, update, transaction,
2757 head_ref, &affected_refnames, err);
Michael Haggerty165056b2016-04-24 08:58:41 +02002758 if (ret)
Michael Haggertyda5267f2017-10-24 17:16:25 +02002759 goto cleanup;
Michael Haggertydc39e092017-09-08 15:51:51 +02002760
2761 if (update->flags & REF_DELETING &&
2762 !(update->flags & REF_LOG_ONLY) &&
Michael Haggertyacedcde2017-11-05 09:42:07 +01002763 !(update->flags & REF_IS_PRUNING)) {
Michael Haggertydc39e092017-09-08 15:51:51 +02002764 /*
2765 * This reference has to be deleted from
2766 * packed-refs if it exists there.
2767 */
2768 if (!packed_transaction) {
2769 packed_transaction = ref_store_transaction_begin(
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07002770 refs->packed_ref_store, err);
Michael Haggertydc39e092017-09-08 15:51:51 +02002771 if (!packed_transaction) {
2772 ret = TRANSACTION_GENERIC_ERROR;
2773 goto cleanup;
2774 }
2775
2776 backend_data->packed_transaction =
2777 packed_transaction;
2778 }
2779
2780 ref_transaction_add_update(
2781 packed_transaction, update->refname,
Michael Haggerty91774af2017-11-05 09:42:06 +01002782 REF_HAVE_NEW | REF_NO_DEREF,
Michael Haggertyb0ca4112017-11-05 09:42:01 +01002783 &update->new_oid, NULL,
Michael Haggertydc39e092017-09-08 15:51:51 +02002784 NULL);
2785 }
2786 }
2787
2788 if (packed_transaction) {
2789 if (packed_refs_lock(refs->packed_ref_store, 0, err)) {
2790 ret = TRANSACTION_GENERIC_ERROR;
2791 goto cleanup;
2792 }
2793 backend_data->packed_refs_locked = 1;
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002794
2795 if (is_packed_transaction_needed(refs->packed_ref_store,
2796 packed_transaction)) {
2797 ret = ref_transaction_prepare(packed_transaction, err);
Jeff King249e8dc2019-03-21 05:28:44 -04002798 /*
2799 * A failure during the prepare step will abort
2800 * itself, but not free. Do that now, and disconnect
2801 * from the files_transaction so it does not try to
2802 * abort us when we hit the cleanup code below.
2803 */
2804 if (ret) {
2805 ref_transaction_free(packed_transaction);
2806 backend_data->packed_transaction = NULL;
2807 }
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002808 } else {
2809 /*
2810 * We can skip rewriting the `packed-refs`
2811 * file. But we do need to leave it locked, so
2812 * that somebody else doesn't pack a reference
2813 * that we are trying to delete.
Jeff Kingd3322eb2019-03-21 05:28:54 -04002814 *
2815 * We need to disconnect our transaction from
2816 * backend_data, since the abort (whether successful or
2817 * not) will free it.
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002818 */
Jeff Kingd3322eb2019-03-21 05:28:54 -04002819 backend_data->packed_transaction = NULL;
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002820 if (ref_transaction_abort(packed_transaction, err)) {
2821 ret = TRANSACTION_GENERIC_ERROR;
2822 goto cleanup;
2823 }
Michael Haggerty7c6bd252017-10-28 11:16:02 +02002824 }
Michael Haggerty30173b82017-05-22 16:17:44 +02002825 }
2826
2827cleanup:
2828 free(head_ref);
2829 string_list_clear(&affected_refnames, 0);
2830
2831 if (ret)
Michael Haggertydc39e092017-09-08 15:51:51 +02002832 files_transaction_cleanup(refs, transaction);
Michael Haggerty30173b82017-05-22 16:17:44 +02002833 else
2834 transaction->state = REF_TRANSACTION_PREPARED;
2835
2836 return ret;
2837}
2838
2839static int files_transaction_finish(struct ref_store *ref_store,
2840 struct ref_transaction *transaction,
2841 struct strbuf *err)
2842{
2843 struct files_ref_store *refs =
2844 files_downcast(ref_store, 0, "ref_transaction_finish");
2845 size_t i;
2846 int ret = 0;
Michael Haggerty30173b82017-05-22 16:17:44 +02002847 struct strbuf sb = STRBUF_INIT;
Michael Haggertydc39e092017-09-08 15:51:51 +02002848 struct files_transaction_backend_data *backend_data;
2849 struct ref_transaction *packed_transaction;
2850
Michael Haggerty30173b82017-05-22 16:17:44 +02002851
2852 assert(err);
2853
2854 if (!transaction->nr) {
2855 transaction->state = REF_TRANSACTION_CLOSED;
2856 return 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002857 }
2858
Michael Haggertydc39e092017-09-08 15:51:51 +02002859 backend_data = transaction->backend_data;
2860 packed_transaction = backend_data->packed_transaction;
2861
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002862 /* Perform updates first so live commits remain referenced */
Michael Haggertyefe47282016-04-22 00:02:50 +02002863 for (i = 0; i < transaction->nr; i++) {
2864 struct ref_update *update = transaction->updates[i];
David Turner7d618262016-09-04 18:08:43 +02002865 struct ref_lock *lock = update->backend_data;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002866
David Turnerd99aa882016-02-24 17:58:50 -05002867 if (update->flags & REF_NEEDS_COMMIT ||
2868 update->flags & REF_LOG_ONLY) {
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002869 if (files_log_ref_write(refs,
2870 lock->ref_name,
brian m. carlson4417df82017-05-06 22:10:24 +00002871 &lock->old_oid,
2872 &update->new_oid,
Michael Haggerty81b1b6d2017-01-06 17:22:31 +01002873 update->msg, update->flags,
2874 err)) {
Michael Haggerty92b15512016-04-25 15:56:07 +02002875 char *old_msg = strbuf_detach(err, NULL);
2876
2877 strbuf_addf(err, "cannot update the ref '%s': %s",
2878 lock->ref_name, old_msg);
2879 free(old_msg);
2880 unlock_ref(lock);
David Turner7d618262016-09-04 18:08:43 +02002881 update->backend_data = NULL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002882 ret = TRANSACTION_GENERIC_ERROR;
2883 goto cleanup;
Michael Haggerty92b15512016-04-25 15:56:07 +02002884 }
2885 }
2886 if (update->flags & REF_NEEDS_COMMIT) {
Michael Haggerty00eebe32016-09-04 18:08:11 +02002887 clear_loose_ref_cache(refs);
Michael Haggerty92b15512016-04-25 15:56:07 +02002888 if (commit_ref(lock)) {
2889 strbuf_addf(err, "couldn't set '%s'", lock->ref_name);
2890 unlock_ref(lock);
David Turner7d618262016-09-04 18:08:43 +02002891 update->backend_data = NULL;
Michael Haggerty92b15512016-04-25 15:56:07 +02002892 ret = TRANSACTION_GENERIC_ERROR;
2893 goto cleanup;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002894 }
2895 }
2896 }
Michael Haggertydc39e092017-09-08 15:51:51 +02002897
2898 /*
Michael Haggerty5e00a6c2017-09-08 15:51:53 +02002899 * Now that updates are safely completed, we can perform
2900 * deletes. First delete the reflogs of any references that
2901 * will be deleted, since (in the unexpected event of an
2902 * error) leaving a reference without a reflog is less bad
2903 * than leaving a reflog without a reference (the latter is a
2904 * mildly invalid repository state):
2905 */
2906 for (i = 0; i < transaction->nr; i++) {
2907 struct ref_update *update = transaction->updates[i];
2908 if (update->flags & REF_DELETING &&
2909 !(update->flags & REF_LOG_ONLY) &&
Michael Haggertyacedcde2017-11-05 09:42:07 +01002910 !(update->flags & REF_IS_PRUNING)) {
Michael Haggerty5e00a6c2017-09-08 15:51:53 +02002911 strbuf_reset(&sb);
2912 files_reflog_path(refs, &sb, update->refname);
2913 if (!unlink_or_warn(sb.buf))
2914 try_remove_empty_parents(refs, update->refname,
2915 REMOVE_EMPTY_PARENTS_REFLOG);
2916 }
2917 }
2918
2919 /*
Michael Haggertydc39e092017-09-08 15:51:51 +02002920 * Perform deletes now that updates are safely completed.
2921 *
2922 * First delete any packed versions of the references, while
2923 * retaining the packed-refs lock:
2924 */
2925 if (packed_transaction) {
2926 ret = ref_transaction_commit(packed_transaction, err);
2927 ref_transaction_free(packed_transaction);
2928 packed_transaction = NULL;
2929 backend_data->packed_transaction = NULL;
2930 if (ret)
2931 goto cleanup;
2932 }
2933
2934 /* Now delete the loose versions of the references: */
Michael Haggertyefe47282016-04-22 00:02:50 +02002935 for (i = 0; i < transaction->nr; i++) {
2936 struct ref_update *update = transaction->updates[i];
David Turner7d618262016-09-04 18:08:43 +02002937 struct ref_lock *lock = update->backend_data;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002938
David Turnerd99aa882016-02-24 17:58:50 -05002939 if (update->flags & REF_DELETING &&
2940 !(update->flags & REF_LOG_ONLY)) {
Will Chandler5f03e512021-05-08 01:00:43 -04002941 update->flags |= REF_DELETED_RMDIR;
Michael Haggertyce0af242017-01-06 17:22:39 +01002942 if (!(update->type & REF_ISPACKED) ||
2943 update->type & REF_ISSYMREF) {
2944 /* It is a loose reference. */
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002945 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07002946 files_ref_path(refs, &sb, lock->ref_name);
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07002947 if (unlink_or_msg(sb.buf, err)) {
Michael Haggertyce0af242017-01-06 17:22:39 +01002948 ret = TRANSACTION_GENERIC_ERROR;
2949 goto cleanup;
2950 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002951 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002952 }
2953 }
2954
Michael Haggerty00eebe32016-09-04 18:08:11 +02002955 clear_loose_ref_cache(refs);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002956
2957cleanup:
Michael Haggertydc39e092017-09-08 15:51:51 +02002958 files_transaction_cleanup(refs, transaction);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002959
Michael Haggerty44639772017-01-06 17:22:43 +01002960 for (i = 0; i < transaction->nr; i++) {
2961 struct ref_update *update = transaction->updates[i];
Michael Haggerty44639772017-01-06 17:22:43 +01002962
Will Chandler5f03e512021-05-08 01:00:43 -04002963 if (update->flags & REF_DELETED_RMDIR) {
Michael Haggerty44639772017-01-06 17:22:43 +01002964 /*
Will Chandler5f03e512021-05-08 01:00:43 -04002965 * The reference was deleted. Delete any
Michael Haggerty44639772017-01-06 17:22:43 +01002966 * empty parent directories. (Note that this
2967 * can only work because we have already
2968 * removed the lockfile.)
2969 */
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07002970 try_remove_empty_parents(refs, update->refname,
Michael Haggerty44639772017-01-06 17:22:43 +01002971 REMOVE_EMPTY_PARENTS_REF);
2972 }
2973 }
2974
Michael Haggerty30173b82017-05-22 16:17:44 +02002975 strbuf_release(&sb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002976 return ret;
2977}
2978
Michael Haggerty30173b82017-05-22 16:17:44 +02002979static int files_transaction_abort(struct ref_store *ref_store,
2980 struct ref_transaction *transaction,
Ævar Arnfjörð Bjarmason5cf88fd2022-08-25 19:09:48 +02002981 struct strbuf *err UNUSED)
Michael Haggerty30173b82017-05-22 16:17:44 +02002982{
Michael Haggertydc39e092017-09-08 15:51:51 +02002983 struct files_ref_store *refs =
2984 files_downcast(ref_store, 0, "ref_transaction_abort");
2985
2986 files_transaction_cleanup(refs, transaction);
Michael Haggerty30173b82017-05-22 16:17:44 +02002987 return 0;
2988}
2989
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002990static int ref_present(const char *refname,
Ævar Arnfjörð Bjarmason5cf88fd2022-08-25 19:09:48 +02002991 const struct object_id *oid UNUSED,
2992 int flags UNUSED,
Jeff King63e14ee2022-08-19 06:08:32 -04002993 void *cb_data)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01002994{
2995 struct string_list *affected_refnames = cb_data;
2996
2997 return string_list_has_string(affected_refnames, refname);
2998}
2999
David Turnerfc681462016-09-04 18:08:39 +02003000static int files_initial_transaction_commit(struct ref_store *ref_store,
3001 struct ref_transaction *transaction,
3002 struct strbuf *err)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003003{
Michael Haggertyd99825a2016-09-04 18:08:12 +02003004 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07003005 files_downcast(ref_store, REF_STORE_WRITE,
3006 "initial_ref_transaction_commit");
Michael Haggerty43a2dfd2017-05-22 16:17:37 +02003007 size_t i;
3008 int ret = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003009 struct string_list affected_refnames = STRING_LIST_INIT_NODUP;
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003010 struct ref_transaction *packed_transaction = NULL;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003011
3012 assert(err);
3013
3014 if (transaction->state != REF_TRANSACTION_OPEN)
Johannes Schindelin033abf92018-05-02 11:38:39 +02003015 BUG("commit called for transaction that is not open");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003016
3017 /* Fail if a refname appears more than once in the transaction: */
Michael Haggertyefe47282016-04-22 00:02:50 +02003018 for (i = 0; i < transaction->nr; i++)
3019 string_list_append(&affected_refnames,
3020 transaction->updates[i]->refname);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003021 string_list_sort(&affected_refnames);
3022 if (ref_update_reject_duplicates(&affected_refnames, err)) {
3023 ret = TRANSACTION_GENERIC_ERROR;
3024 goto cleanup;
3025 }
3026
3027 /*
3028 * It's really undefined to call this function in an active
3029 * repository or when there are existing references: we are
3030 * only locking and changing packed-refs, so (1) any
3031 * simultaneous processes might try to change a reference at
3032 * the same time we do, and (2) any existing loose versions of
3033 * the references that we are setting would have precedence
3034 * over our values. But some remote helpers create the remote
3035 * "HEAD" and "master" branches before calling this function,
3036 * so here we really only check that none of the references
3037 * that we are creating already exists.
3038 */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07003039 if (refs_for_each_rawref(&refs->base, ref_present,
3040 &affected_refnames))
Johannes Schindelin033abf92018-05-02 11:38:39 +02003041 BUG("initial ref transaction called with existing refs");
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003042
Junio C Hamanoc6da34a2022-04-13 15:51:33 -07003043 packed_transaction = ref_store_transaction_begin(refs->packed_ref_store, err);
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003044 if (!packed_transaction) {
3045 ret = TRANSACTION_GENERIC_ERROR;
3046 goto cleanup;
3047 }
3048
Michael Haggertyefe47282016-04-22 00:02:50 +02003049 for (i = 0; i < transaction->nr; i++) {
3050 struct ref_update *update = transaction->updates[i];
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003051
3052 if ((update->flags & REF_HAVE_OLD) &&
brian m. carlson98491292017-05-06 22:10:23 +00003053 !is_null_oid(&update->old_oid))
Johannes Schindelin033abf92018-05-02 11:38:39 +02003054 BUG("initial ref transaction with old_sha1 set");
Nguyễn Thái Ngọc Duy7d2df052017-03-26 09:42:34 +07003055 if (refs_verify_refname_available(&refs->base, update->refname,
3056 &affected_refnames, NULL,
3057 err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003058 ret = TRANSACTION_NAME_CONFLICT;
3059 goto cleanup;
3060 }
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003061
3062 /*
3063 * Add a reference creation for this reference to the
3064 * packed-refs transaction:
3065 */
3066 ref_transaction_add_update(packed_transaction, update->refname,
3067 update->flags & ~REF_HAVE_OLD,
brian m. carlson89f3bbd2017-10-15 22:06:53 +00003068 &update->new_oid, &update->old_oid,
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003069 NULL);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003070 }
3071
Michael Haggertyc8bed832017-06-23 09:01:42 +02003072 if (packed_refs_lock(refs->packed_ref_store, 0, err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003073 ret = TRANSACTION_GENERIC_ERROR;
3074 goto cleanup;
3075 }
3076
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003077 if (initial_ref_transaction_commit(packed_transaction, err)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003078 ret = TRANSACTION_GENERIC_ERROR;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003079 }
3080
Mathias Rav81fcb692018-01-18 14:38:41 +01003081 packed_refs_unlock(refs->packed_ref_store);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003082cleanup:
Michael Haggerty1444bfe2017-09-08 15:51:49 +02003083 if (packed_transaction)
3084 ref_transaction_free(packed_transaction);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003085 transaction->state = REF_TRANSACTION_CLOSED;
3086 string_list_clear(&affected_refnames, 0);
3087 return ret;
3088}
3089
3090struct expire_reflog_cb {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003091 reflog_expiry_should_prune_fn *should_prune_fn;
3092 void *policy_cb;
3093 FILE *newlog;
brian m. carlson9461d272017-02-21 23:47:32 +00003094 struct object_id last_kept_oid;
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003095 unsigned int rewrite:1,
3096 dry_run:1;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003097};
3098
brian m. carlson9461d272017-02-21 23:47:32 +00003099static int expire_reflog_ent(struct object_id *ooid, struct object_id *noid,
Johannes Schindelindddbad72017-04-26 21:29:31 +02003100 const char *email, timestamp_t timestamp, int tz,
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003101 const char *message, void *cb_data)
3102{
3103 struct expire_reflog_cb *cb = cb_data;
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003104 reflog_expiry_should_prune_fn *fn = cb->should_prune_fn;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003105
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003106 if (cb->rewrite)
brian m. carlson9461d272017-02-21 23:47:32 +00003107 ooid = &cb->last_kept_oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003108
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003109 if (fn(ooid, noid, email, timestamp, tz, message, cb->policy_cb))
3110 return 0;
3111
3112 if (cb->dry_run)
3113 return 0; /* --dry-run */
3114
3115 fprintf(cb->newlog, "%s %s %s %"PRItime" %+05d\t%s", oid_to_hex(ooid),
3116 oid_to_hex(noid), email, timestamp, tz, message);
3117 oidcpy(&cb->last_kept_oid, noid);
3118
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003119 return 0;
3120}
3121
David Turnere3688bd2016-09-04 18:08:38 +02003122static int files_reflog_expire(struct ref_store *ref_store,
Ævar Arnfjörð Bjarmasoncc40b5c2021-08-23 13:36:11 +02003123 const char *refname,
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003124 unsigned int expire_flags,
David Turnere3688bd2016-09-04 18:08:38 +02003125 reflog_expiry_prepare_fn prepare_fn,
3126 reflog_expiry_should_prune_fn should_prune_fn,
3127 reflog_expiry_cleanup_fn cleanup_fn,
3128 void *policy_cb_data)
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003129{
Michael Haggerty7eb27cd2016-09-04 18:08:34 +02003130 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07003131 files_downcast(ref_store, REF_STORE_WRITE, "reflog_expire");
Martin Ågrenb2275862018-05-09 22:55:38 +02003132 struct lock_file reflog_lock = LOCK_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003133 struct expire_reflog_cb cb;
3134 struct ref_lock *lock;
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07003135 struct strbuf log_file_sb = STRBUF_INIT;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003136 char *log_file;
3137 int status = 0;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003138 struct strbuf err = STRBUF_INIT;
Ævar Arnfjörð Bjarmasonae35e162021-08-23 13:36:10 +02003139 const struct object_id *oid;
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003140
3141 memset(&cb, 0, sizeof(cb));
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003142 cb.rewrite = !!(expire_flags & EXPIRE_REFLOGS_REWRITE);
3143 cb.dry_run = !!(expire_flags & EXPIRE_REFLOGS_DRY_RUN);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003144 cb.policy_cb = policy_cb_data;
3145 cb.should_prune_fn = should_prune_fn;
3146
3147 /*
3148 * The reflog file is locked by holding the lock on the
3149 * reference itself, plus we might need to update the
3150 * reference if --updateref was specified:
3151 */
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003152 lock = lock_ref_oid_basic(refs, refname, &err);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003153 if (!lock) {
3154 error("cannot lock ref '%s': %s", refname, err.buf);
3155 strbuf_release(&err);
3156 return -1;
3157 }
Ævar Arnfjörð Bjarmasonae35e162021-08-23 13:36:10 +02003158 oid = &lock->old_oid;
Ævar Arnfjörð Bjarmason7aa78292021-08-23 13:36:09 +02003159
3160 /*
3161 * When refs are deleted, their reflog is deleted before the
3162 * ref itself is deleted. This is because there is no separate
3163 * lock for reflog; instead we take a lock on the ref with
3164 * lock_ref_oid_basic().
3165 *
3166 * If a race happens and the reflog doesn't exist after we've
3167 * acquired the lock that's OK. We've got nothing more to do;
3168 * We were asked to delete the reflog, but someone else
3169 * deleted it! The caller doesn't care that we deleted it,
3170 * just that it is deleted. So we can return successfully.
3171 */
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07003172 if (!refs_reflog_exists(ref_store, refname)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003173 unlock_ref(lock);
3174 return 0;
3175 }
3176
Nguyễn Thái Ngọc Duy802de3d2017-03-26 09:42:22 +07003177 files_reflog_path(refs, &log_file_sb, refname);
3178 log_file = strbuf_detach(&log_file_sb, NULL);
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003179 if (!cb.dry_run) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003180 /*
3181 * Even though holding $GIT_DIR/logs/$reflog.lock has
3182 * no locking implications, we use the lock_file
3183 * machinery here anyway because it does a lot of the
3184 * work we need, including cleaning up if the program
3185 * exits unexpectedly.
3186 */
3187 if (hold_lock_file_for_update(&reflog_lock, log_file, 0) < 0) {
3188 struct strbuf err = STRBUF_INIT;
3189 unable_to_lock_message(log_file, errno, &err);
3190 error("%s", err.buf);
3191 strbuf_release(&err);
3192 goto failure;
3193 }
3194 cb.newlog = fdopen_lock_file(&reflog_lock, "w");
3195 if (!cb.newlog) {
3196 error("cannot fdopen %s (%s)",
3197 get_lock_file_path(&reflog_lock), strerror(errno));
3198 goto failure;
3199 }
3200 }
3201
brian m. carlson0155f712017-10-15 22:07:04 +00003202 (*prepare_fn)(refname, oid, cb.policy_cb);
Nguyễn Thái Ngọc Duy2f40e952017-03-26 09:42:36 +07003203 refs_for_each_reflog_ent(ref_store, refname, expire_reflog_ent, &cb);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003204 (*cleanup_fn)(cb.policy_cb);
3205
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003206 if (!cb.dry_run) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003207 /*
3208 * It doesn't make sense to adjust a reference pointed
3209 * to by a symbolic ref based on expiring entries in
3210 * the symbolic reference's reflog. Nor can we update
3211 * a reference if there are no remaining reflog
3212 * entries.
3213 */
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003214 int update = 0;
3215
Ævar Arnfjörð Bjarmasonfcd2c3d2021-12-22 05:06:48 +01003216 if ((expire_flags & EXPIRE_REFLOGS_UPDATE_REF) &&
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003217 !is_null_oid(&cb.last_kept_oid)) {
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003218 int type;
3219 const char *ref;
3220
Ævar Arnfjörð Bjarmasonf1da24c2021-10-16 11:39:27 +02003221 ref = refs_resolve_ref_unsafe(&refs->base, refname,
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003222 RESOLVE_REF_NO_RECURSE,
Ævar Arnfjörð Bjarmasonce14de02022-01-26 15:37:01 +01003223 NULL, &type);
Ævar Arnfjörð Bjarmason52106432021-10-16 11:39:13 +02003224 update = !!(ref && !(type & REF_ISSYMREF));
3225 }
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003226
Jeff King83a30692017-09-05 08:14:33 -04003227 if (close_lock_file_gently(&reflog_lock)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003228 status |= error("couldn't write %s: %s", log_file,
3229 strerror(errno));
Jeff King83a30692017-09-05 08:14:33 -04003230 rollback_lock_file(&reflog_lock);
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003231 } else if (update &&
Jeff Kingee4d8e42017-09-05 08:15:15 -04003232 (write_in_full(get_lock_file_fd(&lock->lk),
brian m. carlson2ae2e2a2018-07-16 01:27:59 +00003233 oid_to_hex(&cb.last_kept_oid), the_hash_algo->hexsz) < 0 ||
Jeff King88780c32017-09-25 16:27:17 -04003234 write_str_in_full(get_lock_file_fd(&lock->lk), "\n") < 0 ||
Jeff King83a30692017-09-05 08:14:33 -04003235 close_ref_gently(lock) < 0)) {
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003236 status |= error("couldn't write %s",
Jeff Kingee4d8e42017-09-05 08:15:15 -04003237 get_lock_file_path(&lock->lk));
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003238 rollback_lock_file(&reflog_lock);
3239 } else if (commit_lock_file(&reflog_lock)) {
Junio C Hamanoe0048d32015-12-11 10:40:54 -08003240 status |= error("unable to write reflog '%s' (%s)",
Michael Haggerty7bd9bcf2015-11-09 14:34:01 +01003241 log_file, strerror(errno));
3242 } else if (update && commit_ref(lock)) {
3243 status |= error("couldn't set %s", lock->ref_name);
3244 }
3245 }
3246 free(log_file);
3247 unlock_ref(lock);
3248 return status;
3249
3250 failure:
3251 rollback_lock_file(&reflog_lock);
3252 free(log_file);
3253 unlock_ref(lock);
3254 return -1;
3255}
Ronnie Sahlberg3dce4442016-09-04 18:08:10 +02003256
Ævar Arnfjörð Bjarmason5cf88fd2022-08-25 19:09:48 +02003257static int files_init_db(struct ref_store *ref_store, struct strbuf *err UNUSED)
David Turner6fb5acf2016-09-04 18:08:41 +02003258{
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07003259 struct files_ref_store *refs =
Nguyễn Thái Ngọc Duy9e7ec632017-03-26 09:42:32 +07003260 files_downcast(ref_store, REF_STORE_WRITE, "init_db");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07003261 struct strbuf sb = STRBUF_INIT;
3262
David Turner6fb5acf2016-09-04 18:08:41 +02003263 /*
3264 * Create .git/refs/{heads,tags}
3265 */
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07003266 files_ref_path(refs, &sb, "refs/heads");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07003267 safe_create_dir(sb.buf, 1);
3268
3269 strbuf_reset(&sb);
Nguyễn Thái Ngọc Duy19e02f42017-03-26 09:42:23 +07003270 files_ref_path(refs, &sb, "refs/tags");
Nguyễn Thái Ngọc Duye9dcc302017-03-26 09:42:20 +07003271 safe_create_dir(sb.buf, 1);
3272
3273 strbuf_release(&sb);
David Turner6fb5acf2016-09-04 18:08:41 +02003274 return 0;
3275}
3276
Ronnie Sahlberg3dce4442016-09-04 18:08:10 +02003277struct ref_storage_be refs_be_files = {
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003278 .next = NULL,
3279 .name = "files",
3280 .init = files_ref_store_create,
3281 .init_db = files_init_db,
3282 .transaction_prepare = files_transaction_prepare,
3283 .transaction_finish = files_transaction_finish,
3284 .transaction_abort = files_transaction_abort,
3285 .initial_transaction_commit = files_initial_transaction_commit,
Michael Haggertye1e33b72016-09-04 18:08:25 +02003286
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003287 .pack_refs = files_pack_refs,
3288 .create_symref = files_create_symref,
3289 .delete_refs = files_delete_refs,
3290 .rename_ref = files_rename_ref,
3291 .copy_ref = files_copy_ref,
Michael Haggerty82315272016-09-04 18:08:27 +02003292
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003293 .iterator_begin = files_ref_iterator_begin,
3294 .read_raw_ref = files_read_raw_ref,
3295 .read_symbolic_ref = files_read_symbolic_ref,
David Turnere3688bd2016-09-04 18:08:38 +02003296
Ævar Arnfjörð Bjarmason32bff612022-03-17 18:27:15 +01003297 .reflog_iterator_begin = files_reflog_iterator_begin,
3298 .for_each_reflog_ent = files_for_each_reflog_ent,
3299 .for_each_reflog_ent_reverse = files_for_each_reflog_ent_reverse,
3300 .reflog_exists = files_reflog_exists,
3301 .create_reflog = files_create_reflog,
3302 .delete_reflog = files_delete_reflog,
3303 .reflog_expire = files_reflog_expire
Ronnie Sahlberg3dce4442016-09-04 18:08:10 +02003304};